Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2018-12207 (GCVE-0-2018-12207)
Vulnerability from cvelistv5
- Denial of Service
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | 2019.2 IPU – Intel(R) Processor Machine Check Error |
Version: See provided reference |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T08:30:58.929Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "FEDORA-2019-376ec5c107",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I5WWPW4BSZDDW7VHU427XTVXV7ROOFFW/"
},
{
"name": "RHSA-2019:3916",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2019:3916"
},
{
"name": "RHSA-2019:3936",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2019:3936"
},
{
"name": "RHSA-2019:3941",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2019:3941"
},
{
"name": "USN-4186-2",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "https://usn.ubuntu.com/4186-2/"
},
{
"name": "FEDORA-2019-cbb732f760",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IZYATWNUGHRBG6I3TC24YHP5Y3J7I6KH/"
},
{
"name": "openSUSE-SU-2019:2710",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00042.html"
},
{
"name": "RHSA-2020:0026",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2020:0026"
},
{
"name": "RHSA-2020:0028",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2020:0028"
},
{
"name": "DSA-4602",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "https://www.debian.org/security/2020/dsa-4602"
},
{
"name": "20200114 [SECURITY] [DSA 4602-1] xen security update",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "https://seclists.org/bugtraq/2020/Jan/21"
},
{
"name": "RHSA-2020:0204",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2020:0204"
},
{
"name": "GLSA-202003-56",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO",
"x_transferred"
],
"url": "https://security.gentoo.org/glsa/202003-56"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.oracle.com/security-alerts/cpujul2020.html"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://support.f5.com/csp/article/K17269881?utm_source=f5support\u0026amp%3Butm_medium=RSS"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "2019.2 IPU \u2013 Intel(R) Processor Machine Check Error",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "See provided reference"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Improper invalidation for page table updates by a virtual guest operating system for multiple Intel(R) Processors may allow an authenticated user to potentially enable denial of service of the host system via local access."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Denial of Service",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2020-07-15T02:22:57",
"orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"shortName": "intel"
},
"references": [
{
"name": "FEDORA-2019-376ec5c107",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I5WWPW4BSZDDW7VHU427XTVXV7ROOFFW/"
},
{
"name": "RHSA-2019:3916",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2019:3916"
},
{
"name": "RHSA-2019:3936",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2019:3936"
},
{
"name": "RHSA-2019:3941",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2019:3941"
},
{
"name": "USN-4186-2",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "https://usn.ubuntu.com/4186-2/"
},
{
"name": "FEDORA-2019-cbb732f760",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IZYATWNUGHRBG6I3TC24YHP5Y3J7I6KH/"
},
{
"name": "openSUSE-SU-2019:2710",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00042.html"
},
{
"name": "RHSA-2020:0026",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2020:0026"
},
{
"name": "RHSA-2020:0028",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2020:0028"
},
{
"name": "DSA-4602",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "https://www.debian.org/security/2020/dsa-4602"
},
{
"name": "20200114 [SECURITY] [DSA 4602-1] xen security update",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "https://seclists.org/bugtraq/2020/Jan/21"
},
{
"name": "RHSA-2020:0204",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2020:0204"
},
{
"name": "GLSA-202003-56",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO"
],
"url": "https://security.gentoo.org/glsa/202003-56"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.oracle.com/security-alerts/cpujul2020.html"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://support.f5.com/csp/article/K17269881?utm_source=f5support\u0026amp%3Butm_medium=RSS"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "secure@intel.com",
"ID": "CVE-2018-12207",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "2019.2 IPU \u2013 Intel(R) Processor Machine Check Error",
"version": {
"version_data": [
{
"version_value": "See provided reference"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Improper invalidation for page table updates by a virtual guest operating system for multiple Intel(R) Processors may allow an authenticated user to potentially enable denial of service of the host system via local access."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Denial of Service"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "FEDORA-2019-376ec5c107",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I5WWPW4BSZDDW7VHU427XTVXV7ROOFFW/"
},
{
"name": "RHSA-2019:3916",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2019:3916"
},
{
"name": "RHSA-2019:3936",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2019:3936"
},
{
"name": "RHSA-2019:3941",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2019:3941"
},
{
"name": "USN-4186-2",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/4186-2/"
},
{
"name": "FEDORA-2019-cbb732f760",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IZYATWNUGHRBG6I3TC24YHP5Y3J7I6KH/"
},
{
"name": "openSUSE-SU-2019:2710",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00042.html"
},
{
"name": "RHSA-2020:0026",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2020:0026"
},
{
"name": "RHSA-2020:0028",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2020:0028"
},
{
"name": "DSA-4602",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2020/dsa-4602"
},
{
"name": "20200114 [SECURITY] [DSA 4602-1] xen security update",
"refsource": "BUGTRAQ",
"url": "https://seclists.org/bugtraq/2020/Jan/21"
},
{
"name": "RHSA-2020:0204",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2020:0204"
},
{
"name": "GLSA-202003-56",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/202003-56"
},
{
"name": "https://www.oracle.com/security-alerts/cpujul2020.html",
"refsource": "MISC",
"url": "https://www.oracle.com/security-alerts/cpujul2020.html"
},
{
"name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html",
"refsource": "MISC",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html"
},
{
"name": "https://support.f5.com/csp/article/K17269881?utm_source=f5support\u0026amp;utm_medium=RSS",
"refsource": "CONFIRM",
"url": "https://support.f5.com/csp/article/K17269881?utm_source=f5support\u0026amp;utm_medium=RSS"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"assignerShortName": "intel",
"cveId": "CVE-2018-12207",
"datePublished": "2019-11-14T19:08:45",
"dateReserved": "2018-06-11T00:00:00",
"dateUpdated": "2024-08-05T08:30:58.929Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2018-12207\",\"sourceIdentifier\":\"secure@intel.com\",\"published\":\"2019-11-14T20:15:11.133\",\"lastModified\":\"2024-11-21T03:44:45.313\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Improper invalidation for page table updates by a virtual guest operating system for multiple Intel(R) Processors may allow an authenticated user to potentially enable denial of service of the host system via local access.\"},{\"lang\":\"es\",\"value\":\"Una invalidaci\u00f3n inapropiada de las actualizaciones de la tabla de p\u00e1ginas por parte de un sistema operativo invitado virtual para m\u00faltiples procesadores Intel\u00ae puede habilitar a un usuario autenticado para permitir potencialmente una denegaci\u00f3n de servicio del sistema host por medio de un acceso local.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.0,\"impactScore\":4.0}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:N/I:N/A:C\",\"baseScore\":4.9,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":3.9,\"impactScore\":6.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i3-10110u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E80BB84A-3BF8-40E0-BB06-FD39C583B94B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i3-10110u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"44BF0AFB-E9DC-4EA5-BFFF-48F896C655E0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i3-10110y_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0A589B59-DB9C-427F-A28A-BFD01EC64997\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i3-10110y:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"43454510-4BE7-4CD1-960D-AE1B36EFBEA5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i3-1005g1_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"71EE1DE3-2F84-481A-BE31-7FDF4B4E76C7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i3-1005g1:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"30B2F570-1DD9-49C7-BB72-0EA0E9A417C4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i3-9300t_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B7474BC6-6D73-47B5-B7B4-AA6BBFFC36A4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i3-9300t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"85B0AC6F-52DC-4697-A29A-B4DE51B41D57\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i3-9300_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"196BA038-162F-4E30-8DE3-6FFB35102A1A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i3-9300:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5CA88723-29A0-4F7C-BED3-70E35F913384\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i3-9100_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"77B8A8CC-9009-4CF0-894F-97079FD27796\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i3-9100:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"89E9DCEC-6AFD-476F-93A1-E19BFC124BD9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i3-9100t_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD20B8F2-FCD6-454F-955F-9F59B140593C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i3-9100t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D53FC6C0-C1B3-422F-BAFC-3B4CD0EB28B7\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i3-9350k_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3AC85FC5-274A-43B1-A9B6-245130812551\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i3-9350k:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"98752CBB-B870-4DA2-BF09-0A6A847E7F19\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i3-9320_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"769E9A01-C94B-4254-8510-ABE32567E22D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i3-9320:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"64206B12-9CB6-4E4F-9200-EE062693FC9E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i3-8145u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1100AAC2-5A94-4EF3-AB94-AB4B4085F109\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i3-8145u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D78093B-076C-48FB-A224-F94F5743ACF3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i3-8300_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"30904062-0998-4D93-8F61-36C41BCD11F9\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i3-8300:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F1DCD6D7-7FF2-419B-A41C-CF1FA830F289\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i3-8100t_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9147C908-0B5E-4CC4-BFDA-FDC8219494A2\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i3-8100t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33B0B0C9-54ED-4D7E-B0F2-C87690056800\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i3-8300t_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC25F057-A548-4E02-A464-8AE97B40A39D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i3-8300t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8127E47-6082-4313-B310-1C6278471A21\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i3-8109u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"65CAE5F9-E9D5-4EE1-A02D-88707B118C1C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i3-8109u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E7DDCC11-A3DD-493E-AAFA-B50050FE3AC4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i3-8130u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7DB32980-A87F-4AC6-9F1C-EA690582DECF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i3-8130u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6287BCB7-8EFD-485E-B40E-AE6B9DB067DF\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i3-8100_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6325AFF1-8B27-408C-ADC3-E1FA826A2B9B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i3-8100:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD84789A-B7F4-493E-A3F6-D5287ACFEB98\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i3-8350k_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F99AFDF6-1B9C-4F06-A827-F0C5052EA485\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i3-8350k:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C14BA084-59CC-40E8-A62F-7AD1C9DD9283\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i3-7100_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F9D0FC02-90FB-4C7D-88A6-CCC7FC7D96F9\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i3-7100:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EC9F763B-B469-42DC-952F-48448121373F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i3-7350k_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2AE97A31-CFCC-43AA-9354-E7ACC2415211\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i3-7350k:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5E86321B-B1BD-43B7-A7F5-05CABE35F40E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i3-7300t_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE031B88-677D-4EA4-A257-1641680E407E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i3-7300t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9CF355B2-A5D6-41CC-8404-2B61A594BA6D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i3-7167u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CBC24393-D20D-4BED-B327-2DC80876383B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i3-7167u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F609E73-203F-45B9-9A3A-DC754B33860A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i3-7300_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B860BA95-FB11-4314-8EF7-9992F2F26C68\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i3-7300:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E3A734E-973B-4904-A905-51E438879B8F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i3-7100h_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD689A93-49A6-49F8-83A8-D87563658FAC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i3-7100h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"31CBD3FB-0835-4F28-BFA2-3D07459066F3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i3-7320_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1CE3890B-D84E-4552-BCC5-9CB8C615BAD5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i3-7320:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C51A38C-E4AE-46B9-ACE6-82E8F7B668D4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i3-7100t_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4BBB9687-14B5-4F4E-B6A8-1524930E605E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i3-7100t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A7C8B4BA-24E8-4856-A2D9-BD2CE2C858AF\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i3-7100u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E9B1E75F-5225-4656-90EF-473D417D3051\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i3-7100u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F059A42-0B43-4F79-BBAF-6ED05CFFE7EB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i3-6100u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E23104C-8296-4A9B-BC55-E2E7B1CE7AF7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i3-6100u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BE0F2403-8146-4CA0-9E89-04022B375CEC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i3-6100h_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"546BA014-D154-4B2E-9EB9-CAA4B810264A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i3-6100h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F0B9E6DB-C9C3-4B19-915B-B2E6E4D12158\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i3-6167u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C68A5FCF-3ECB-4831-A217-F58B63CCA4BF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i3-6167u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"20B1E424-885F-4BB0-9257-8284A18B1655\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i3-6100_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"43C4ABB7-71F8-4AF6-918F-263E58FC26EF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i3-6100:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A6E16A4-5B81-412F-9B02-D15288F0EB52\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i3-5015u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E8464165-83B9-4745-A71D-0072AB466DF9\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i3-5015u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"81A627BB-47E3-4870-8B66-92546ABA0060\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i3-5020u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D6CD613-B37A-442E-842C-9F60E8F96951\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i3-5020u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B6DD467D-BCB8-48CA-920B-5591A3E8D4C9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i3-5005u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"23B5896D-2B98-45AE-B4BF-1196C5362785\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i3-5005u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E3F45AB6-55EF-4ED0-BBAD-E78894ED399B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i3-5010u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1D47B941-8617-4EDA-9EFA-577BDBB3D1B0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i3-5010u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5DA07BF1-F5E6-4AFB-AE92-26E3E5125064\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i3-5157u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"83279B8E-8448-4D7A-8795-D7DAA6BD4092\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i3-5157u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A64B0EA-FB22-4CE6-81E7-56CFFE12FC5A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i5-10210u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16920A34-D1CE-4F1A-BCF7-045E3B3AA9AC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i5-10210u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"71615EAF-4DF4-4B9E-BF34-6ED0371A53D7\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i5-10310y_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"95BC9762-7F9A-483A-8C20-94481FD54000\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i5-10310y:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C8515D29-3823-4F9B-9578-8BB52336A2A7\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i5-10210y_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D188A7A-9456-4535-A230-C16033A22F21\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i5-10210y:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"376B6DD7-1284-4BD9-88A4-5C34303CC5D1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i5-1035g4_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5071EBE4-CC92-4238-A23E-0213CB14E19A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i5-1035g4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3907FA31-6F1A-45BA-ACF3-1C8EE05D9BA0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i5-1035g7_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"70EC3730-5825-422D-A728-D719F447E5E4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i5-1035g7:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D48D9F5F-95BD-4F6B-8A37-D1CAA7D2DB25\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i5-1035g1_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"502AE808-A66F-4C02-A112-C4D682F3E13F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i5-1035g1:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BE048AEB-094D-4102-9DBF-488FEB53FF89\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i5-9500_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"443C4081-E238-4AF4-AABE-AB5489756333\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i5-9500:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"35F7D93A-7C16-4189-ACF2-9B3760180FCE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i5-9600_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BB2ED2C7-D6E3-46F8-B1B3-8B4FB939B189\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i5-9600:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"26975700-3A56-4D17-ADDC-77CCE82A6C98\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i5-9400t_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7FF61383-1558-4AE6-97ED-3B8A20667EEE\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i5-9400t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E7950151-6BF6-4A80-9370-ED92B59635BC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i5-9600t_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F8356AC2-3879-4E3C-B1CD-9B1EAF0761CB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i5-9600t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"43B9F540-DFCD-40B2-8DE2-9AE9D123A48F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i5-9500t_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5AC225BE-FA97-41D2-AD32-5FE58C2DAB94\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i5-9500t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3E8A3281-8FB9-4695-A5BB-F33B5EB6EF2C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i5-9300h_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"37E9BA09-E255-438E-9938-3F51A78A3331\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i5-9300h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A735A90-47E1-44C6-AE76-F6C7FFDCD4D0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i5-9400h_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D95AB3F9-7B28-46F8-8882-4976DBBCC767\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i5-9400h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"85F465BF-4548-45EB-AC40-384F4E6248EE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i5-9400_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8AA0AF35-BED8-41EC-831A-57CFA7A5F0D0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i5-9400:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8AC9F52F-6669-459A-A0A9-8F472E1F2761\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i5-9600k_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B26CE379-73B5-4E3C-B0B2-7550A3A670BC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i5-9600k:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B1DFFFEB-CC63-4F51-8828-C5D4E0287264\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i5-8265u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A7001A74-CFF9-4CBB-A72B-E476C22ADF07\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i5-8265u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D3E166F-3D9F-4D0D-924A-147883598EA3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i5-8200y_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E9C3DCA2-6087-4286-A84A-6091149083C9\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i5-8200y:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2AC12E92-33CB-4603-AC14-3351CE1D4E3A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i5-8400t_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"71A5BA9C-83FD-4E4F-8CC7-ABC317BC0F98\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i5-8400t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AA341190-21EC-46FB-849D-F54AD3DFCF93\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i5-8300h_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4E3236A7-F174-4A47-90B3-7E0457CB3455\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i5-8300h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8BD64BB5-CBC1-4862-BEE6-04FC53017976\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i5-8259u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C2797768-C460-4901-99BE-148A7BADC020\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i5-8259u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D0D473E4-5EB1-434D-9D8F-C9365988EEAD\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i5-8269u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07658CBC-A0FD-4A0F-BCBB-FC24115F7FDC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i5-8269u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"70D9D4EE-A6CA-4C9F-905F-27570858B5FE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i5-8700b_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3AD0F061-1664-4C0C-9207-8991C6F79F35\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i5-8700b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"35B77BF8-E6BD-47EA-A303-9E584D3A2736\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i5-8400b_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D1FEE69-E2FD-4F88-9D25-7CE3D53D1001\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i5-8400b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"43DA2F8C-1C05-4447-A861-A33E81050F37\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i5-8500b_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"495C794A-3EB2-4C2B-8312-65C1C70EFFAB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i5-8500b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A98CDB0-BC13-4FB3-9DF2-56D9DCD9002F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i5\\\\+8500_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"25773AA8-5882-4C05-9A67-FE0D37C9DCAF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i5\\\\+8500:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EDF4BEEF-A8FA-4A9A-A906-20268F7886C4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i5\\\\+8400_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9DB5F890-8B92-4F12-8D34-7E9045D22DAF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i5\\\\+8400:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2816803A-2A97-48B2-ACB5-BA35FC6CD82D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i5-8305g_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3CF5BB43-9A54-4F8F-86EB-04B56135F69A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i5-8305g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F4D55B9D-4BAB-4082-A33F-626E15229333\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i5-8400_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE4ECE37-14C8-4035-9410-F66AF586934D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i5-8400:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D350A92-3992-4464-84AB-960ABCA45698\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i5-8250u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D3C71C3D-D137-4302-8B35-3A2AA08DD92C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i5-8250u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2DDA599F-09D5-4351-B7F5-351A2E04E091\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i5-8350u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1C1B41F0-B592-4E76-823E-847DDCC49859\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i5-8350u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4E920376-561D-4892-97A2-F4400223B3CA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i5-7400_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"84928CAE-996F-42F9-8CB2-E3BC13E3D448\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i5-7400:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE4C6ADA-EE5E-401D-82B4-6E450EDBD49E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i5-7500t_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B52E5B70-12E0-4AA2-81E5-71BBBFA1D500\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i5-7500t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6AEAE7D3-6E26-43C5-B530-B0EE3DA65C80\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i5-7600t_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"66430AA1-841C-4204-8846-B2FBEFF4269A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i5-7600t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B91585C-4BD7-475B-8AC8-1B813A698D77\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i5-7400t_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"01CD5DEE-86B0-4431-A542-603300A28DB3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i5-7400t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"173C6F98-4022-4F40-A39A-D3D490CA6461\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i5-7600_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"62D1D375-D4AE-4866-8472-30EBF2A6F057\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i5-7600:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2603B0FB-A7B0-4E87-B989-D7EFFC2A64E4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i5-7500_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"92E1FB35-EB0D-46D9-8B07-5B74CD56B36C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i5-7500:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F3E6176-6F6D-4488-A03B-2BBF846ADC93\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i5-7300hq_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"828E6E11-A376-4F40-9077-81B9000B2692\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i5-7300hq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8EE85AE7-B4BD-442E-AFAB-CD01744C91B7\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i5-7267u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1737E9B0-D3DF-4B8A-8548-9B2CD94EB31F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i5-7267u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF244D02-2B47-4884-8D70-37DFEB18CB60\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i5-7600k_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3244927F-488B-4F7D-A616-02D26E64C88C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i5-7600k:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF705120-459D-49BA-BDCD-6AC38D95C820\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i5-7260u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"059D9645-5A07-44C5-A3B7-E8948D5F942A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i5-7260u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EFA6BB38-CDF8-46B0-9910-897AB7920D18\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i5-7440hq_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2128AB8F-506E-4E75-AEBE-418EDFE083FC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i5-7440hq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"78F1BD53-55ED-4346-A67A-141B5BC552CD\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i5-7287u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"419D32E2-D53C-4A81-8E9D-E79FD5D89B7B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i5-7287u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"615D9B0D-8E91-4C8F-B5BC-6315C2CA90BD\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i5-7360u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A308E6AF-16CB-4722-8318-94F7B1877535\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i5-7360u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ADA681B4-37F8-4E2E-B73B-E0E17C66B754\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i5-7200u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"634087B5-A4D5-45AC-871F-7E785F48B9C3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i5-7200u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E993BEE9-72BD-4615-B1BE-5E9129D61ABD\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i5-7y54_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC557726-C2D4-4E95-AE20-85FE621586FC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i5-7y54:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CFA675E6-83DD-47FF-BEBC-D32E5223A065\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i5-6350hq_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC4E97FA-FEF9-4EB1-9B94-9CFC4C5A6821\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i5-6350hq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"41F7C959-BC66-40AB-8038-D37181A4CE5A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i5-6200u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6FD63AC3-9528-484C-9B94-5AE1790A6492\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i5-6200u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F611716-F3D6-4187-AE71-4FF87C95C18E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i5-6300hq_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7505980F-57C3-4278-AA6F-59933ACB34A5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i5-6300hq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"93929C7B-D4D9-436B-BA69-FD3C22FCEC2D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i5-6287u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"867B2DCB-A413-4EAB-811B-02BD5BA30F3E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i5-6287u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A0F889F1-3B57-46C1-9C23-9E78CD0DEECF\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i5-6267u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"83E3A698-AB8A-40C6-BBE1-61FCB0375483\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i5-6267u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1054FBFC-1609-4301-A0D0-B78878FB2427\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i5-6260u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"180F2FC8-2C6D-4D54-9CE5-B74348BF1663\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i5-6260u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D5F67974-81B3-43C2-8DAE-A66C6A876B7A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i5-5350h_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"079CAA7D-456D-499E-8604-F218DE1333AF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i5-5350h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E6FCEEDB-C125-4F83-99B6-9DC8736F2F00\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i5-5200u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4FC041F8-7830-4CED-8330-88412A9F4EFC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i5-5200u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"60A08817-7679-4B7B-8D32-08F7F42525CC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i5-5287u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A77B4603-C1B5-4C2D-8072-F0339B5B8682\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i5-5287u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B7138774-E0CF-47C6-BA82-4034AA63AC1D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i5-5250u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F6C53104-79C6-4FDE-AE7C-233813939FDA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i5-5250u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D8085F23-481D-4395-9071-5F79DCC4EFEA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i5-5257u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F92C5142-6771-4C3B-BB2F-CBC60BFD2FC0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i5-5257u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9CB0B9DA-FB37-4E96-99E7-3345B53FDC2F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-10510u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D449326-502E-488D-9933-863B9CF997FC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-10510u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"494A828B-F2BF-40CA-AAFB-7D2AF2BAF3AA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-10510y_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"27E24442-6697-4D2D-9515-43E4370474B4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-10510y:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD97F84B-ED73-4FFD-8634-10631FEE03EA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-10710u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5E7092CF-E482-4103-8AF9-A4C19238F9D5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-10710u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA491401-C484-4F77-ABF8-D389C94BF7B7\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-1065g7_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8F807F51-D647-4867-BBDA-17492346EB64\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-1065g7:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2243674B-E505-4FED-B063-953A1569EA30\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-9700t_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3BF1493D-E866-4FA7-93A6-2461053A5C0A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-9700t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC758216-672D-4F7B-8CF3-6433B06AA2FE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-9700_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5D6E7038-2BFF-4372-8D28-2C72017EADB6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-9700:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6D63DC7-0623-4777-86EC-06697FEBFD10\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-9750h_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80F1B914-F1E3-4B69-BBBD-0F1E9CEF8835\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-9750h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"867027D4-9EB4-4BAB-BDCC-FD43A087442F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-9850h_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7BB8CB49-D52E-4C92-9CD5-465615916213\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-9850h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D0320CB-05E3-4D5B-BCEF-D862566B0AA2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-9700k_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6CCE2EBC-82FE-49AB-857B-403C7ACE5091\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-9700k:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1FB0C1DA-60C6-4C9E-99D6-7A47696DACD8\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-8565u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"50E893B9-92D2-4EA9-BDC6-0E73CA4EE484\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-8565u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F41025AC-6EFE-4562-B1D1-BAB004875B06\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-8500y_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2495E71F-8DE8-482E-A903-FA00E9A3C697\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-8500y:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"957F3AC9-D071-4932-B2C9-1643FB78BC7A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-8086k_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6A2FFBF5-FA4C-4213-BCBA-D129EC925466\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-8086k:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0304CBDA-AF3E-4F32-BF45-FD2199D1E025\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-8750h_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CBB43D3B-BC91-46F1-840E-F6876095FAB9\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-8750h:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9B77426-B579-43C6-9340-F291138ECD7A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-8559u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CDE91A3E-B3EF-444F-A518-9027C1D65C01\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-8559u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CB6774C8-431B-42AC-8955-02B529222372\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7\\\\+8700_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CB6BDE7D-711D-42F6-97EC-5A0E84BEB07F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7\\\\+8700:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0EDCD661-394A-431F-84C2-0252ABD6F1B1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-8709g_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9EEE5E85-132B-4C11-B2C1-3F1AFEE3BE5D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-8709g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"08718840-D468-4E86-8FFF-A2B1841E6BF6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-8809g_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"53180F59-BE75-4A62-99ED-3602C025E388\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-8809g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD0CF1E4-487A-4C61-AF4E-733D7ECBCFCC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-8705g_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"88971837-5ED9-442C-BAF2-1C6C31105EB8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-8705g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D4DDEFAF-EEC8-441D-82EF-ECF20B9496A4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-8706g_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9530B87C-B5C7-4EE6-BE29-A559BFE9EC18\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-8706g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F423BBE6-327A-40DC-8BCE-BF43600A68D5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-8550u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F4E3B3E-5225-49ED-9159-4503DCDED473\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-8550u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1395788D-E23B-433A-B111-745C55018C68\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-8650u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2E4EBD70-06C1-4842-AF3E-970218816B18\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-8650u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC82E058-25FE-4B6C-BA3C-AB043CFAB113\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-7700t_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"65ABD229-0EF3-44AC-AD87-6C42EF48BF2B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-7700t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2FE6AE98-E4D9-4FBF-B90A-2B170A0AF26F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-7820hk_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2E88CE3A-812A-4C01-B0D7-D9A154FF2187\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-7820hk:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA47107D-237A-4184-8BA2-601660F7FB5C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-7700hq_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D8BAD9D-7253-492A-87B3-CACCF66A332F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-7700hq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A13E353-0063-468B-96CD-97BF91C747C9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-7660u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EBFC1253-B337-4F9B-855D-14A3F6AE7EDB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-7660u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CEE126ED-B743-4C6D-95FF-04F473A9A008\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-7560u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A20E7888-D3A3-4A01-8328-71A81AA0A52A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-7560u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6A97ED15-D0C6-4B64-BA08-EE50A6990272\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-7700_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"988EDA03-EF3B-402F-B3B4-74BA32A1BCCC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-7700:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D901944-8E2B-41E5-BB82-CF1C97064711\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-7567u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"77C3D738-944D-46A1-A542-32C96A021964\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-7567u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E6A121D8-0D01-4AA7-A1D9-5E2B9F0D30A6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-7700k_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1D3E61E4-8FE1-47CC-9A9C-1A4F17C11938\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-7700k:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"913BBEFF-49E7-42AF-A850-B49E5A12AB98\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-7920hq_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80A4E442-8E2C-472B-A9C6-56B58B6B55B0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-7920hq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE6572E2-5B24-4E21-9F6F-3A7A17A9F098\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-7820hq_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"43695191-7897-4028-A8DA-F45D2B4E0C38\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-7820hq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E9862E49-124E-4B7D-941A-CFD2668B6481\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-7500u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"45D72230-B7C2-4A9C-928F-328666CA3988\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-7500u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D566CFB-935B-40E4-9F4E-6216A42E7EBA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-6970hq_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"37ED0DB6-A589-4CB7-87AD-102FE7490AC8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-6970hq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"49BDD476-E402-408D-9BD6-886AB195704D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-6870hq_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"20EE53DA-4639-4714-B956-CC69BBCC6D26\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-6870hq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"87B5258B-26E4-4853-9F27-4BB12886CC38\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-6770hq_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5DD0B86-37A4-4927-97C5-86B165590105\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-6770hq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"31C57E58-66E3-4FEC-A88F-B82C4B372B2B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-6500u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"53B450C9-CDC4-4047-AD77-19A4BC9CB870\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-6500u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6CAD248D-0B95-4BE1-917F-E0976447927D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-6700hq_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC8851E2-CD05-4575-83E3-F801C1785A59\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-6700hq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"213B09CA-91E9-4D11-AA11-B84F40495E9A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-6820hk_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6484B4DA-85FA-4BF9-9B4A-157BC2ED2889\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-6820hk:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"638549EC-1BB1-4206-B8DC-C0101BBEF8A3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-6560u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F72876C5-C084-4DD3-9BC8-894C4BE40C15\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-6560u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5726D5D4-F188-4F06-B78A-2C7C694A40E3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-6567u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"43CEC4C5-B559-4A48-A1D2-7CDB96381CCB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-6567u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"72467515-7793-479B-BABF-839275CA9AAD\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-5850hq_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C36021BE-D024-45E4-BAFA-65763D72A260\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-5850hq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"466ECE77-E232-4C03-83A2-FBAC06C82021\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-5950hq_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E2F5DC2A-9916-4F01-BE70-AAB9061E51A5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-5950hq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1D98586A-473F-44D7-B299-9480129AE8DA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-5775c_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A30C6FFD-0620-4FB4-87CC-083A53121171\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-5775c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5ADC848D-C1AF-4FCE-89B4-DD3ABA050202\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-5700hq_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9242800F-847D-43CE-8611-DBFBDAFAF79B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-5700hq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"91CEC4BC-098C-4B8F-AA4F-25B9211010D6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-5750hq_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F885A622-CC74-43DB-9C05-633EB7693296\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-5750hq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9453959E-FB00-441B-B9B6-4BC75DD534B5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-5500u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0ACBF161-3C32-44B2-BD31-5FDBCCCFCF62\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-5500u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C34148EB-C6A7-49DE-8139-316F710D57F5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-5550u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC9FDA96-4E83-4038-ABF6-134BAD1359C8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-5550u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0EA33B05-493C-4F55-82D9-5F2C942A603D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-5557u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B0B6F4C5-CECA-4D7A-A4F4-A9BD38AB7114\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-5557u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E8D6B87-CA43-4773-B13E-EB07128E5501\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_m3-8100y_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E600C57D-AF4C-44F2-B1FB-E6B7D6CBE58F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_m3-8100y:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E5AFFC8B-3AC1-49B4-9A73-18A3EC928591\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_m3-7y30_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB4C2ED4-CF69-44D8-859F-9A186FFF27E4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_m3-7y30:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"18340F86-5545-4EEF-9F79-6560BB24F277\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_m3-6y54_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"41BA903F-DA6B-4DBB-8DB8-FEC204BB592B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_m3-6y54:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E10BE6B-C65C-43F9-8973-71F383BC2491\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_m3-6y30_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"95AA95C2-806A-4F8B-BD55-EDCEC16A587C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_m3-6y30:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"831048A2-657F-4F2C-83AC-802DF45204A5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_m-5y31_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2DC64A4A-5397-45C8-A9D7-1C6FA8CF0929\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_m-5y31:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF8CEB91-F0AF-4254-B566-5B69D25CBFBC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_m-5y51_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A9E35A1-C36B-4106-9085-1258E8276CA6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_m-5y51:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B0A5C29F-3597-4846-8CEC-74C8C73740C5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_m-5y10c_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"59288E55-4880-42D0-8022-1FAB33E468FC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_m-5y10c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"232B0352-B020-4CAA-A5E3-38E75A157C4C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_m-5y10_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"758AD850-98AE-47F5-ACC3-146BC712ECA3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_m-5y10:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"71AF96FE-EB28-474A-B260-EC22B4A334A1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_m-5y10a_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"927FB6B2-68DE-4396-9F11-9DE7FF20C80D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_m-5y10a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80F61261-1AF5-4B77-8065-25A6B0AFFEEC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_m-5y71_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7643B75E-E3F4-4D99-9DD4-D26D68D169C8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_m-5y71:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F011F80-4FBA-490D-AF5F-F6DDC941CB61\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_m-5y70_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FAA0EBB7-B00B-4E07-AD14-E68B0243F113\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_m-5y70:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"091D17D3-213F-4EC7-81C3-CD96AB7BC89C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_m-5y10c_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"59288E55-4880-42D0-8022-1FAB33E468FC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_m-5y10c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"232B0352-B020-4CAA-A5E3-38E75A157C4C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i9-10980xe_firmware:-:*:*:*:extreme:*:*:*\",\"matchCriteriaId\":\"06F38F1F-60D1-404D-84D1-71D2177794FD\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i9-10980xe:-:*:*:*:extreme:*:*:*\",\"matchCriteriaId\":\"AA77EB1A-4DE8-4E4E-88CF-DD61B2B5F856\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i9-10900x_x-series_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD997296-FA99-4B86-9AB4-F32AC995CF92\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i9-10900x_x-series:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BBEFFBB7-DEE7-47C4-97AA-80B605ABDB2B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i9-10920x_x-series_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8AFF8A3C-A15F-4E36-B1F5-203D5F3676CB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i9-10920x_x-series:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4A9F7D8B-6F09-45E3-98A5-D2DE96B826CD\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i9-10940x_x-series_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7EE90793-CBD1-4323-919B-56BCE6559BFC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i9-10940x_x-series:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D42F4199-D46D-4684-B8F3-E7DF07AB9BD4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i9-9900x_x-series_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D6DDF82-F8FF-4726-8DE0-11BC8B052B94\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i9-9900x_x-series:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B921CFEF-E54C-4D19-9065-EB5AF5FFBBB4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i9-9920x_x-series_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"236FFB25-391C-4E91-B689-D255EB972CB1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i9-9920x_x-series:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F20D826D-2F49-444C-B39D-B6724F1C79C2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i9-9960x_x-series_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E4618A1-012E-4921-A36B-4C3DF55D38DF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i9-9960x_x-series:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F14A2EAD-9263-4F85-B961-75ABD3C4D7EE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i9-9980xe_firmware:-:*:*:*:extreme:*:*:*\",\"matchCriteriaId\":\"5C281835-B593-4824-A061-F042409D855C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i9-9980xe:-:*:*:*:extreme:*:*:*\",\"matchCriteriaId\":\"CED07547-1A34-4484-8032-CC33B8A24254\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i9-9940x_x-series_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"71EB0AC4-635E-4BF1-8FD5-150BA64BEE62\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i9-9940x_x-series:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"91233812-6832-4D68-BF8D-D684800405C5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i9-7960x_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC956D6E-B4D0-44F0-BE83-6BCCE5ECC480\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i9-7960x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2FBC4FB5-7C2D-4E10-80BB-3951FFA3A6CF\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i9-7940x_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E89BBE4-2243-4AF5-A63C-4BD45C62C446\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i9-7940x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BAC07903-D4B7-423F-9F79-7DF45E5350BB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i9-7980xe_firmware:-:*:*:*:extreme:*:*:*\",\"matchCriteriaId\":\"FF762097-B0AA-409F-8AE4-EB1A3E33AD30\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i9-7980xe:-:*:*:*:extreme:*:*:*\",\"matchCriteriaId\":\"DE0858F7-9527-41DF-B6E7-AF0445A6A934\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i9-7920x_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4FED84E6-8E54-4630-9D95-FD2F8EDF4C89\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i9-7920x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"58002875-D63D-4ABD-A8B7-DCAEB7E94AE4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i9-7900x_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E714DE6-C7C7-44B9-B824-7FF85DA89A86\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i9-7900x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B97260E-1D7A-45B5-AD86-EBF8CA259FE0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-7820x_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F87618B-A8DF-46B0-880F-422CD2E52826\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-7820x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"43756EB8-9F85-4499-99F0-43E69CA3F470\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:core_i7-7800x_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16DE2C40-E8A3-418A-99B2-DD0D19814071\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:core_i7-7800x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8580A81E-8BDE-4EB5-B830-6AA7550A25C4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:pentium_gold_g5620_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A16C20E0-57F2-422E-ABD6-5BA1E35FC590\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:pentium_gold_g5620:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF098E89-4979-45DB-AF4C-A5D0F5CE6F67\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:pentium_gold_g5600t_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF28D26F-9E8E-42EC-B80C-CFA8A33E67BF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:pentium_gold_g5600t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4861FF06-6720-4E5A-B599-F7F96D7D4FE6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:pentium_gold_g5600_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"32B73E3E-322B-4BCC-A1AF-AF9F763073F7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:pentium_gold_g5600:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF3F6453-51EF-4509-94CB-24E8ECFBAC5E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:pentium_gold_g5500t_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"11E57CFC-7A4F-42A3-9637-BF296CC7CB22\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:pentium_gold_g5500t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3D6425C6-A338-42A0-B236-12B33147931D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:pentium_gold_g5500_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB623CE2-3D25-46F6-B7E6-08825275D9E9\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:pentium_gold_g5500:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C96A17A-44EE-4FD0-9187-9BB9202AA9C7\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:pentium_gold_g5420t_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA31DE89-2BE5-4743-9694-A37DFAEC2C36\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:pentium_gold_g5420t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CFB28789-A195-4EB8-AE96-6E1EFEE93E6C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:pentium_gold_g5420_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D9116354-0807-4089-A6C1-9A5DF87D8795\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:pentium_gold_g5420:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"64D3350F-8083-4FD3-9432-36C10EE911EB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:pentium_gold_6405u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"68E166EE-7DF9-442A-874D-4CBB6F54702C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:pentium_gold_6405u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE118AB2-A2C4-452C-B9AD-DDEF65B5EC67\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:pentium_gold_5405u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9CFD3C92-94FE-44C6-B3CD-F620BC61F292\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:pentium_gold_5405u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D376C32-99BE-4DF4-A63D-2156D10EEA73\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:pentium_gold_g5400t_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6FF2583-34CA-4D67-8E8E-3E790EB00DD3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:pentium_gold_g5400t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4EB78854-1E03-48F3-BC86-B0934641B47E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:pentium_gold_g5400_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D12EFB3F-E57A-49AB-83E4-48BFA59D3704\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:pentium_gold_g5400:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5529CD96-F41E-4DD5-A9BE-6BDF84F9A9F7\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:pentium_gold_4425y_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C2F82796-786F-4EB5-9138-29E2668586F7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:pentium_gold_4425y:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C04332C1-9652-44ED-BD97-5A6AD0A4E6B5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:pentium_gold_4417u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF481FDB-1FF5-4D0C-A537-E22ADAF7913D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:pentium_gold_4417u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"421F0AF2-5F41-4F0C-A909-D76D72AB5FCA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:pentium_gold_4415u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1C1237FF-E3A8-4491-9FBE-995820495490\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:pentium_gold_4415u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F76BE235-C991-43BB-B145-239D95084BC8\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:pentium_gold_4415y_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B5DE990B-B3E8-4037-8502-8C72575A9BB0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:pentium_gold_4415y:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6748F85C-A99A-4380-B01A-A51DBD43AED9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:pentium_gold_4410y_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"28381986-24F5-48B7-AADC-886D040D037F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:pentium_gold_4410y:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6B485AC9-B986-4100-90CC-E4BC9B1AAFD1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:celeron_g4950_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7512275F-3577-430B-9377-44EA37FBA308\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:celeron_g4950:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"22828766-08EF-430F-A0F0-F59E772E38B2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:celeron_g4932e_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7DF7727B-7F22-4B85-87A9-EBBBC783C140\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:celeron_g4932e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"37662BCE-5344-4938-8AE7-2025D9F4D4AA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:celeron_g4930t_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB2E14AD-3B48-40EF-B07C-675445A73AB0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:celeron_g4930t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B130F009-C77E-496D-9A6C-1140559A54FE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:celeron_g4930e_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D70B1E1B-B170-4C29-AC1D-7A51A0FBC33D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:celeron_g4930e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CCE7313A-56E8-4041-9CF9-9BBA430CD9A8\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:celeron_g4930_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE8499B5-2CE1-4E17-AD0D-48EBCC464251\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:celeron_g4930:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA2A4A2A-CB99-4AEC-B0EB-11763E6C0E0F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:celeron_g4920_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1EB95463-05B4-4BCD-894E-3EFA944CB418\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:celeron_g4920:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"26E9CDAC-8C63-4F9A-B171-9E5E11E5313E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:celeron_g4900t_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"52ED8318-017D-4941-8D5C-B6CBB89B0B4B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:celeron_g4900t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2129E439-63C1-4CBF-B39D-2941621AB454\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:celeron_g4900_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B0288C6-F7DD-4D0F-9C3E-0C0835FD5ED3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:celeron_g4900:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B801EF4-980C-40EF-84A8-4AA2D29CFB06\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:celeron_g3950_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C5CFD725-7C31-4020-B5ED-C47C310717BB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:celeron_g3950:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC3B9962-455F-4215-9E0D-4AE380C36DDB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:celeron_g3930te_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"30C55884-A90F-4FE7-B4C9-772ECD1606F3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:celeron_g3930te:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B9278297-5E4B-40D0-8782-E5AE87E43B7B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:celeron_g3930t_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"891BC1FA-F2D3-40DF-B9C2-760DBA21BFA6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:celeron_g3930t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E5EF6E96-034B-47B0-8B88-5D5EC9B995A5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:celeron_g3930e_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E197F6CD-BB7F-4053-A92C-63D1C0ECB55B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:celeron_g3930e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"226CBC16-EC2A-4498-ADB3-655A0E9CF396\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:celeron_g3930_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"50F2F50E-8D52-41B2-A43A-369D213D826A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:celeron_g3930:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"83A9423B-08A0-4721-8868-7E7E3E0ABA4B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:celeron_g3920_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E3BBD0DF-DC34-40A9-B0B3-4A00847AFA2E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:celeron_g3920:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"77D7291F-752E-409F-82BE-6060BA5E2559\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:celeron_g3902e_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C49ECFD-BEE9-4AA1-9341-B29CBB0CA5EE\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:celeron_g3902e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"11A64939-F09B-4FEC-8F1D-FAC34D8E14BC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:celeron_g3900te_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"74B99121-D844-44E0-99E7-9C4C5CACB138\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:celeron_g3900te:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"25BC4638-06F6-41C9-BF0F-74037F24CBEF\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:celeron_g3900e_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F6DA909-971C-437D-BA18-46C2D8E37E99\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:celeron_g3900e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C02B3D0E-93A7-4DCB-8CE5-7EEEA58FFEF6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:celeron_g3900t_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F055D55-7881-4416-AB20-217490A3EB5E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:celeron_g3900t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C5723C9D-E59D-4FA3-893F-D79E726025C3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:celeron_g3900_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C609DC3B-BCC1-48D8-8BDA-5F2C441A96A0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:celeron_g3900:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"25847980-2D7B-4D4B-B0F2-C2CAB648182C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:celeron_g1850_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"70AEAA58-AAF4-4051-B32F-EDE7FF0D94CE\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:celeron_g1850:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"95826FC7-9E92-4C6A-8F16-9D20B8E41F75\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:celeron_g1840t_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A4E4A59E-E56E-481B-A4FC-AA945FD385CF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:celeron_g1840t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AAD76063-D9C2-4F41-B7D3-29A32678B527\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:celeron_g1840_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"26096550-52F7-47F8-AB60-0BAD6D027A27\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:celeron_g1840:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B72870A6-E156-46AE-A5C4-B9B8F10C147D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:celeron_g1830_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEBF308D-57AD-4496-BEB6-2BF8846FD073\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:celeron_g1830:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"95101653-A2BF-47F5-A209-097CA98A91F2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:celeron_g1820te_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE4B0328-4EF4-49AC-88C3-3670FC93742B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:celeron_g1820te:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ABDC4948-B063-4327-890A-C8D9F955C7B9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:celeron_g1820t_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C2A1AAD6-A1D5-4E02-AE56-BAD08E08AFD1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:celeron_g1820t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B950F6FC-2848-45B7-9C28-B0DF46BC442B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:celeron_g1630_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"36E5FDDD-7636-4EFC-BF8B-8547F98384CE\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:celeron_g1630:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"06FFA194-E200-4F4D-8E66-60D0134184E2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:celeron_g1820_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"32DADA64-13AA-45F6-92C5-70E9D296F976\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:celeron_g1820:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"12FD8D3B-0FC0-4E8A-9476-3092BAE9F15E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:celeron_g1620t_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE48A4DB-9B6E-4C3F-9AE7-9307A4051314\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:celeron_g1620t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0E4AC5E9-94DB-4970-BE29-747503AE81E4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:celeron_g1620_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EEDDD723-6AE4-4A7D-B328-8AAB2984E0EE\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:celeron_g1620:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B67D44E3-F8E1-4EB9-8D91-5777DC97D497\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:celeron_g1610t_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3ED6B2FB-F92C-477A-B339-40D6BDE7B04B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:celeron_g1610t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FADF19F8-54BB-4BF4-BF1C-515EBBEE2060\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:celeron_g1610_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9B09B21C-23FC-4205-80E3-BC929EB037FA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:celeron_g1610:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4003B029-36AE-47CD-BFB1-1F06DFEBA0C6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_platinum_9282_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C1D43F33-6733-49BE-87B2-14936230E5C0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_9282:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"89421EC5-52E5-441F-AD3B-5C5E964F836D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_platinum_9242_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3BFDF125-D5BD-40A6-8958-68C8F93C913F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_9242:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6DF8D8C4-29EA-4D09-87AB-A570403BA0E6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_platinum_9222_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E589B7B4-46E1-4426-A392-561AA0557D7D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_9222:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0A7019D4-58E0-4B73-93B8-D3B0E86BF2D4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_platinum_9221_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9CC474D2-B800-4EA0-A06F-FF69E52FC438\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_9221:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DBC93757-5FD7-403D-B5ED-CC8793002352\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_platinum_8280m_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E2C6506-97AA-4E82-9678-E98C58D3F4CB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8280m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C950976-266D-4258-86CB-8987C093331F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_platinum_8280l_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C3829529-3EC5-4681-8902-AA581D9C2DDC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8280l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E0CAB607-87B2-49F4-9FAB-662D5EA3D11C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_platinum_8280_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC7F4E55-3AA3-40EC-8686-719F8474B3B1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8280:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0951DB50-AC8E-4C17-A2A9-DD4A198C4DD2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_platinum_8276m_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"71D9A1F6-A5BF-4456-9908-A767CF2FF866\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8276m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"11562A6B-26CD-40A6-9184-7CA128E1F017\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_platinum_8276l_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE0F5374-5A1A-4F56-BE42-E1D0F79ADD52\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8276l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB3C00A0-C28A-46EB-853D-DAE3819399D9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_platinum_8276_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C35F1845-F913-43E2-AA05-F64FD0A6A736\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8276:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"185E8FBC-9EE9-472E-867B-0B0DEEECA13E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_platinum_8270_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0FC1E633-52B0-48EC-B8C4-3EA396F4CEAC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8270:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2C24951-B3FA-48E6-AFAC-6CA0D2348230\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_platinum_8268_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8F5D6779-B826-418F-812B-D1AD926E2D7F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8268:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"74ED727D-B1A9-4F4B-92C7-3F00F3A80013\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_platinum_8260y_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"91BA9357-FDCE-4FE2-ACC1-065E6C0C6994\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8260y:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC4A437C-6C00-4729-91CC-D27EB3542633\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_platinum_8260m_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"10B8978A-6621-41F4-AEAC-27B3FC5029B7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8260m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3219701A-8CF0-4307-A957-1E31F6A5C195\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_platinum_8260l_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F7F2F3C4-28A2-4C3B-9136-B222797FCB0D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8260l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"955420F9-3A3F-40E0-9940-DD43C5C78D62\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_platinum_8260_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5D076A4C-EBFF-47CD-898C-E3D8595897DC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8260:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"28B167F1-63FA-4C86-84AB-836ABF84E6E3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_platinum_8256_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"433CEBA3-2B72-404D-B561-957CEAC0A5B6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8256:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"54AF128B-9984-4C91-B7F6-968DE376C3BE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_platinum_8253_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"823AD74E-785B-40C9-BA27-F988F5006263\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum_8253:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"94A6DA7A-7C97-40E1-B31A-B92BB658C429\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_6262v_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA876028-4021-4B58-94C2-89CEBD9CBA23\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6262v:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B704835-1250-44E1-923C-5DE2F4DD25D0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_6254_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B7AF2819-C873-41A9-94F5-B8B34EBC9633\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6254:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"96E2764D-7D6A-4CE0-A628-FFE966A6462F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_6252n_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9FC9FFD-4D81-431D-BAA9-C112CD0BA3D7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6252n:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3BA58EFB-7672-4902-ABC1-65217AA617AD\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_6252_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"761A4FF6-04FA-4DF4-AD51-58DA0211BA1C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6252:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1BAE2B11-B0F5-415F-BD6B-E285EF9C9095\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_6248_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"24EEECD1-018A-47FB-8CDA-6786864994B8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6248:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CAD0B5C3-633D-4F2A-8D56-8FA83F1B581C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_6246_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BAC462EF-264D-4365-A965-0BCE9C687496\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6246:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E8C1742C-96CC-4BCA-928E-D6B53ED2DB0E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_6244_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"67B0B7EA-DBC1-4E02-A33E-7180FAB684F6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6244:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF72F37A-2F28-40E6-A84B-0E1DF63B1812\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_6242_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"262ED175-6056-4FD6-840C-F4523A96677D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6242:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C8292CC-DACB-489A-BCB2-73DC2C6F944C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_6240y_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19C76503-5F56-4C2B-8973-A3F94B1345DF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6240y_:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD16D252-4D55-4DE2-947D-00778A7D491C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_6240m_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB3943BF-B43A-4077-B75D-EBE27C3D6A17\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6240m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E231B13-FC1B-41E3-A47D-4F0FC4F37B33\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_6240l_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E317001-0126-4B64-85AE-04AEC9954085\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6240l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"02BCB7D2-4B68-4FF8-BFC9-06C39A708C62\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_6240_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"215608D2-0F48-4E32-963A-2DFE74A84557\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6240:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB72D13B-5880-4CB2-8E80-CB6A39B5A302\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_6238t_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B880E026-665A-4519-87D4-4DCA08977033\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6238t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0E21977E-7085-46C5-8E89-F952C2EBCE04\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_6238m_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D544957-C9D8-4AC1-A7DE-7E6FE000E2E3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6238m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"352D121E-69C0-470E-AE02-8413DCBE1DC1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_6238l_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"69C5FB6D-C652-4743-84F0-D7BB55F2733F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6238l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF7B4C84-1258-4F2F-B8A3-55353B3D13BA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_6238_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B51741B-1976-4998-B5DC-5AE1D62F6864\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6238:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3CD3E45C-1943-42BA-9F6D-EA64D67BF954\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_6234_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19031868-9913-4170-9F69-C5582CC4C2E0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6234:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F83F8602-6679-4B3C-BBDD-3BDB2B317F70\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_6230t_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7EF270B2-06F6-4726-B01D-867A8F584810\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6230t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0FD24563-9157-4DE1-95ED-D4E3E879219E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_6230n_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C0BF2AEF-5988-416A-B8C3-CB0919562B2B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6230n:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2BBB5A97-EA4F-454C-819C-DE1CE7018E7A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_6230_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C0E2164-CFCA-4236-A6AD-74484E387639\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6230:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EED0D492-ADAB-41ED-A283-024D3CED441F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_6226_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A19FF1B1-F380-4CE7-8C09-DEFF7ED86571\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6226:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"831A7D63-4638-480C-94CB-ED06613BA75C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_6222v_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"938EF635-E09B-448B-A446-48890A209878\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_6222v:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"178345A5-9A38-4C8F-B3BB-430276FA4998\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_5222_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8AEC407A-5450-468F-B0CB-3028FF92468F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_5222:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D93CC498-F558-4C2F-9E14-7897060CA9FE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_5220t_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8141C47E-4F0B-498E-8B18-264E90448C3B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_5220t_:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0501346A-62E2-4E7D-89BB-7DB22FD3F44D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_5220s_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"728C0EE8-D4D9-4426-9709-46505AF901D3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_5220s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"067C65E5-5392-4DAF-A6BD-640D78C19CE1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_5220_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7D162F8D-5836-4B52-A98B-EFB0289C1346\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_5220:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6ACF161-472E-4088-85C2-5940C9C88D45\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_5218t_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2411CF40-9A5F-4138-9111-84087A30050F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_5218t_:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8649961-BC91-41C7-B082-40A2DF245F24\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_5218n_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F42D02F2-46A7-4359-94BC-7AE15EDE692D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_5218n:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF8D06DC-6B8A-4B7B-BB3E-778D432CFEF1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_5218b_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"685FCDB3-F3FF-49C0-A26D-BFC081F2B78D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_5218b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C375A9D-C7CE-49A6-B08D-9CAB22E16D32\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_5218_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1CE780B7-B5C7-4475-87E8-DCD5AD3CF3DE\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_5218:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C8F7F6B-847A-479D-B6B1-BBA331D06DE0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_5217_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"28A6461C-C6F0-4A65-A86E-4420B1ACE6DF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_5217:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9CA49CF7-C6BE-4337-A0A8-A603D8955EE9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_5215m_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"641570F3-6C32-40C6-8486-626FD4899B8C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_5215m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ADE3148E-2DCE-4CA9-ABE3-43779D06DD42\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_5215l_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B5AB911F-8825-4C97-9454-4F5DC5396E2A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_5215l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"070C20AB-66F2-4EE2-8134-5E40DBB9B9E6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_gold_5215_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"54686C14-25E6-4B4B-8ABA-FB115F6DDC3D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_gold_5215:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8DA109ED-BC4D-4F70-81B2-3CE0E2B3D9DA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_silver_4216_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ECEABF4C-68FE-4F14-B19B-0021312264E8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_silver_4216:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4F50C03E-CBEB-4738-BDF4-DC296CE9DFA7\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_silver_4215_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4DD96F46-FB80-4E43-802B-2918F8650E3B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_silver_4215:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D356D196-8AB0-4387-A644-C5E68174A60C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_silver_4214y_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F0E4832-F8E5-4718-9358-C2E12049B771\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_silver_4214y:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7305838B-84CA-4BB8-A350-B2D2844F1041\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_silver_4214_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE33A02E-5A74-4F9B-BEBE-657F311C0387\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_silver_4214:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E1B4F7FE-61A3-417A-BAA9-E686A76F3A94\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_silver_4210_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4784CBB2-276A-4742-92F6-0B5A35818B7B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_silver_4210:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"21A62CB9-FB01-45CB-9E10-E72D87C0E1F1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_silver_4209t_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"644C5C4C-4257-4B9F-BE0C-01271B7BE6BD\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_silver_4209t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EBEFB056-0872-434B-9630-28A1AAEAD470\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_silver_4208_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E4E951A-EFE0-4976-BB67-B3996594C8D9\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_silver_4208:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA909754-B60A-4B30-AF42-4C8734E155AF\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_bronze_3204_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A1F371BC-529E-4787-ABE6-BE7BD937B04F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_bronze_3204:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E687CADE-6E49-4284-BD41-6CA2FDD846FC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e7-8890_v4_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FCC66FCE-6577-4E79-81D3-C718D1B343E7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e7-8890_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD8390A9-863C-4687-BEDA-64768191E7C9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e7-8893_v4_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"04B80E35-9D85-4844-8573-37F292FAE300\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e7-8893_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D5AB45CA-5D82-4204-8274-7B0CD0B5C852\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e7-8880_v4_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DBD6D487-A6AA-4752-9CC4-07065F42F043\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e7-8880_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D830FF1B-05A2-47C3-9AA0-06F75F0CF01C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e7-4830_v4_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0CF81E50-8089-4C58-B532-66D482D05E52\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e7-4830_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"97AA9A3F-9ADA-46B6-8CEE-A46564953699\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e7-8860_v4_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F6DBE50-7BCF-4A81-88CE-113716482740\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e7-8860_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D5B57D26-455B-48D4-BB27-6A8D84C8D5D9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e7-4809_v4_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7D9C8551-D17B-49F4-A3BD-DD393729EA74\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e7-4809_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"376E792F-A029-40B1-83B6-A0C2F40F4B1C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e7-8870_v4_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"240D24BD-A84A-4562-B850-56EB9A47507F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e7-8870_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3D3199C4-C5BA-4FC8-9539-21A6C3C85336\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e7-4820_v4_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9FE58D0-969D-41E1-802E-39672064AE26\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e7-4820_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7FECF753-354D-40EF-8063-FF93C7FA8B86\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e7-8891_v4_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FAF48C5B-5291-413F-96BB-40A9C2558832\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e7-8891_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"113A641C-D291-4BE5-9643-21BA1FB04101\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e7-8867_v4_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"867D3D4D-D8A4-45C5-9F06-B51989C7151E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e7-8867_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E9C950AF-E109-41ED-8A3D-F7151216F01F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e7-4850_v4_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5FD6BE85-75C2-4C74-BF7C-9B9E34D4BABB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e7-4850_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D355937-EE3A-4FE0-B3CB-5B7E19ADE4FF\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e7-8855_v4_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3ED610EE-838C-488F-BF85-2C122CFD4012\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e7-8855_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AA4812F6-8120-4624-BAF6-2AFF8A317302\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e7-8860_v3_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC2AAC0D-6F45-4E9E-B589-3C12CB891116\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e7-8860_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3866B454-9B4B-4A9F-88ED-F25C57417856\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e7-8867_v3_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6827B430-8BD8-4CBA-9EDD-49B6277C503A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e7-8867_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"269D1DED-2FEC-4C01-9D54-2437A0BFA44E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e7-8870_v3_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E96C09EF-E268-4814-A8A8-A9ABB80D7B71\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e7-8870_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"65131025-AA2C-4672-8E17-1EE403682154\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e7-8880_v3_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B7EE34F2-2CD1-45C2-AE5B-FD767C522C70\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e7-8880_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5095146-CBD7-4236-B5AF-6CACC8A81B52\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e7-8880l_v3_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2BD071C8-30BB-4881-8CCF-3BD3F4554291\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e7-8880l_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"003F0372-C912-44C2-AD68-323F91D2C7CB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e7-4809_v3_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"97B0E3F6-925B-4FBA-BC8C-CD908541A8E6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e7-4809_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"700F9DF6-CC2E-4A8D-BB6D-EF9CDA1498E8\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e7-8890_v3_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E079CED0-E785-454F-9062-9D9AFA52B68D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e7-8890_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DAF9BFF4-5F9E-4831-A77A-B53644782A87\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e7-4820_v3_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"680D9B99-C069-4BB2-842B-7EF41ADAF7FE\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e7-4820_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"49B27122-6798-4BC2-AF57-14CBFE9217A9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e7-8891_v3_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F4670684-3336-4862-ACD3-266243008E9E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e7-8891_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EA50F31B-C99B-43F5-95FB-098A21E1DBA4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e7-4830_v3_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7378F1BF-7E2A-45A2-B4C5-FD7D05AA62F6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e7-4830_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4E081E99-0546-403D-9F1E-5CC8D760BB4B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e7-4850_v3_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"736A6065-847D-4891-B108-A3BB42AEC2E7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e7-4850_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD126CAE-5690-4AA1-B92E-68AC8B86E043\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e7-8893_v3_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1DEB6CB7-F573-4565-9C09-7B70D28E303F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e7-8893_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"925D8160-5941-4F2F-998B-A461ED896171\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e7-4809_v2_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA0A0D87-E4C9-48DE-A598-40938A5DD4E8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e7-4809_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7027185E-350A-4EFD-AB43-B15BD845EAB8\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e7-8880l_v2_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"92B6419E-E19F-4A5D-B942-7B3D67288E6E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e7-8880l_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA201E96-2191-4954-BE93-0F672CFD1F02\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e7-8880_v2_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"053CDA38-15B2-4F34-9EB3-F23E1EBEDF3F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e7-8880_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC5C4ECB-F8A1-4FEA-BF2A-78580EBE356D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e7-4820_v2_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"62E91A8F-2AD4-4D02-9C86-818375F3E5B3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e7-4820_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E42B8D5E-AE0C-4384-80A9-4CCD9C79E514\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e7-8890_v2_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B12B6A2F-3F53-4409-91C9-39569A0EB0F9\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e7-8890_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"43ED17B5-529D-470E-B783-6DFD677D88B7\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e7-8891_v2_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F3224717-024B-4E8B-8F91-3790EB8377C4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e7-8891_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F4998CB-CA47-4CB4-8969-551121B981FC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e7-2850_v2_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A46F320-D186-4C1C-9920-5B849FDA89C0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e7-2850_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B387A4A1-029D-4180-B461-768809298A2D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e7-4830_v2_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D55B8E04-C1CA-44C8-885A-B5AD61C7CE36\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e7-4830_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F67CF4A-5F75-4597-B5D5-D6E534FD1F71\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e7-8893_v2_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"74C471D3-6343-4EBD-95A1-5258FDFCBA1A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e7-8893_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"41E63869-3A70-463D-B2D9-BDC27E5EB624\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e7-2870_v2_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6939D8D6-7A22-4E73-908D-5D4A3F6611F5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e7-2870_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"77CBB587-ABA9-4346-A267-350A6309F59D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e7-4850_v2_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CCF67619-A64F-4AFA-8445-6F8AC572C653\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e7-4850_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"736CB2A4-3354-47FD-94EB-4F5B0D11051A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e7-2880_v2_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"442492D3-04A8-4659-8F64-2F5844DB9871\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e7-2880_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3195A370-17C8-43D7-B560-D71C76C9066C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e7-2890_v2_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"93E55EFE-6D9B-464D-8162-89F76AA79C7A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e7-2890_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7EB82874-A214-43A2-AB8A-ADA79DBCDB0A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e7-4860_v2_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C4B546B1-F3BA-4EDE-AFA2-6C344BB554DF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e7-4860_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2BC55215-ADB7-4058-9BAF-257D801A9980\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e7-4870_v2_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC2660A9-C732-4805-987A-DEFAF8721964\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e7-4870_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"14122E65-8856-42FA-A19B-360373B0DBF0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e7-4890_v2_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"37A1E096-D3C4-4464-93D2-26AA2FC28A1D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e7-4890_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A46EA87-3A3D-4D8B-BBFE-B04DBB30B798\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e7-8850_v2_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"697E1FD5-6988-4A99-A94A-99103C713822\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e7-8850_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D1F3D12-5D2C-4FE7-9751-F430BFA0AA7D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e7-8857_v2_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"49A66CF2-DF22-409A-B41F-421D2589C431\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e7-8857_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE2971F8-9ED5-47EC-A519-08A6CE0F0EA5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e7-8870_v2_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B37A5BAD-08C9-4A68-BBBE-BC5BF7C9C883\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e7-8870_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C0140D8-60C5-4575-9522-47A4905F2996\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e7-4880_v2_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2BE6206D-499C-4B65-9506-7E3AB9CDD7AA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e7-4880_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F7D9F37-80E3-43E0-B5BE-220033C9D6BC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e7-8895_v2_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A6AA66A-FAE3-4FC9-8906-35271B08733D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e7-8895_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CF842E7E-780F-48F1-AC70-641B3AF12A79\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-2699a_v4_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E5B053DE-AF7F-4A0F-A78D-72AE6E144761\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-2699a_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"124DF9B2-F703-42BF-9737-1777A51D05D9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-4627_v4_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"84877243-152D-4E02-A18E-850BE2755CF2\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-4627_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8C3809F-F701-4969-A27A-294D0ACB9CF7\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-4610a_v4_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0729DA0B-88B3-4A7F-8F43-63BED1271071\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-4610a_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB9443C5-0EF3-473A-9674-7FE3DD01601C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-4620_v4_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"942E5B7A-FC4E-4645-9D66-44BD3D46A1F7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-4620_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE8104B9-EA92-4AFB-829A-35FDF9E1FE4F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-4628l_v4_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"897A798F-BBA4-4412-849E-E8055C310338\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-4628l_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C96C9EBB-4585-425D-81CC-9A2B0C1CF9BE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-4660_v4_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1395D579-1812-4F1B-A3F1-B38CDA7ADBD8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-4660_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"160A9F6E-18A6-4181-A63C-5F8A13985869\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-4640_v4_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EECBA2DA-44F9-4393-BD50-A13AFFC4CA06\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-4640_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A55CAE1-0334-469F-9230-35D607A42DA3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-4669_v4_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3E541F97-BE7B-433A-A073-F0DC2551D95D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-4669_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EC478F61-883E-46BB-A4F9-5833A6DDE6C3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-4667_v4_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"99160243-440E-44F5-A36C-C9507823E9AF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-4667_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C1420874-49D0-4E69-BD67-26E6C9FC873E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-4655_v4_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"23278D55-861D-4BED-A378-E5AC28D64E26\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-4655_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC5D11E3-FEDE-4453-B89D-78505BD03326\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-4650_v4_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2AACF7B5-E2B4-4F05-827E-7DC74FC0BFD3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-4650_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD7C804C-BFAA-4886-9621-C255F2F867B5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-1660_v4_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"77FEA398-7001-4FF3-89F5-FE6709FDDD76\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-1660_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19A506EE-01BE-41E1-BDC9-67CA676B8638\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-1630_v4_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C2B22D1E-6EDE-4E13-8B52-E532A548B522\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-1630_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB2A5EA2-10A9-4C53-BD0E-1026D5F51B6E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-1620_v4_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"12142C64-3833-4422-AF21-4C6D3489B2FD\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-1620_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4FF717C4-6E91-4A86-87E4-D97F70E0936E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-1680_v4_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"768DA6C1-6491-4197-94C9-9B9EFC46B1D7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-1680_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BE60C16D-B9F7-4EAA-B240-92202B11F6A6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-1650_v4_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"60BF382C-DF60-492F-B119-8659929079F7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-1650_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E0B83717-B20B-4EF9-9750-5C628DE8DA6C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-2687w_v4_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"87B2CBF6-53F4-4603-B96A-795E06F903E0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-2687w_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"953C8F85-28B4-4458-A4F0-2D55336FE34C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-2695_v4_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"628DC30A-538E-4A38-9AB9-6C6EF1224E46\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-2695_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"29A3A2F8-3908-4083-AB72-301A825FBD1A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-2690_v4_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"568E0211-9975-4C64-AE69-22BF38145889\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-2690_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD63CDF0-0EF3-4370-9F9D-FE3DF07E39AC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-2699_v4_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C1AC5A5-F7B7-4FD1-B598-A8D074690DDB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-2699_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C830F688-BCE6-4A86-9C58-DB34505EC366\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-2650l_v4_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"47EE4C7B-FFBA-4BC2-A0B0-BD7DD28105F0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-2650l_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BE67577F-3B63-4995-9E51-19647F4EBB3A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-2658_v4_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA569BAD-9592-4D0F-9522-CB1C05D830C5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-2658_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A081C35C-0D19-4025-AFDE-C3E4C4462124\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-2698_v4_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4209A314-97AE-467E-B9A7-21CD5FE531C3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-2698_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D0DAE24C-19F7-46CF-AC3F-E38066FCE0CC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-2660_v4_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D04C6752-81A8-4828-8865-8977C0343635\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-2660_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B7571BE1-C7C8-4FA4-81B3-9F0F7BED5840\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-2680_v4_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"13B2A639-66B6-473F-A505-4ACC70D283D8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-2680_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EAC3D549-9EF3-436A-B672-693CB1D5C14B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-2697_v4_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8FFFA1F0-B260-4534-893A-D85546D198BD\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-2697_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9203112A-2E5C-4EF5-B34F-74E66838BE3E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-2683_v4_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8470B7D3-384E-4E14-9E22-EF867E99B39C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-2683_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA406873-E126-402A-BBD8-46BC22AC4756\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-2628l_v4_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"89023F97-9135-434E-A078-D1337401634C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-2628l_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F826234A-2C49-4E02-B586-5CD038A90799\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-2650_v4_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"461C01B3-31DE-49ED-8DEB-C5A4F75276B8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-2650_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A738A2D0-FF0B-4E75-90F7-E0E39D937C5E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-2697a_v4_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3CAA3389-2F0A-4CDB-9A9F-AB11314192DC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-2697a_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5E995666-F7F9-42AB-83DA-AE4202B59A90\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-2648l_v4_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0EACDE0A-40CC-43F4-B636-44AEE2F7DB71\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-2648l_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"963AD924-07BB-4E68-B817-AC2A82A5C7C4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-2620_v4_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D32C775C-5470-4C35-BC9C-5660B71354F6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-2620_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"396B0F7F-3BF1-49BF-9304-285049FBA318\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-2630l_v4_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD73511B-5C0F-4ABE-B9AB-96756CF135CB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-2630l_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3833A360-9D9E-4CFE-9CAC-DC9F0CDA0C52\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-2608l_v4_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7602F46C-4BC8-4826-8C2A-CAC75CF588C6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-2608l_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"284FF890-627A-4FAC-A8F4-A9B44E3DA397\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-2667_v4_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D941351-4BEC-40A0-9B17-6D5544B9C97E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-2667_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"72781DBF-E6D4-4BDB-BD6E-9B86EB0224A6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-2643_v4_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1089B3DC-934A-4A76-92CA-CACF68DDDDB3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-2643_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"209DE5F9-D191-4720-A53E-1F39BC6567DC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-2623_v4_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB4F7078-8C0C-4690-AD8B-36EC49B6145F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-2623_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A28FD72F-F1CF-4076-9523-E355C20CEED8\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-2609_v4_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B9B14CB7-E892-400E-B795-60207B554EAC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-2609_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E0F4E301-BF06-44E1-8F15-37FF5B31CB19\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-2630_v4_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC8C5BBE-2911-4F56-B48F-B076CD3BF748\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-2630_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EC204334-6964-4DCA-A62B-BB71FFA5D4EA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-2618l_v4_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4328D1DB-7F30-4CA9-ACA9-460E14FE20D4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-2618l_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"522F7CBA-7480-43D8-A31A-B52872600ED2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-2637_v4_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FFED5267-3BA8-4B62-9F18-4ACEE09BF9DD\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-2637_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6A85ED1D-D2B1-46FB-90A4-0B47EB1EED8E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-2603_v4_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D45C3021-428A-470F-9D38-242E2BC03CA3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-2603_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB17C45E-9401-4A21-B537-0432744403AC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-2640_v4_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"525FC69B-A75F-48CD-A46E-1872E8A138D4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-2640_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E1EECC4-C82D-4871-A554-61A15A496E90\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-4640_v3_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A052B17F-069C-422C-A9E0-F33AC4E57C93\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-4640_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"11621F63-45AF-470B-B3DB-75D5DAB53985\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-4650_v3_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"04560FE6-7E70-4DEC-B9BC-3F5511A2AB87\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-4650_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8AD51E71-3AC1-4130-8FCC-847A42E54DE8\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-4655_v3_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C7DBD8E-137B-43E7-974B-157B232AF3F9\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-4655_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B118810-DB63-4CBE-870E-BCDEE722F446\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-4660_v3_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"69FE58FD-97CB-4EB9-AE29-9E2A1C261D81\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-4660_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9AAD6DC7-50F1-4F37-AC8F-39DE1ABED619\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-4667_v3_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC283CEE-2F7D-4FD0-9906-5441798E4CB7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-4667_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9FF54142-6EBD-4460-9BA0-6D530FFC9997\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-4669_v3_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD4EC710-2117-4222-A2DB-277617AD3B6F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-4669_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E2085B85-EE5E-4292-AD0B-9B83F9884EE0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-4610_v3_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"233A8074-2FB2-4C0D-8AB4-F1D6C575B131\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-4610_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"83311344-22A3-4F0A-B9C5-79DDD6D0575E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-4620_v3_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"18BE9398-4DF7-424B-82E0-C9A9FEFBC01D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-4620_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D2397DC1-2F80-4C14-B853-5866541C1599\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-4627_v3_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C42B000-047E-4954-8D33-7892090AAD56\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-4627_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9144C66B-9838-4F13-86F0-E7CD30F1754A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-2695_v3_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"71F5C8AB-169E-448B-90F4-A5AF973CA655\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-2695_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"54F6F82C-1960-4178-9B50-B881C57ABA86\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-2697_v3_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A675E158-E9D2-4CC4-8015-4B60E9FD61E6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-2697_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"52DCEE26-2A9B-430D-9FF8-E08ECE03327F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-2698_v3_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E0ACFCD6-0029-4060-96C7-4C0CDF7E0FF0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-2698_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1D3471A8-01D0-46D6-AD28-F56D28672DDB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-2699_v3_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9AD68B01-16AD-4A3A-9244-06EF8326EAFC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-2699_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"09C896D1-EF28-422D-8215-504E6F22A4FD\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-2683_v3_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4BF2D045-4033-4223-9B78-D933DD0E0594\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-2683_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA56AFF2-32F1-4153-A89F-F86C0A2479DA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-2690_v3_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A06CBDC5-D6C5-4AA2-A837-00A0F648166C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-2690_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F64B80DD-888A-41E7-939A-FD76097B62FE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-2650_v3_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C1DB99CE-3CE6-4115-8298-A51390AA832B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-2650_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5D7C0BC0-0735-4B74-BDEF-209276A1C355\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-2660_v3_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"573A3B19-C29F-4B3E-BEBB-4F83FBA1AD0F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-2660_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"659BCA41-19B3-4C72-A4AA-05B02B02F491\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-2680_v3_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BBDBF517-436C-40CB-AD63-5C27BA0ADF04\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-2680_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"02904FD2-A03D-4332-8AC6-BA371E43D4A9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-2670_v3_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"20E7F66D-F577-405D-AB01-040D3AA654E8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-2670_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B0E8EC3-F041-4AF2-9401-A848845D691D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-1630_v3_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2E651367-23EC-496E-8D9D-2ED432CC511F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-1630_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9CF1837A-E1F1-494B-84E7-017DB5F64D6D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-1650_v3_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"44437C86-9B54-4790-93A1-EB52C3A2B2F6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-1650_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C6EB2911-50F8-4D96-83A1-BD9CC3FDDE87\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-2687w_v3_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1F79DE37-9BE6-4FB3-B22C-F737784DEB04\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-2687w_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"220D6074-7F5E-4ACC-AB83-919E6B96D29D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-2643_v3_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1DE9E706-1115-43A5-BE44-FB514A9E4AFE\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-2643_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D1FCB01-384E-48CD-B2BA-689EE3F6392F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-1660_v3_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE97A2D1-F42C-4411-863B-E5FE0A0A67B5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-1660_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B54BEBF-3663-4D87-8F9D-6BF1A355A089\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-1680_v3_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1AABCC2F-1CC0-462C-B6F5-82D12EF15977\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-1680_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5577CD1E-E032-4AC2-81A6-B90DE9B4100F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-2650l_v3_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A853EE15-03EB-47AB-B4D6-777B52FEEB35\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-2650l_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BEBA2D48-60D1-418C-8433-0159F2BBB9E4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-2620_v3_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8327D783-9F85-4093-B6C9-5FEC4FFB7646\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-2620_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DBB8DBD2-6B19-4D44-861C-1B39D8D6849A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-2623_v3_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F444FC9E-FB26-4114-8EF1-229F67C742A3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-2623_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"95D11ED7-2F2B-4035-9B16-6217CD712671\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-1620_v3_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F53BB0D7-F212-43CA-80BE-766A2AE03479\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-1620_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E6629A2-D63B-45B5-BA50-FB5A1EEA2801\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-2630_v3_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F8DE35B0-28CF-4762-AEDA-2062AB1FD5F3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-2630_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"397C37D9-C510-43F4-A71D-464EC1A30981\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-2630l_v3_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C77308C-FFB3-4ECA-9C35-DAD229493BE5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-2630l_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"672563CA-755C-4FBE-AD8C-D2347BCA94A0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-2637_v3_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"79BC4A4F-0BC8-40CB-B6EA-5D61D5A4350A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-2637_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F6C74009-8116-4BB4-BFA8-F76C2462DA07\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-2640_v3_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"89BBC9D4-C17C-472B-932B-9A537A12D268\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-2640_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AAD95EF4-3CE6-44B7-800D-DF6653EE1EA9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-2603_v3_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"090551FD-DEDC-45AC-B4D4-B80CD1A6964E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-2603_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EC006C18-852A-4539-8D2B-98F4A28432F1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-2667_v3_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3E50D27E-83AB-476A-AEC3-25C64AAE49A2\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-2667_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A128BADC-97D1-4781-BDA2-31F5655EE91A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-4640_v2_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"182E48F9-890A-4280-B389-65544E97B3D7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-4640_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA0D99A2-2E71-46AE-B242-ED7C148A9F0D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-4650_v2_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"25408A87-8D85-4E50-882A-20E0C631EA89\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-4650_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"74C3477A-2E20-4A63-908A-0FFA327124C1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-4657l_v2_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C684485-063C-4F65-8030-C413532C3076\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-4657l_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F7E29E4D-5FB6-41E7-9D12-163A45801966\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-4607_v2_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD753924-2652-41E1-BD12-567D3231D1D5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-4607_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"516686D3-6A43-457E-AF17-3BDCEED3E3AC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-4610_v2_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6695685-EBA5-44D3-A570-D2697B83F1B8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-4610_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"41C97868-53C3-4D87-AB78-8DB48B5E254B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-4620_v2_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"520AF867-E1AA-409D-B276-587E06A40CFE\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-4620_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C451DE46-2CF5-48EF-8A08-8266F5A61C40\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-4657l_v2_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C684485-063C-4F65-8030-C413532C3076\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-4657l_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F7E29E4D-5FB6-41E7-9D12-163A45801966\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-4627_v2_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A4C866E-7E30-4BBC-B6A9-83AE0ADA8E50\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-4627_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B43A7F44-115A-4236-97F2-77DBBC6B0217\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-4603_v2_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A787B375-99BD-43A4-AC29-468914C997B4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-4603_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"281AC544-ED68-4152-B9AB-8F4EF33FD276\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-2420_v2_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE8A4467-704E-4FD3-A762-D067E2AEA1B9\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-2420_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8174E7CD-0D66-4C89-A673-44B10ED9A70E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-2440_v2_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FBF7A852-B758-4F3F-B008-3F3C4388AF30\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-2440_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FDD77B31-3CFE-45F7-BC7A-EA03301F4D66\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-2403_v2_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"22B318F0-FFCD-4B53-9964-8E4981B95EB3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-2403_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC101CB6-65EC-431A-9133-9D1981C460DF\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-2430_v2_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"161D039A-CB25-400C-BA82-5E4BFF0BCA46\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-2430_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"85238D83-94C7-4384-8C4C-9176591BA237\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-2450_v2_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C4171A7-9974-4D5E-A2EB-03B06B0866A4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-2450_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A632B747-3B71-461C-9DD7-6538F3FEC2B4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-2430l_v2_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"87E0EF5B-E8D1-4A1E-BBDE-800D64E4A821\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-2430l_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0FAE8BD8-66AF-4942-B390-FB59E2A9B8BD\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-2450l_v2_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BBC076CF-59CC-453D-AB43-1C1B9C28E474\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-2450l_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4BDC7E84-F495-49FB-98E2-BBC0832000E4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-2470_v2_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"69D674B9-9DB0-47D0-8D49-84A36E59126A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-2470_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3693FF48-DA07-4670-88E0-050E85B821D5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-2407_v2_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7738DD92-8A95-4A95-B454-EF499962B6B3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-2407_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"823D8FEE-BEB5-4FBE-AB82-C058F93E988E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-2640_v2_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"888993DB-656C-471F-8999-F58CCD9BA5F3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-2640_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3987463F-F64F-439D-AA8C-8D3B46BE8E60\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-2680_v2_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2597133C-1F04-4877-8B1E-F52DF4F633FC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-2680_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"160E63F8-488E-4CD6-84D8-7DBE0FD36971\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-2690_v2_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B8B0E82-EA2C-4DA0-8736-0611CBE96E90\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-2690_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"334BC263-6CCC-4AEF-9761-D67CF90B3C9E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-2643_v2_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3211B2C8-41B7-4580-BAFE-F2381588CA85\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-2643_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD6B50D5-22D7-406F-8F26-586089EBDB68\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-2650_v2_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"20AB008E-66AA-46C7-9D81-056BD17C3B26\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-2650_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BE153EF2-559B-49E0-8E3D-1D7BCB5C461F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-2650l_v2_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B022989-08F0-4E92-B0BC-03A176FE3A45\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-2650l_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6841AB88-332D-4418-B53D-7A5251240416\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-2695_v2_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3DB98515-0DF8-4ED9-B267-77326D3C14FE\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-2695_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"676C27DE-5F07-4985-ADBB-884B73D70F42\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-2660_v2_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A905F50-A637-4EDF-842A-9B1ED386C2BC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-2660_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"739F82CF-A365-40F5-95DC-98DC227AD926\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-2667_v2_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"34D70451-86B2-40CC-B3E1-F51EE7A6C910\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-2667_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8AE6F341-B5E7-4A4A-ACB8-03849F3D4BCC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-2697_v2_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D842AF74-CFEC-4156-A92C-37A34750484B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-2697_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"30B00FC0-D8A9-4F21-99A4-4995B8569642\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-2603_v2_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8AD04416-8E36-4A75-8308-60BD3C8CEEB5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-2603_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1F8CD5FD-5A75-4EA6-810F-E595D9D80009\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-2670_v2_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A84D8758-5625-4F48-9AE9-C24979876DDD\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-2670_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"05C212EF-D43D-47C0-9A97-1CA33289E818\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-2609_v2_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"81AFF272-AE34-498C-BBDB-6D1DF5314122\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-2609_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E1B3DBF-C692-44E5-9E83-7F781075FDD5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-1620_v2_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D18C85F6-D85F-476B-B6B4-A01CAE2ECB1B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-1620_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CE91D2DD-BBA2-4800-BB9B-86C5BA6C89A5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-2687w_v2_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F2782B2-B152-4E86-905F-5C352B384030\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-2687w_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1746736B-37AC-4AB1-91B6-FF46C2141AE4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-1650_v2_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4A2DC8B0-30DE-4FB8-8C63-9ED939DD323B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-1650_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F51A2316-9CEA-4212-AF6D-032E2FDEADDC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-2620_v2_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E2EA82F-17CD-4459-92A7-EF1AC90C7B09\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-2620_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"70101486-9324-41AC-86AF-1B9A1D953308\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-1660_v2_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F7A1C868-DD04-4349-A14F-674B792B474A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-1660_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"562B8D42-F750-46AC-8EF3-8E564CAC6AFB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-2630_v2_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"922D7A51-FE0F-4CB3-94D3-DC289C13002D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-2630_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DDFD74D9-ABC9-4F7B-A022-E55C8C57BBFD\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-2630l_v2_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1BE0F10F-709F-4E6A-932A-B14205985E02\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-2630l_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE8530E0-CEC4-4BE4-BF78-DB7A51D3E819\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5-2637_v2_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"96CC7E9A-C569-4059-A00C-470540C6C651\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5-2637_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F9CDB49F-D364-4394-BE90-BA1B67722ED2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e3-1230_v6_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3214D779-E335-4141-882F-CBB3A3317CDE\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1230_v6:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"49C57129-0A27-4142-BF6E-68A558773573\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e3-1280_v6_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"049600BA-A3FE-43FE-AEBE-CA1D0CFA33F5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1280_v6:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A32F3CD6-6BA6-40E7-9580-3C1A455B3C99\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e3-1225_v6_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C3714C5-F0F4-42F4-9F88-F8C6AD2DD68A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1225_v6:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8E031BE7-87C6-4E4B-8988-020221ECAEE7\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e3-1240_v6_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"22B02BC8-A29C-48B9-B66C-2BD9C241DFD2\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1240_v6:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D5EFEF14-4ECB-45C9-8911-01FD7B115D7B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e3-1275_v6_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6185880A-E648-46C3-B14E-42DB61113C59\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1275_v6:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7BC9CEA2-C621-4DCF-B64C-5495D3208DB4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e3-1220_v6_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F9A393CA-35AB-4F8D-9A33-9693905DA445\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1220_v6:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EFD11A3F-A2D4-4B09-84D2-548F97268805\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e3-1270_v6_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"65F8523D-BA5F-4BD8-A15F-A49B12001986\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1270_v6:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F2476F2-6A8B-442F-B054-738F36613CE2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e3-1245_v6_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BAE98CB9-14D8-4297-807B-33F9B376D37B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1245_v6:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"333364EE-BF57-4217-9517-2C1B95B826CC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e3-1535m_v6_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C5111864-B660-4603-BC03-94A719C8D2EA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1535m_v6:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5FA12E60-4B0A-4723-8A02-3115494CD1DE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e3-1505m_v6_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7EE48BFF-CCB4-423D-968C-013060E447E3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1505m_v6:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"542BC61B-1EA3-4C42-BB99-C9C67EE82F7D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e3-1565l_v5_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"666DC282-15F9-4FA1-AD5F-2C75D5C0EFF6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1565l_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BCC32129-C5DC-4D26-96D5-219F5291D6F2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e3-1585l_v5_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E35FCE26-90AE-4D68-AEA3-8C0F0E9C6917\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1585l_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D3C578D9-8973-4F36-8BA4-9F4F3A8E0AE6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e3-1585_v5_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"216DE05B-001E-47FE-B35A-55319B095853\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1585_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D86C0CFB-72A3-4446-9601-2C956C9A71F4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e3-1558l_v5_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEA4F635-86BE-409A-A619-9EEA4C4B4FBA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1558l_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2CC6592D-743B-4656-B1C0-247F36ABE5CA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e3-1545m_v5_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F981A8EE-13BB-42C2-91D0-631247A03CB6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1545m_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"29CC9B92-CF59-4121-9638-F4D4521952D3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e3-1575m_v5_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D19BB027-D927-4D06-A580-6C6E3E077B7F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1575m_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"81F4426C-970C-49DB-950B-3F5ED17E682A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e3-1515m_v5_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB8F7DCA-3FA7-4943-9458-13695F529BBA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1515m_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"13B5BF22-5E95-46A4-AF05-450CFD1312C1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e3-1240l_v5_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5919FA36-0AB9-4D42-B33F-7795BD7601BA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1240l_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C8BD1F0B-7B75-4A5A-A708-BDE56D237354\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e3-1235l_v5_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F7ABA76A-91AE-4524-9013-2BF843FFB5DB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1235l_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"15DB4F8D-E42C-4119-83BD-44D6AB9319B0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e3-1280_v5_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"077BFDB3-CACE-4600-8ABE-DE079EDA8D6E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1280_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E6A99895-6A48-4A44-B0F7-7BED55C677FC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e3-1220_v5_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"030F2C9A-E9F8-4B29-857A-B6A895C54A61\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1220_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4E629CF7-A706-4DD3-B3EB-A1F9711B0372\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e3-1230_v5_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"47759461-35C3-4F77-9D96-B4929075CC17\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1230_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1CC1EDA9-6CB8-4643-AC65-76B892319879\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e3-1245_v5_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E257946A-458F-4F27-8387-9CF4DB8193FB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1245_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE01A935-4048-4578-8FBA-1D12A95654D1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e3-1270_v5_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F8925FB8-D645-4DE0-A37A-4BCAEA1EBE08\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1270_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA74EB5E-3D7D-4E5A-8D7D-AF902F8BCF8C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e3-1225_v5_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3760BA20-5E0D-460C-BDD5-6E456646D814\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1225_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E1BCDBDF-A902-43A8-94A8-13541FB8CB32\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e3-1260l_v5_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"28E61222-34B1-47AB-806F-DAAA4B41BD45\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1260l_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D45FCBB-CC03-40A8-ADCE-7AE0A7AA05A4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e3-1240_v5_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1746995D-CCA1-4858-87C5-8E2DC51FDA75\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1240_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"51E0227B-8F2B-48B3-97BC-73BA1BACEED8\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e3-1275_v5_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A49E7867-14E6-4DB4-93D8-A108996F7B75\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1275_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F2A10975-3375-4FB3-A008-56EB2ACD2737\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e3-1268l_v5_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6CE1171D-9B4E-4134-8489-F44B2912E310\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1268l_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"28D7D164-E631-4D49-B87A-0B7885148790\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e3-1505m_v5_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4ECFB4D6-CDF8-4FE7-9B9A-41935C0431AC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1505m_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"84A77114-92C8-48C4-9D12-3ACC3030D5A3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e3-1535m_v5_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B4A3CE35-5572-4355-B063-08DA49917126\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1535m_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9490F926-AD57-40F3-A523-61D67486DCB0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e3-1265l_v4_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"90C7C994-C2F3-4875-BEE3-A6D082E5DB36\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1265l_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F3FD78E-7790-4CFD-88F2-46889CBE1BF4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e3-1285l_v4_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86886117-2279-46D6-B62C-FBB85DA1319C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1285l_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"51A00AA2-7D3D-45DE-9215-19CE6122DD4A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e3-1285_v4_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B76A5B9B-CEE1-4FF0-8A1C-5A39B2026F6F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1285_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A656CC1F-943D-4B35-931C-CFBF8F3110B5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e3-1241_v3_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B17DCB1A-730D-41F0-87DC-7CCBD1509A1B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1241_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5BE15F08-0B49-486A-808F-5B647142F093\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e3-1231_v3_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B2F2A883-D83A-48AF-90E1-2FC535E6AA4E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1231_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE531899-3AB8-4540-9099-BE4A0FB75EAF\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e3-1240l_v3_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4AA49374-D24B-42E2-8189-6D8CC159B070\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1240l_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F6A3E845-3883-4034-B90B-3ABB61BBD1D0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e3-1276_v3_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"97A85E3B-BD7D-460B-B96B-8C9579399302\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1276_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5516A1EB-1A09-4248-A1E0-6438751DA0AF\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e3-1281_v3_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CB6806A1-022C-4B64-A4C1-C29BDF11C699\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1281_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8FC720A2-BD40-4FF7-ADE3-52430B263AD4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e3-1246_v3_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"18D02D79-7C51-4AF5-9A39-AF709C5EB15D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1246_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CB7C3F31-16F9-4177-B7F2-B865010A6EDB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e3-1271_v3_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D2D4B63F-A096-4FD5-88F9-2527C1B0F895\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1271_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"95F1E851-0C83-466B-A89D-03486BD90CC0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e3-1226_v3_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BCEF041E-8CBD-4DD2-A634-9FF0887E8BD7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1226_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"58BEE344-48BE-4D5E-B5BE-9391255C8550\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e3-1220l_v3_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5CA73CC3-6CA3-484F-88F4-1C3B37EFB816\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1220l_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF9C696B-FA4E-419C-B036-76DCBBD9022C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e3-1220_v3_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BDD77FA3-8E42-4338-BD10-D3BEE47C62F4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1220_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0493CF98-1A11-41D2-B719-6D94583232E8\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e3-1230l_v3_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"83B3CBDB-DFE4-46D5-B4C7-5199953FE499\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1230l_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"73B301CD-6105-448E-B013-52F894D8106E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e3-1225_v3_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D443B82-565B-45A3-8D16-368679215E1B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1225_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"771E2F3E-3FC2-462E-93C4-12301660E6C4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e3-1265l_v3_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ACB140D8-9E3B-474D-ACF9-A828469D433B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1265l_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CCBB36F8-2022-48AA-8428-73877B98645D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e3-1275_v3_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8BB33D4D-1D42-4239-9EED-43270159B364\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e3-1275_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"98FA6E45-B945-4923-84FD-B34F2CAA15C1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e-2226g_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"08DFA1D1-C133-4152-A66A-C70800905E17\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2226g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B278081F-F900-4581-9D10-B5A2ACD2E2C1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e-2234_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"56A0FA18-C2C0-4DA1-B7A4-6BA3B822DDE3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2234:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"45689B37-5085-41B3-BA9D-F05FD07DF1FC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e-2236_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F40D7630-3069-4AF7-B2B9-9AFF96A43AC8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2236:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A7186EA5-448F-473A-8FC8-058FC823ACC5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e-2244g_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F222C991-CA9F-48FB-AC22-D8F6B837F8D1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2244g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C12F0C71-8F25-4C77-A3F3-1231AC53C0CA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e-2274g_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF1AC701-DF74-457B-8CB6-FA35E0E78F29\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2274g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FAD38AEA-979D-484B-82F0-0161BA39E9F5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e-2246g_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C1A528C2-662C-40B1-8C71-A5A4134A6314\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2246g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB179A6F-FED8-45FB-89C7-3B17D6F5EB21\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e-2224_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C9C4CE2-F65F-41FE-947C-16AD1558D03B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2224:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"79214F8B-1090-4DCD-B1F4-0FF78FC29C4A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e-2224g_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BE808573-A9E6-4DFE-82E1-08546F5BF451\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2224g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD176FB0-7427-4F2E-A969-72062BB3EF98\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e-2288g_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3540784A-1B0B-41EE-AB66-A293AC400C39\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2288g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5EA930BC-EF68-4AD5-AA1B-0659358028D5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e-2278g_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C02909B-E06F-4786-ABB9-ACF5D9C5E4D0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2278g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"63650DBF-4DBD-4655-AE93-5CBE53F8E0FB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e-2286g_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C562AA0-3A76-4223-A5E4-13B2898FBC43\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2286g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"320597E9-6A2B-47E6-A33C-6B31A81902EA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e-2276g_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"98D6031F-201E-4FF2-A233-BF4C96ECF4B3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2276g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"780AB9F4-0C87-4528-B53A-69FBC4D87ADB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e-2124g_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A7C6423-2E99-41D6-AD38-17658F1B1D21\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2124g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"342E0783-288A-4DB0-A657-29937903927C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e-2146g_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B46B1D60-3FFC-4CE7-9AD0-F78B0D5D1DFB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2146g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0866F1A3-8B9C-4B5A-B30D-71B3465EC80A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e-2176g_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"87C478AE-F05C-42B4-BCB6-2F0A7FE4AC88\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2176g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE638E59-DF75-43B1-A6DC-10A838B05B00\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e-2136_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1490C2DA-4627-4BAC-A505-E434A81FBDC6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2136:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C4797D2E-1270-447B-BFE4-CC96D9F10D5B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e-2134_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1F005ED6-B7F6-45FE-8694-A09F0D1CB2E8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2134:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"23CA9365-B1C4-4188-A9BF-19215AFF58A0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e-2144g_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A73DA92B-919E-4F75-A4A7-54E7F892BB24\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2144g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2CA77EB3-6F11-43BC-8B59-84217AA73205\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e-2174g_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA4ABBE1-EE80-4FED-BBA7-A552BE31A826\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2174g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"331B8F10-3A20-46A8-B960-3546271CF701\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e-2104g_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E7DFFCB0-360D-4805-8472-16391178164D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2104g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"921B163F-7696-4C47-8FD5-1E2897471C22\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e-2186g_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A9EB59BF-2708-4C3C-BA60-F621E067D824\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2186g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A67B3834-E59E-47AF-A806-13A990E812B3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e-2126g_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B263A8AF-03E7-4B05-888B-3395A2B10BF4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2126g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D4C40F91-138F-4396-9A6B-B969F6AC30B8\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e-2124_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA1C21E5-81FF-45EE-836B-E809C8F34440\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e-2124:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"43126A13-5931-4989-BEFD-E1A096F98D94\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_d-1602_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"786C8BA5-A74D-46FD-8241-12934B6C26B5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_d-1602:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1F4B6C48-261B-4B0E-BA2A-7E3060D01F93\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_d-1653n_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"394270FA-3A62-4778-9E38-70CF88B430DD\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_d-1653n:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0BE4E4AC-4E1D-4F86-A8E8-8053EE1B974E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_d-1622_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A905368-740B-48FB-8949-D212D637E5E5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_d-1622:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"41FC8B26-7611-45B6-A37D-DF7025E2E92D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_d-1623n_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A0297E3-3D66-4174-97EE-832F5E1DC708\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_d-1623n:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"543DB437-425F-4FF7-BDBD-FB5CC17E0056\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_d-1627_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C0D72C6B-6F57-4D37-9363-E741E2931B8D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_d-1627:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"97E8DD28-EC33-489F-A71C-2AEACFB16FC9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_d-1637_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B94CF0F-0A7B-42D1-90AF-28A893DA85D2\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_d-1637:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"10FD9FEF-2186-4416-93B7-B743657412A1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_d-1633n_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1FAC3989-A0CA-465A-9DB9-3C29D617C8AE\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_d-1633n:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"84B97F2B-A3D1-48A3-9FB7-755191FDD720\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_d-1649n_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"37012AFD-094E-4742-972F-AEEDDEE4105C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_d-1649n:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"38161238-5D40-485F-B0D2-D7621EC317D6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_d-2141i_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"81D4C607-D5EA-43C3-AE74-301BF0BA929F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_d-2141i:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6FB59E56-9FBE-4D10-AFC0-03E0ED0A4120\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_d-2177nt_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F8B39E8-26E8-4ACE-88D6-0AAF4E2515C3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_d-2177nt:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F3757F7B-4283-4ABF-974B-59E4E2358035\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_d-2161i_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3B1F65EA-5A27-4700-98F1-B82DAAB3CCF4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_d-2161i:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F0327393-DB2A-455B-8E20-3EDB3766CDA6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_d-2143it_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A06D956-804A-47DE-85D2-26BEE9B3E313\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_d-2143it:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B10FCF1-F496-4166-9162-41012C4D2B16\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_d-2146nt_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"35DE5D2A-7DCF-4398-8514-9BB88DC81B77\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_d-2146nt:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FCADFB25-DCBB-4901-9E4D-132ED49C7F26\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_d-2145nt_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"440D381D-D093-474C-8D22-AD610DEAB775\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_d-2145nt:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ACAAD0F0-9182-46EF-8399-C04FB472BE6F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_d-2123it_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA657873-A9B1-4513-8C60-29FAEC1E22F2\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_d-2123it:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B804174C-53DB-4641-BD26-3ECDD9FBD638\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_d-2173it_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"93409D2B-67E1-4410-9013-28E80B2525C1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_d-2173it:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4925D0EA-D524-432F-8417-892BB8C3DDFA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_d-2191_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9976EF5C-1AFA-4FED-8248-B6638D75743A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_d-2191:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"14DFFCEF-09F5-4228-AB7F-F042C4D5CE2A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_d-2187nt_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"811D3C20-42DC-4EAA-8B3F-A9B52CA79DF1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_d-2187nt:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"122BD094-E815-4081-B674-B71AC193BE0F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_d-2142it_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C2DF49A2-ED2E-44C3-8F0A-65E94807A4F5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_d-2142it:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B3930A6D-64DC-4953-AD7E-EED0C48B048E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_d-2163it_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"61643FC4-4D2C-42A8-ADDB-1866A6F638DF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_d-2163it:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C2E00698-8A08-433F-8852-8EDC422A53D8\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_d-2183it_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CBE8D02A-E569-499C-8EEB-273FE003364E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_d-2183it:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"93D86199-5CF3-4E7A-8295-50F958EA4B4C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_d-2166nt_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"505E8798-0795-48A9-A55F-88CFF761843D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_d-2166nt:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A25BD7C-F01B-49F6-8DB0-2F8B976AC9E4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_d-1533n_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E45CD9C5-73E5-4D79-8E7C-D1A6FEA2EA9D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_d-1533n:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"74F2A5C9-C593-4C42-A47E-F563C4696137\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_d-1513n_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A869936B-3C49-4E13-A467-28CBA4178F40\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_d-1513n:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"404409CA-326B-425D-A4E5-1A3C8CC45344\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_d-1543n_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2577C819-3541-4AF5-87C1-C5ABA32AA709\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_d-1543n:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC6E2595-D9E7-46D6-99C8-336DEB1B4020\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_d-1523n_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"712B36F5-6217-48BE-BA59-55F4AD9EACDB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_d-1523n:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D99D4F6F-5874-4F5D-91FD-E265DCE86667\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_d-1553n_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5FBCEF54-FC1D-4AE6-BD29-D7EE7F401180\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_d-1553n:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A84814F-B070-45B0-ABC2-1BAAA212EFD2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_d-1539_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C57B1AE-7C36-4991-9835-8BA292598B51\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_d-1539:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EDA12CAD-F622-4F14-8847-AFD8DC250B40\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_d-1529_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B5872F0A-E0E2-419A-91B4-7A57268CCB25\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_d-1529:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD387ADD-02CA-4154-BF86-0DBE664FE5F5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_d-1559_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3ECFE5B6-CD41-4DA1-BA61-2ED51BFE7F6A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_d-1559:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B897D23E-1BC1-4FBB-AD00-422413C1749C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_d-1557_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB5F33C5-18B0-43B4-A478-DB0478019E6D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_d-1557:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9BD8917-5BEA-491C-B6E8-486FF957A876\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_d-1567_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CF024983-AAB6-4A1B-BB04-DA015D59F9DA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_d-1567:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E5C50FBC-6933-4E98-82B9-A70B1C836ED8\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_d-1577_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"540F4FFD-174C-4183-B208-9F7BA81E10A1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_d-1577:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"971C6442-6546-440B-AD74-44A5BB527D11\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_d-1571_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3BF2C02E-7C0D-4FB8-9D74-7CD9FAD32D2B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_d-1571:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8F8AD4D2-D48B-4F53-A0BA-A90E5A970832\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_d-1528_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FC4D8719-A1B6-4641-9116-B3530AE77DEA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_d-1528:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4FA0A03C-21BB-4C5D-85B3-FF579F34E82C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_d-1541_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A3B14F2-3FE9-4435-A463-55C0DDF867B0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_d-1541:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BCCDD79D-80C4-4A52-94F6-F30237AE0C53\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_d-1518_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F54775F7-3AFF-4675-A686-A2EC357FEB85\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_d-1518:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AA5E65D0-6DB9-41D2-9721-8F1232D8155F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_d-1521_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF812F0E-DC8B-404D-ACE3-EA55FA189615\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_d-1521:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4BAE58B-C0D2-466A-88C1-47D2A81E9D7A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_d-1531_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE2F3B48-F432-473C-B7AA-881350F4ABC4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_d-1531:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CAB6FBF0-14B5-4DDC-BEC2-16535679B0C7\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_d-1548_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"243FB5C6-FA42-4148-AA32-8DA43D2A1669\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_d-1548:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"829702E9-C0EB-4E4B-A979-41A2235B182B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_d-1527_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"63259ADB-12AC-43B8-8399-0AD7A4CCF31C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_d-1527:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"47DB082B-E169-4BE0-81DC-B2A7219C4DA3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_d-1537_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"104244E0-C4D7-46A7-999C-07180274E8D8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_d-1537:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EA7576BD-43FE-44D2-A665-F78BDA4D964D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_d-1520_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A442CBEF-77FC-4D2C-99D7-EE8FA558D1AB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_d-1520:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"46066C5B-DB48-4B83-9E5E-3809D3F7FED2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_d-1540_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B2DE391-0FFA-4F9E-8349-6E41267F74C1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_d-1540:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA062554-DBBC-4215-9705-1ADA545B5887\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_w-2275_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"21189344-DC9C-4DAD-A33A-C0A9004BFD4F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_w-2275:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"750A77C5-1367-4E04-9ABF-1AB2D46C29C6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_w-2295_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"87F3E569-3A87-4D31-B80A-E0FD74B25AFE\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_w-2295:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D1340A29-3428-4FAD-AA07-7F625915E34D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_w-2265_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8EF592A6-20F6-4220-8A9C-282F21EBCBF7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_w-2265:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C6D23470-A702-426D-A63C-4F7BAC158762\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_w-2255_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3D0A0072-4ECD-4F88-8BA5-8BDB026F95B2\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_w-2255:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2ADF328B-D286-4C36-9F21-11A58D55D03A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_w-2223_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D44FD82-EEBB-4388-B346-EB29B852F2EA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_w-2223:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"708D6E00-A2E5-4B08-88E7-C872ACFC341D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_w-2245_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"42A4C795-500D-4B83-8DC5-327E011BA7E5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_w-2245:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D132291B-AADD-49E3-ADD6-333E1F1D8DFE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_w-2225_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"32D47430-800D-43F5-AA6E-8852969BEFAB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_w-2225:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0CD8EE0E-2BA3-49DD-91D1-81AB67F16475\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_w-2235_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5E8852E4-C6AF-41D1-AF12-646B06C99600\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_w-2235:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC75E5CF-4241-45A8-AD45-1F7F077CEEA1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_w-3265m_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E23B39A-513F-4388-8F28-C711414E2BF6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_w-3265m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"020B6FED-EAE2-478C-8FF4-CB75F24E9A9D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_w-3245m_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"93849DA1-D6A5-4FA2-99F1-D8AD3B4DE8CE\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_w-3245m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"35380FB9-90FF-405F-8E2E-01C1DD209540\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_w-3275_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"25CC3D78-CE53-4ADF-9D6B-73255508FCDA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_w-3275:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE519C62-F5BB-461C-91EF-2979CD506C63\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_w-3245_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A054F0CE-BD0C-4E56-9EBA-79A113FCA659\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_w-3245:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DF9E723E-1095-424E-A90D-380CA0D2795E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_w-3275m_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2550330E-3A54-45BD-8B2F-8CD8D5561DA1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_w-3275m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F693457C-3529-4E62-A672-1B862F235D0F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_w-3223_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8F619828-436D-4A0B-84F6-968893B96710\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_w-3223:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ADA1FA19-A836-4D6A-8C2D-718ECE6866D2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_w-3265_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"97A8F5B9-B820-4E84-9863-FF734DE45B9E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_w-3265:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2215D655-0EA9-4530-AB68-7B1C7360D692\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_w-3225_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D53DDDB1-DA94-4BC2-A934-4FFE55F0D1E7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_w-3225:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3ECEBDB0-2E0A-416B-9737-82C1FC65A06C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_w-3175x_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"639D3795-0A1B-4CC7-BD9F-B75118B4A45F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_w-3175x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E50CC669-9555-45E9-A43B-05A21FB040E1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_w-2175_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D364DCDC-2A19-402A-8285-57E5E216374B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_w-2175:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"15B85362-44E5-4107-AC8A-29DEE2A7EEDD\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_w-2133_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8FF3665E-34AC-43A5-BC48-3365880097D6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_w-2133:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6F5DF76-FC10-4562-9AD9-6675F3D6CF3C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_w-2155_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B137CE46-56D3-484B-AD4B-E57C903DDEFE\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_w-2155:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B1C36BE-D4DC-4965-8106-EDA77BDB64DB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_w-2123_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2CCF73F8-7B2E-4B92-AEE4-F59ED8CDD187\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_w-2123:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3BA7061E-E26C-4905-AB41-18267DD32821\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_w-2145_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A7BAC9F6-35CE-4045-9F28-EE5A66C70282\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_w-2145:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"739731E7-F1BF-4D12-B103-E7F85B35307E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_w-2125_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8A62225-DD72-4BDD-9BEA-0DE3577D6743\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_w-2125:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8AFC055D-B249-4EB4-8A9F-BE4391A27505\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_w-2135_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D231E6E8-6848-4914-B79F-FD44962FED2D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_w-2135:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"72F91FC3-CF90-450D-9E71-4A301A997921\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_w-2195_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"965674C3-2816-498F-A2B8-E02847BB6CEB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_w-2195:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"63293B85-A014-4F23-97EE-6CE3467FCB06\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_x7560_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D3C2B08-28D7-4267-8E69-D0AF625292F0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_x7560:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"25422B17-D407-4822-8DBC-4BA9359DEDA1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_l7555_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8CAE085-F960-470D-83C0-F2EDF15FFA47\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_l7555:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CDF1663B-29A1-43CB-B275-AAB6E2E49673\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_x7550_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C0D1EA80-57EE-434C-A600-0F945D239946\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_x7550:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"52043F53-97A1-4A91-A4D1-FE1C5F6B1F27\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_l7545_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D8AB0C4-A342-4115-9B35-D1BB4E2C2CB2\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_l7545:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"82EAFB16-FA77-4991-B341-E60A28B5A2A4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_x7542_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8036F8AF-DE82-4139-B613-77A3B0D44812\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_x7542:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C2E4D488-C448-4F3E-B9AF-19379988396C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e7540_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0151C5C7-A3BA-4448-91F3-4EF7D7C3E310\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e7540:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D6C48C2C-AE97-479B-AC3F-1354AADC46ED\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e7530_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7050699A-58F6-4914-AA24-C7FFAA976778\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e7530:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"00805072-515B-431A-A5A1-002484BE150B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e7520_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE96C25F-74DC-4749-9392-6228EB949290\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e7520:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C3B4EDF0-1133-4BD2-B1DC-4028611AE62A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_x7460_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0766AAD2-8C85-4A47-B5FC-0064D7FEAD62\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_x7460:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E56D4C8-50EA-43C5-9169-906D908DB164\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e7450_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FDFF9B9F-CEDC-4AD5-BB5D-EDDBFEABB772\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e7450:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7693B062-FCCF-4022-9EC4-DE8E38C3EF73\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_l7455_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F1C9ADAC-D05D-428F-85AC-47342654EC5D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_l7455:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D4DEEF68-3BA5-40EC-B071-30C7692D5D9B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_l7445_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B4C3270-A6D4-4DCC-AF11-EC2CB3179B0E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_l7445:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5793F3F-77C8-475A-B5C0-5E7A1DEF6C17\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e7440_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0169C260-81EA-4685-B72D-6FC0FAD00FA0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e7440:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C2794E5-B463-41A5-8344-BEF354B3AC10\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e7430_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CFC82B3C-61B0-4CFE-ACF5-98AA72B41987\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e7430:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"845DDD2E-E8BF-42F9-982C-4BC5CBF62416\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e7420_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E020142A-390D-49AE-A65C-4DFB4AE124A1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e7420:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5E5D43C-26BB-4E5E-9255-93BFB5EB0640\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_x7350_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEE99082-6C63-4B71-B5A0-0CF750304413\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_x7350:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2084AA96-BD82-4FEF-9D9C-8792DC052C9A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_l7345_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"28AF53BF-962D-419A-830C-AF9E99B5BB9F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_l7345:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2E090E5E-BB45-431E-A7C6-9828E2C8912B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e7340_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0E8D0A7C-5C0C-46F9-B8AC-4D0420F5BA56\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e7340:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"76C660AB-9030-42E0-ABCC-4CFC7F7DA3FD\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e7330_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"913D8917-B1FF-4B58-895E-E4D80405AA1F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e7330:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0E813D3F-CD2E-445E-B60B-F87C9511763C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e7320_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"57FB7247-5827-4AEE-B2D3-52B9BDAD97DB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e7320:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EABA3C4F-A6DF-4258-B331-B0630B6414F1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e7310_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A46E68AA-0C97-43DD-94F5-A012F62A9FDF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e7310:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"67900C2E-E429-4B0D-A0A8-75D3B60ADB85\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e7220_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"44C8C57C-A381-46EB-BA92-C234F3EBC5D6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e7220:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"79367ABB-1484-4889-9456-867264B3A44E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e7210_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B271BE4-CA32-445B-804D-C13064EF2DFB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e7210:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E8F6A922-1204-4E11-BEED-E25448286DD7\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_7150n_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D62AE32E-8F7D-413C-A55A-9859CA37F0E7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_7150n:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"88348CEF-3629-40AB-AF21-623D7971C954\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_7140n_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D6ACA76-8588-459F-A9C5-3EE84B367B2B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_7140n:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"42D974E5-A80F-410B-856C-91EA78001047\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_7140m_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EA81D1F5-0EC5-4015-A13F-4998817A0648\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_7140m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B3F3D433-BB13-4927-8191-2E9AD09A7A04\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_7130n_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1C6DA26C-5DDD-41D4-B4FE-F07808754FA6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_7130n:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"72B33E31-074D-4717-83E6-071FEC68D0EE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_7130m_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1CA60532-8431-4418-BFFA-8A3AFEA9F493\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_7130m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8FD33C55-661C-4E90-9BB6-141CDCBBD1C6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_7120n_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F49B47E2-3302-4ED2-A7AC-0B8B8F7E6D83\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_7120n:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C25B4FCF-0815-47F2-9FC4-E520E4E46FE4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_7120m_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2721961E-88A2-4F08-948D-FBF0560BC0D1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_7120m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BBE75AA1-59BB-49CD-9997-F9339B0ED23A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_7110n_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6376E5AB-E6B3-4135-9243-B49BC47A6105\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_7110n:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8ED78C17-10D2-49F3-B4F8-CFCE151EEE93\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_7110m_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4988C7AF-B1C0-4072-BAC1-49F5172739C3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_7110m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0DA8F18F-CD91-414C-ABDF-069CAA55E1D1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_7041_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"66142D49-EE41-4AF6-BFE3-9E4845D56FD2\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_7041:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1BDE253F-37D4-4006-A7AF-FCCD35C8156D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_7040_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FAC30AD7-4E5F-4653-B963-178126630238\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_7040:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1D0E4DAD-516F-40F7-8534-E0F40C4C6004\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_7020_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"531F12C2-3469-4462-BF6D-71965EC27486\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_7020:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B986CE1-1E60-4DA6-A84A-9465DBA0BB2C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_7030_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C3DABE1-774F-4CC5-9082-3B39C475D93C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_7030:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EDB0C578-2FFF-4006-BF2A-938E12600B32\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_x6550_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"43C91477-40D6-4326-AD52-23469571C05A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_x6550:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B3B3BAEA-2765-4676-AAAC-02100005129F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e6540_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E68DC0C2-21DE-4BC7-994A-06BA650C2224\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e6540:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D12E9CE-C425-4E3B-907A-69C7FCA3F33D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e6510_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"30158673-6526-4C7C-B8FC-14F6DE0A04B2\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e6510:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CAED8FAB-99C6-417B-8BE3-D623C434ED2A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_x5690_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"27F476C7-DE96-46B8-8076-C4591881E61D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_x5690:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1209B765-0F4E-4E5C-9BA0-164BA287F0FA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_x5687_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF85428D-DC13-46C2-8FC7-A72B366F6BE9\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_x5687:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B832C0B3-1FDD-460F-B2FC-8AD77168A77F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_x5680_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA4E9461-D020-490A-86D2-FF3CA98F01E7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_x5680:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7AFE8B4F-1B0D-402C-995C-6B433AB35E2B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_x5677_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A650AA88-6A33-4E71-B42B-6949900B0799\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_x5677:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D8598977-1284-4AEC-BD23-B05FB38088BD\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_x5675_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5ABF0978-B0D0-4F8A-B252-D9107E75C75E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_x5675:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D805C862-DAA4-41CA-BDE0-AFB201F4DCA4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_x5672_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B9DB5CF3-1EBC-478B-89CD-FFE087FCD6D3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_x5672:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"279EA585-4860-488E-946E-F9A025DF3721\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_x5670_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"60CC69CD-ABB0-4A7D-AE58-0877786851BC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_x5670:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF7672A0-9ACA-4B42-A93E-5E4AF6D4AC42\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_x5667_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2839AC05-0429-40CC-8410-69F21CDDFD2A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_x5667:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"992614B6-A737-4964-BD00-AC8A14798AEA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_x5660_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DBAB2C6C-1DD8-4BD4-9214-9136D0BA597D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_x5660:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2AD36064-4A58-4AAE-836D-456AEED414F7\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_x5650_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"78E03417-EA00-471B-A899-00612AD6FBC0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_x5650:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C3BE3E9B-73C1-47D0-9669-C2F9C73A27BF\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5649_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE0F267D-1A03-4DFA-835B-BFB597DCCFA7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5649:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F9B74AF-4A6B-479F-B2A4-2C2F42943862\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_x5647_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6273A630-5225-43DA-9D84-13AD3CC13664\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_x5647:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F8B42C18-FB38-443F-9DDD-C912F039FF56\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5645_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CCBAECEC-C678-4491-9A89-2C3DCC4B8AC3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5645:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4ED9F23C-F74D-47EC-8276-EE66DBAFF951\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_l5640_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A26BE7D9-2169-431B-A296-545B9B0EA31A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_l5640:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD06BCF5-FF83-468E-AAF2-AFAE366AE063\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5640_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"38CB12DD-EA1C-4FCA-B3E9-887BA11F8B55\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5640:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F1369DB1-B0B8-4648-8C44-233721AF9171\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_l5638_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C76E140-4A1C-4896-AE54-A80E26E45DD3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_l5638:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3E1F312F-19FB-46B6-BBC3-00C5231F484E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_l5630_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8533B995-A5DD-477E-9D58-F16FFD93618E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_l5630:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"639586F8-A41D-4015-AB44-D5FA8DD5F650\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5630_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A22923D-C325-46AC-9C40-03125867A013\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5630:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2BB51976-3226-4057-8EB0-2906698D28C7\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5620_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"50D7B89B-FBF9-4642-BFD5-7FBB209CBD8C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5620:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6AEAF848-B223-47F0-ABFD-9EECB3351F7D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_l5618_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2FBA50EE-4399-462A-AA63-ECEBD37E5ADA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_l5618:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CCC98F60-DF54-4DC0-8690-F74E886DDE65\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_l5609_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EEBB130C-89FA-403B-A298-679D13AA5E9D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_l5609:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B67F6D8C-59B0-46D6-8EA6-0639FD26DCF7\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5607_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7FE17B02-613A-4A5F-8C1A-55E7D61E101F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5607:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F6898B47-7493-488D-8973-E3F66602348D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5606_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1395B700-BDD4-4778-946E-A1725F83C4C5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5606:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C9940B4-F1F2-4750-AEC9-C1C3A4A5B12C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5506_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"415D174C-D6A9-4A16-AFBE-A5B041547B5A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5506:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C05BFAA4-45D5-4338-B553-E58D8DA1060B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5603_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C6F208F-5DC0-437A-BFB0-544680AF6DC2\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5603:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33725A6E-244D-46C1-8D82-FDF56587B378\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_w5590_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"886BD78E-4F3D-4DC9-87EC-C670E7ED434A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_w5590:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"72A7E73F-9AB1-47DE-94D3-495FEFFAAFC6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_w5580_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80D9813E-E69D-4DB5-A051-1855B1079000\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_w5580:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80417550-98E1-40C5-A55C-89FC80C8D0A6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_x5570_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1DDA5314-BD19-4035-B916-D7C40C986514\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_x5570:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"58015E3C-FB32-40B5-B72E-8423B1A295AA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_x5560_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"156A4EA7-6825-4F9B-9452-6F9A68607106\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_x5560:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3AF86D70-91E5-47F7-8148-B3DE928C3FE9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_x5550_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4E183E81-1325-4128-B924-77EFBF3A9A77\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_x5550:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B2CA3EBA-7EC4-4823-B3E9-536FA64E4B2B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_ec5549_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"77351F56-E3DE-4A31-A487-3A67C7818F50\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_ec5549:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6EFF6B9B-20C0-4173-BF60-78BE59866626\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5540_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D075388-5370-4A07-B3CA-6A7E827861B6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5540:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"256A7B0C-0B08-4004-9A8C-767B3F26F12D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_ec5539_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"904FE35D-61E7-45FB-9B09-BB49486A1FBD\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_ec5539:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C5D5675-4EFD-4DEA-8763-94C2ACC24E3D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_l5530_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F388909D-4890-44EE-ADFC-7CB61BA2E21D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_l5530:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F5E8684D-FE70-4221-A13E-434417E30B25\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5530_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"09B9747E-0DF8-4FC1-8CDE-7EBA7DBEC686\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5530:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD0C904C-4B14-4CC4-AAA7-18C90F3624F9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_lc5528_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"02E8A08B-F6D1-4EBF-8790-42496AD15A3D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_lc5528:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F73BB54D-0BC2-4D46-AEC8-C11A6CDC7352\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_l5520_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"500A2DCF-D16E-486B-9DF5-55956A4A12DD\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_l5520:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA403F18-1A0F-4402-BF11-46E523A68BB8\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5520_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E5BDCD70-DD57-4B9B-AA3C-F91C161B590D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5520:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C720ECB3-91F7-421E-89BF-FE486ED7E555\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_lc5518_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A6AD06D-A507-4E38-94C4-B32225F11DCD\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_lc5518:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"63F4EFC0-C404-4EF3-8925-F0BF14C19678\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_l5518_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E54BC56-B6B0-44F6-A009-E3A61F49E59B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_l5518:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6320B57E-7CE6-47F3-8CCA-F90789EC0791\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_ec5509_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3AAA7621-028E-4BA2-8CD0-5374B405D0B2\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_ec5509:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1C48F702-FD91-4DF0-8CF1-62A64F403209\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_l5508_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E36B39E-83F3-465F-B0E2-DACFE2B6DD3C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_l5508:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F127C80C-C8EF-43EF-BAC2-19946067A15E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5507_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C395ABF8-AFA9-449F-8DE6-39F4F1BA91F6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5507:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC6711D1-D6CE-4236-81C6-6A95A15B2728\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_l5506_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DDCA869D-0BDE-43BD-BF62-95438005FCD8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_l5506:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"11AEC71F-0B98-4433-B236-15EFE2452EA2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5504_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C5E3A414-36FE-41CD-86D8-3302DB16D4E1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5504:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"72D1EE1B-D09B-443D-9369-49CF3F00079D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5503_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EC6F41FE-DE04-451B-9FEB-88C5BBEF910E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5503:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F7C838E5-6F7C-4929-A838-913F2951ACCF\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5502_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"31D9DE6D-C5CA-432D-B09B-78AE940757E5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5502:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A3F5B2D4-BB4B-4A41-8FF5-A39C9914F5B0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_x5492_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"00CD0BD8-3932-4248-B2F3-989BF523DFC5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_x5492:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2E1EEB10-E431-4DED-9F18-18F69B70CF23\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_x5482_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9B3C3537-3B27-4B79-8017-B9C445214D5B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_x5482:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5333DC59-2AF2-412D-91CD-2442796FBE50\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_x5472_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB126EEA-9535-4965-B5CA-E2E327262599\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_x5472:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F8B3088-DFD1-461B-82C3-FBB17154FBC8\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5472_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4E382188-CC29-4F75-9958-355F2314833A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5472:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"28E72955-A3D6-4C0B-B8DA-7686B9A8A2A5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_x5470_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3D533E86-D8DB-43FF-8115-1C6D8A44B9D6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_x5470:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B7020A0-0E3A-41C4-A5B1-58EEEDB10DBA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5462_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9ABE07A-2721-4B7B-8D6D-7CF9E8F652CA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5462:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1C013F65-D157-4BC1-94E7-9DCA705C628D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_x5460_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"96BAE2C0-B90E-47ED-9408-6DC1E6F33B15\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_x5460:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0719F5BB-DC65-436E-918A-E56A417FD3E4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_x5450_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F199D023-F26F-421F-B609-901A3F34C82E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_x5450:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"025472A5-DF3A-47FF-83E9-80F979C799A3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5450_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"89F904A5-24AC-469C-BEB4-105A634D28CF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5450:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FCFBAA77-EAEC-4C4D-8385-4CE2F5B57E01\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5440_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"20A43920-9CA2-4931-B04C-DFE9485CDCA5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5440:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"892E0559-D2EE-45CF-9AF2-8F266AF3F864\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_l5430_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D11041AA-B78E-4A82-9455-9AC85D96B602\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_l5430:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D9D810F4-3A71-4ADA-92D1-F561277C6359\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5430_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"56ADCCA1-FCFA-4DED-A7FA-BAAE5D62E49D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5430:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8F7360B5-81D1-432A-A5CD-8B053676CE39\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_l5420_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C4A712C7-3F85-4ED8-A2CC-C26ED478A99B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_l5420:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8AFB7F7F-FEE4-42C6-9008-13EDF47DB331\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5420_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B932321A-244D-4986-9DD4-54449107D6F2\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5420:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A818E86A-339B-40EC-AD33-1AE7B95A929D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_l5410_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"858056FB-F8E8-473E-9FAD-AFA29CB20170\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_l5410:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6EFE5419-34E9-4C62-B1CF-C12D9E50A2F5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5410_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7437AB9F-EFF4-48A7-AE84-FC22EF82B0A3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5410:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0FA2E6C6-7672-4020-B844-DA46B564EE43\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_l5408_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D15E5196-5EDC-4422-A3F3-E36092BD69F3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_l5408:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16B59960-F783-413B-B4A6-3D855D936132\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5405_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"620F1DA2-056C-4D23-BBEB-5D9B4EBB4502\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5405:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CBD21DE0-6FB7-44F2-80A1-4DE048C606C2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_x5365_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"861586A1-4832-47DB-9EC9-8AC1B1610885\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_x5365:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"69B934A5-4ADB-4216-B6B1-329CA339BDE4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_x5355_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1188E260-E566-48EA-B4B3-C1D9B0A931D0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_x5355:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F323FB03-5A19-465B-8D2B-A8245CAD92EF\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5345_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC22452C-053A-4FF7-85C1-B6CD27F5C26E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5345:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"676E6F5D-F108-4C0E-AE06-A0000557A30F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_l5335_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"338AD78A-7F5D-48D1-890C-26157BFE4D33\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_l5335:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C1E976F9-EA03-40A7-ACE7-256E20C81DEA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5335_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"84AB34EF-35C3-45DE-A6A8-4A838691EE43\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5335:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2147FB11-B866-4A1A-AE9F-880CA8D75323\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_l5320_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"61CBC212-86C3-41E6-B671-B66214C4358F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_l5320:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"204EB141-9D5F-4D0C-A40A-DF51E1BE8828\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5320_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7CA94BF0-B5CE-4005-B041-C8B17BBD3456\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5320:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"53773A88-7138-4E43-8CB4-589326A5EA1D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_l5318_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0912E636-A129-44DB-9AEF-A9DD89B7B8E3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_l5318:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2951C3F5-B250-4D8E-8B94-3C50DF78C7BE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_l5310_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"69C2CD5E-6C7D-4912-98A2-BD939D40D516\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_l5310:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E7F1C9C-BCD9-43B1-A2D1-AC54C86DB4EE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5310_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C6F3253-ABA9-4560-BE41-D5AA7FCF8C4C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5310:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B579425-F1E8-41C0-98A3-7DC5D475583E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_x5272_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"625A870B-A31D-46EB-B076-10AF50B8DA6A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_x5272:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9B2C925F-0568-4A00-9A16-211EB91438EF\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_x5270_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"36145C75-756A-4F53-AE03-CB5C50E78643\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_x5270:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33C90437-98F8-4C02-84C7-EBAAA90E22D5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_x5260_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F1C10B7F-31DA-499E-9618-D00444863976\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_x5260:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C991D2A-A979-42A6-9BB3-4138260D5BFD\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_l5240_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F231A45-CD2F-408F-A55A-6BA30FA479F0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_l5240:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"55E29850-9836-4B89-9CF9-4FE9B0F65361\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5240_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1D9D555B-D331-44F6-A300-2C57B6E65341\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5240:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2ADDD658-DDA3-41F5-95EE-F823E052E862\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_l5238_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7EC4DAE0-6A62-48AA-9200-DA10F0BBA5B8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_l5238:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"89697554-FE7C-453A-A39C-C00C28F2054A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5220_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD74DFCC-6A47-416C-B853-A435622AD60A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5220:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8BF6FD58-7123-4FDD-951A-166DB7E036DD\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_l5215_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8E443223-7B9A-410F-9415-2C9B07163B05\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_l5215:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"077D95D7-483E-4446-9DC3-75BEF9798A2C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e5205_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A3D822DF-5804-4EEF-9D0A-72B1B0516CC7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e5205:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"966753DA-2ED4-4EC4-B38A-B7472CEC464F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_5160_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"11A48A8F-B840-45EF-B695-D26B601A2D70\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_5160:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"663A16BF-D89F-4047-A589-76DF9BD92977\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_5150_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CFB1DB18-C7C8-4AA4-9DB2-EC1DEC2B9461\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_5150:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6FC71AE5-B4E9-4A3E-8984-69CBFA0101FF\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_lv_5148_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"63BC75D3-01CF-4CFB-938A-A8771635503F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_lv_5148:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E87D7452-49C8-4E45-9521-4AF1978C28C8\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_5140_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0069EF88-48B8-4CDB-97AB-E2DC5FF1F5E7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_5140:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6BDC8310-DF67-4A29-8329-1D6282898A48\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_lv_5138_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EFEA4790-BC8E-47D5-9A03-E4D4CE0EB90B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_lv_5138:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"25E31628-3953-4C93-86C3-3B7196ED3F4C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_lv_5133_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F1B1BFE7-B0DC-45A9-ACA8-2A822D52FBA6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_lv_5133:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F107359-074F-4889-890F-6AC19A33E840\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_5130_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A710E52-BD43-4168-924F-6328931648B4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_5130:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B553B4D9-6FDF-4BF8-BE11-659D7DE9263D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_lv_5128_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E7956622-0EE6-4141-9E56-4FDFE13B4D63\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_lv_5128:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5110089E-818A-498E-8677-1662ED44DCCD\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_5120_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9B6B2817-3923-4614-8ACD-2570DF3936B9\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_5120:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"31ACA3B7-70AF-4085-A80B-1154AB636EE5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_lv_5113_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F7C25D81-8CA9-4A21-B7D2-79A30522C48C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_lv_5113:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F33683C-BE13-46BD-8232-80E807BD201A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_5110_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1980AD66-D377-4928-ABD8-3A826D3E89FD\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_5110:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA819ABC-13B1-45BF-A5AD-DDC292AD6618\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_5080_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C2E07C62-CD92-48D3-BCA1-44374F83F891\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_5080:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4EF05BC3-5506-4301-9967-AA44701374C6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_5070_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0DE197A9-7529-4E83-8D75-56680E0949C0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_5070:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C19FE94A-2B26-4253-8E60-5C055AB201D1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_5063_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C7644127-0B63-4F40-ABB0-FAF31E777691\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_5063:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"863704D0-31C6-4A41-8788-4DDA56E39170\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_5060_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CEFD7C84-C41F-43DC-9FEC-58A483295EE8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_5060:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AAA43015-3ED8-485E-A9D9-218A943C6467\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_5050_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"57450FAC-7ED4-4CCD-A8E2-172025053FA3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_5050:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"728E8547-9CE5-4EFF-8F1C-6224B613A2B5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_5040_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2E0FE4D-D3E8-4B8C-8241-108840CF82C8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_5040:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"56E7319E-96BC-437B-9952-BE4F3AEC4A4C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_5030_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E7AC138C-D4D7-4E91-8F16-15222BF37D2A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_5030:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F7059F67-776A-416A-A6B5-78D72E3A0A28\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_w3690_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"150E9655-CFE6-4246-BC56-98EAEC112AFD\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_w3690:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1DAC9062-8376-45CC-89D2-98436B281411\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_w3680_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E4A14A9-8A64-400D-A3FD-C20BC46BDD8B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_w3680:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ADDEE4FD-0B25-4DA5-B34E-22B2A825E230\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_w3670_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80FAF2EE-A018-43A4-84C7-4BB0F991604D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_w3670:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3814B3E5-A040-41EE-B051-D77C72B7EC25\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_w3580_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DFA9F9FB-A0A4-47CB-9882-DEA22AA0EA0D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_w3580:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16E19618-4714-4E73-ADBF-9FA650572272\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_w3570_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"333DA821-75F8-4F0E-B8E9-6243107AF12F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_w3570:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"10733521-E4BA-407B-97E7-1174CE853945\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_w3565_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FC409D09-5A7D-4E06-96C1-34509FD2F3B8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_w3565:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8185700-56AC-4970-B98B-E81D4C598C69\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_w3550_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A32BD44F-E6BB-44BB-9510-731E7D7F7B7A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_w3550:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1C669F43-6DD3-4E91-B28F-5ECDD0C04ACD\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_w3540_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2E7FE96A-7EFC-4D92-A7D2-EF36453EABED\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_w3540:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4715158B-FE00-451F-B8A0-461D57AC1469\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_ec3539_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C607E866-397A-4CF9-9901-51E427099074\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_ec3539:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C7BC9E29-93A6-4558-A814-A28A2FC4AD7B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_w3530_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A93B65A5-6209-454B-9D42-FDB8A90F5ACD\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_w3530:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"15DFE09E-43FC-4530-9E15-171C70B6B15C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_lc3528_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BDEBEF74-D5CF-4AFA-A5C6-5177DCF62713\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_lc3528:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B041AF4-DDE7-4BF5-BC57-D3CC5DB2F5ED\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_w3520_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"12DE5923-85D4-4C20-875E-8F460F59BB7B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_w3520:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"194A960C-080F-4CC1-97E4-ADCEABA00769\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_lc3518_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33663BFF-F518-41B8-B307-DF145A33DF87\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_lc3518:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0A93BF69-1A70-4FBD-9022-DEDCD5BB3E9D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_x3480_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"11B4D5E2-03B5-4FBF-843D-270A3766F893\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_x3480:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"084FC9F9-025D-4824-88DD-2C762D1876AD\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_x3470_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BAD13B77-235B-419D-815F-C4F0294709A9\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_x3470:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E5E5BE29-F875-4C6F-94F7-8A8E17C04F20\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_x3460_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"71683A22-C33B-40FA-9B19-1E1AF1634A4C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_x3460:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F7E23A8A-C3FD-4C5F-A36A-0ACB2AE426CE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_x3450_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"44033644-BEC9-4410-BD2C-4F106E04D0F2\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_x3450:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5DB27BDD-3FED-488C-B45F-FCA3CC693246\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_x3440_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE2E2840-4282-4234-9121-18D234D9DD67\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_x3440:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C45F78B1-A235-4005-BF05-7F30B0A8AF3E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_x3430_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E3A0FB64-7EE7-4C37-BCF6-1E3A49E3E5CB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_x3430:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2C983A16-FB96-4C94-B9F1-570007E169BD\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_l3426_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"38E4EE1A-57D8-4EE2-BE32-0420B0BBC755\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_l3426:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"545895F7-FFF6-4250-9803-D42CD015E6CA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_l3406_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F3C72F0C-3DDE-4E66-8E6B-606E6693F036\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_l3406:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F5B3F28-463F-4970-9AEA-F874B86A1206\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_x3380_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F0B15853-F27D-4BD3-98BE-C60D3F3A6BC7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_x3380:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"378F08C8-20FC-4774-A8DA-19662164A3D6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_x3370_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D55A542A-D2CE-4D5A-9840-2E3BA4D96750\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_x3370:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"10669E11-2C2F-41A1-AB0F-282465C71414\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_x3360_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C3729542-8A5B-4AA7-A7E1-ECAB6CD6A160\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_x3360:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"69C857C3-F9A4-4D21-ACA7-9F6BD62E6F19\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_l3360_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2115B52A-4C45-4B42-892B-06680F0E8F85\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_l3360:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33F6FB58-2408-4903-AEF7-01E4B0CF48AA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_x3350_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB96CF33-B8E4-4F47-9442-0CC081DF883C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_x3350:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9432D75C-A0D1-4320-BFB9-0DAAFAAF545F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_x3330_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D63EE6E4-E4A0-4976-BC44-F6D0E849B760\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_x3330:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2359015E-95BB-40AC-97E1-56C64AEA70F9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_x3320_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"118126F4-F2D0-4466-B0B5-7B2AA26F6200\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_x3320:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B54937F8-197E-4908-84E7-ED03304BE3B3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_x3230_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"860EDE2E-5E4F-4AAA-A09A-0065AA0DBF07\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_x3230:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"92F7D323-FAED-4072-8A27-07FDFD9004A8\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_x3220_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF75D0C7-3CE8-4B3C-B2D3-0FD058BD164B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_x3220:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B5F05936-B59D-4040-8A4D-0D76C20D0401\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_x3210_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"168AC32A-0F04-48FC-B9D1-B60A5C7161BB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_x3210:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4B282F08-5281-4EB2-9AAE-27DE22557D3D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e3120_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4AA87AA9-321E-42E7-8B81-C1824E3061C1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e3120:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"71EBB77A-EB72-4318-AAC3-725BE5B93FD4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_l3110_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CAFD11AE-B0E9-4DE5-B9D9-2AA9BB46195D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_l3110:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"48E25499-1DA4-4F05-8906-B8B8127E1BAB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_e3110_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ADBBA844-857C-42D9-8CA5-439E729EDEC3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_e3110:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"682A627D-BE25-4DDE-9E27-4376328E77CC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_3070_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC981425-098C-4AAC-B1D1-460FB50E2720\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_3070:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"417DE194-83E2-47A6-B782-D47265BB963E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_3065_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D7D699F-4BD1-4BDE-BB3A-AB50F0088914\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_3065:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"39F90F81-5326-433C-A1FE-64FFA04CFB29\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_3060_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C0B3BD7-76BA-468C-A318-45253A704C31\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_3060:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3179176E-748E-47BD-A9D7-C0DBE3F6BA5F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_3050_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2283AAB6-EB1B-41AE-B5D1-097FD6825D33\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_3050:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CB6E8FAB-41D2-4DE8-831D-46F21756AF4C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_3040_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BCB9FA4B-F870-44AC-9968-379663A08774\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_3040:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E37A6A35-ED46-4B04-B5CF-7BD8C75A3A8D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:xeon_l3014_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19B2D02B-F690-423D-BF92-A090DC9F3313\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:xeon_l3014:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"27C0242D-9732-453F-926A-364BFC7E3A12\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEECE5FC-CACF-4496-A3E7-164736409252\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B620311B-34A3-48A6-82DF-6F078D7A4493\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"97A4B8DF-58DA-4AB6-A1F9-331B36409BA3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80F0FA5D-8D3B-4C0E-81E2-87998286AF33\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*\",\"matchCriteriaId\":\"815D70A8-47D3-459C-A32C-9FEACA0659D1\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.5.2\",\"versionEndIncluding\":\"11.6.5\",\"matchCriteriaId\":\"85EE39BF-86AA-498B-BF51-EDCD7BD01376\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"12.1.0\",\"versionEndIncluding\":\"12.1.5\",\"matchCriteriaId\":\"6C3B5688-0235-4D4F-A26C-440FF24A1B43\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"13.1.0\",\"versionEndIncluding\":\"13.1.3\",\"matchCriteriaId\":\"6FCB6C17-33AC-4E5E-8633-7490058CA51F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"14.1.0\",\"versionEndIncluding\":\"14.1.2\",\"matchCriteriaId\":\"C8D4FBBA-1D87-4CCB-ADB3-42514FB0CF45\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"15.0.0\",\"versionEndIncluding\":\"15.0.1\",\"matchCriteriaId\":\"D6A53E3C-3E09-4100-8D5A-10AD4973C230\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.5.2\",\"versionEndIncluding\":\"11.6.5\",\"matchCriteriaId\":\"C6917369-D3C2-42EB-B73B-F86CE2F17401\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"12.1.0\",\"versionEndIncluding\":\"12.1.5\",\"matchCriteriaId\":\"151ED6D1-AA85-4213-8F3A-8167CBEC4721\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"13.1.0\",\"versionEndIncluding\":\"13.1.3\",\"matchCriteriaId\":\"6F1C68BC-A3EF-4205-AD00-68CB3A8C65AF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"14.1.0\",\"versionEndIncluding\":\"14.1.2\",\"matchCriteriaId\":\"D8BBC028-03DD-4412-9180-883E4252E132\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"15.0.0\",\"versionEndIncluding\":\"15.0.1\",\"matchCriteriaId\":\"FCAE28C2-0ADD-4FD0-A520-EFB764164DD8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.5.2\",\"versionEndIncluding\":\"11.6.5\",\"matchCriteriaId\":\"596A35D8-3644-4C45-99AC-4D201F170B83\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"12.1.0\",\"versionEndIncluding\":\"12.1.5\",\"matchCriteriaId\":\"5D5AA99B-08E7-4959-A3B4-41AA527B4B22\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"13.1.0\",\"versionEndIncluding\":\"13.1.3\",\"matchCriteriaId\":\"4AC8FD5C-AE1A-4484-BB6F-EBB6A48D21F8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"14.1.0\",\"versionEndIncluding\":\"14.1.2\",\"matchCriteriaId\":\"EC15881B-9C49-4E77-9FB6-A6E60D0BCAD3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"15.0.0\",\"versionEndIncluding\":\"15.0.1\",\"matchCriteriaId\":\"36A213C6-D6E4-4F38-989D-81D3DFC11829\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.5.2\",\"versionEndIncluding\":\"11.6.5\",\"matchCriteriaId\":\"AB5A624E-40A1-4F75-8B9A-FA56510C19EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"12.1.0\",\"versionEndIncluding\":\"12.1.5\",\"matchCriteriaId\":\"9DC86A5F-C793-4848-901F-04BFB57A07F6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"13.1.0\",\"versionEndIncluding\":\"13.1.3\",\"matchCriteriaId\":\"0772A366-87B9-40EC-9F63-AE0FF0EF5002\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"14.1.0\",\"versionEndIncluding\":\"14.1.2\",\"matchCriteriaId\":\"3D4B5A46-AA7B-416F-BA97-76A0BA232C6F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"15.0.0\",\"versionEndIncluding\":\"15.0.1\",\"matchCriteriaId\":\"59D9F39B-206B-4E76-A811-1CAA705A60EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.5.2\",\"versionEndIncluding\":\"11.6.5\",\"matchCriteriaId\":\"9BD61B6A-4E98-4D2C-92BC-FED15CEE39A6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"12.1.0\",\"versionEndIncluding\":\"12.1.5\",\"matchCriteriaId\":\"2E5552A3-91CD-4B97-AD33-4F1FB4C8827A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"13.1.0\",\"versionEndIncluding\":\"13.1.3\",\"matchCriteriaId\":\"8A53C692-D353-42E3-9148-F850DA11884F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"14.1.0\",\"versionEndIncluding\":\"14.1.2\",\"matchCriteriaId\":\"05106312-E60D-4CF1-B4C8-6F1EF5AF8D75\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"15.0.0\",\"versionEndIncluding\":\"15.0.1\",\"matchCriteriaId\":\"70099A38-3B84-4C40-8590-BE6C8F7C21A7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.5.2\",\"versionEndIncluding\":\"11.6.5\",\"matchCriteriaId\":\"A9A8A5C3-0C38-4F46-8F98-DC3B9C58D660\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"12.1.0\",\"versionEndIncluding\":\"12.1.5\",\"matchCriteriaId\":\"55C2EC23-E78F-4447-BACF-21FC36ABF155\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"13.1.0\",\"versionEndIncluding\":\"13.1.3\",\"matchCriteriaId\":\"A35AC237-573B-4309-87EF-3945FA2449BF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"14.1.0\",\"versionEndIncluding\":\"14.1.2\",\"matchCriteriaId\":\"27ABD6A3-5D67-4543-BB90-602F17A98B52\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"15.0.0\",\"versionEndIncluding\":\"15.0.1\",\"matchCriteriaId\":\"1DE40473-ABAE-4D91-8EBB-FB5719E107F6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.5.2\",\"versionEndIncluding\":\"11.6.5\",\"matchCriteriaId\":\"96E945EE-A623-4775-83B9-4CF81B7EA70F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"12.1.0\",\"versionEndIncluding\":\"12.1.5\",\"matchCriteriaId\":\"945A19E8-51EB-42FE-9BF1-12DAC78B5286\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"13.1.0\",\"versionEndIncluding\":\"13.1.3\",\"matchCriteriaId\":\"0B6C3F50-BD60-4A8C-8DBB-680DA4D6BE6D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"14.1.0\",\"versionEndIncluding\":\"14.1.2\",\"matchCriteriaId\":\"B1B2D963-4E55-45B5-80E0-BC6FFB2122F7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"15.0.0\",\"versionEndIncluding\":\"15.0.1\",\"matchCriteriaId\":\"18B5A918-F9AA-4889-94A7-33E6E54CF383\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.5.2\",\"versionEndIncluding\":\"11.6.5\",\"matchCriteriaId\":\"92484170-2E91-45F6-9789-B0DF3F5E6260\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"12.1.0\",\"versionEndIncluding\":\"12.1.5\",\"matchCriteriaId\":\"EB5007D0-BBDB-4D74-9C88-98FBA74757D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"13.1.0\",\"versionEndIncluding\":\"13.1.3\",\"matchCriteriaId\":\"FB07E847-6083-4CC8-8A62-6B9744B87088\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"14.1.0\",\"versionEndIncluding\":\"14.1.2\",\"matchCriteriaId\":\"D8BBD637-148A-4E1A-B2DC-129BCD121C1E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"15.0.0\",\"versionEndIncluding\":\"15.0.1\",\"matchCriteriaId\":\"EF606356-8191-478D-AF60-D48A408CD9ED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.5.2\",\"versionEndIncluding\":\"11.6.5\",\"matchCriteriaId\":\"0A16FE69-A466-4FA6-BDDA-794C9F2B36FD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"12.1.0\",\"versionEndIncluding\":\"12.1.5\",\"matchCriteriaId\":\"B7725810-66D2-4460-A174-9F3BFAD966F2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"13.1.0\",\"versionEndIncluding\":\"13.1.3\",\"matchCriteriaId\":\"0620AA57-83D1-41E6-8ABB-99F3FABB10F0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"14.1.0\",\"versionEndIncluding\":\"14.1.2\",\"matchCriteriaId\":\"A93AAEB9-556E-4F94-ADEC-D9C294B7F37E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"15.0.0\",\"versionEndIncluding\":\"15.0.1\",\"matchCriteriaId\":\"FA3E37E6-64B9-4668-AC01-933711E1C934\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.5.2\",\"versionEndIncluding\":\"11.6.5\",\"matchCriteriaId\":\"039E73A1-9F90-46A4-BFEE-5E97BAF3FAA6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"12.1.0\",\"versionEndIncluding\":\"12.1.5\",\"matchCriteriaId\":\"EFD760FE-4347-4D36-B5C6-4009398060F2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"13.1.0\",\"versionEndIncluding\":\"13.1.3\",\"matchCriteriaId\":\"BF552D91-612A-43E1-B2D6-02E2515FEA22\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"14.1.0\",\"versionEndIncluding\":\"14.1.2\",\"matchCriteriaId\":\"7C8D0EF7-9C65-4491-B358-DB1AAB0EA1FF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"15.0.0\",\"versionEndIncluding\":\"15.0.1\",\"matchCriteriaId\":\"8CCD3CF9-EA9D-43FF-8ADA-713B4B5C468E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.5.2\",\"versionEndIncluding\":\"11.6.5\",\"matchCriteriaId\":\"43581457-5C55-4B31-BEFA-4B59B2744BB8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"12.1.0\",\"versionEndIncluding\":\"12.1.5\",\"matchCriteriaId\":\"65B76F53-7D8B-477E-8B6E-91AC0A9009FF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"13.1.0\",\"versionEndIncluding\":\"13.1.3\",\"matchCriteriaId\":\"6704F0A6-16E2-4C2D-B5BD-EDDEAD5C153C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"14.1.0\",\"versionEndIncluding\":\"14.1.2\",\"matchCriteriaId\":\"79B0C4C9-FCA9-4108-B349-2EFBB4A1153B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"15.0.0\",\"versionEndIncluding\":\"15.0.1\",\"matchCriteriaId\":\"EC6612AB-E46B-4A8B-9B3E-C711D8C27962\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-iq_centralized_management:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.2.0\",\"versionEndIncluding\":\"5.4.0\",\"matchCriteriaId\":\"14A4E46D-F0DB-4201-9102-EC89FACBE780\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-iq_centralized_management:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.0.0\",\"versionEndIncluding\":\"6.1.0\",\"matchCriteriaId\":\"F37D18F2-8C6A-4557-85DC-2A751595423C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-iq_centralized_management:7.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B589C35-55F2-4D40-B5A6-8267EE20D627\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:enterprise_manager:3.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D5F5FEE7-059A-4A9B-BCCD-18F0AA435040\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:openshift_container_platform:4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"064E7BDD-4EF0-4A0D-A38D-8C75BAFEDCEF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:openshift_container_platform:4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C85A84D-A70F-4B02-9E5D-CD9660ABF048\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"51EF4996-72F4-4FA4-814F-F5991E7A8318\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B353CE99-D57C-465B-AAB0-73EF581127D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7431ABC1-9252-419E-8CC1-311B41360078\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF77CDCF-B9C9-427D-B2BF-36650FB2148C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"21690BAC-2129-4A33-9B48-1F3BF30072A9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_eus:8.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F2FF6D89-9361-45B9-ABCC-1A5E600BD63C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B76AA310-FEC7-497F-AF04-C3EC1E76C4CC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"17F256A9-D3B9-4C72-B013-4EFD878BFEA8\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:oracle:solaris:11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8E8C192B-8044-4BF9-9F1F-57371FC0E8FD\"}]}]}],\"references\":[{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00042.html\",\"source\":\"secure@intel.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:3916\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:3936\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:3941\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2020:0026\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2020:0028\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2020:0204\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I5WWPW4BSZDDW7VHU427XTVXV7ROOFFW/\",\"source\":\"secure@intel.com\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IZYATWNUGHRBG6I3TC24YHP5Y3J7I6KH/\",\"source\":\"secure@intel.com\"},{\"url\":\"https://seclists.org/bugtraq/2020/Jan/21\",\"source\":\"secure@intel.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/202003-56\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.f5.com/csp/article/K17269881?utm_source=f5support\u0026amp%3Butm_medium=RSS\",\"source\":\"secure@intel.com\"},{\"url\":\"https://usn.ubuntu.com/4186-2/\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2020/dsa-4602\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html\",\"source\":\"secure@intel.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpujul2020.html\",\"source\":\"secure@intel.com\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00042.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:3916\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:3936\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:3941\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2020:0026\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2020:0028\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2020:0204\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I5WWPW4BSZDDW7VHU427XTVXV7ROOFFW/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IZYATWNUGHRBG6I3TC24YHP5Y3J7I6KH/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://seclists.org/bugtraq/2020/Jan/21\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/202003-56\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.f5.com/csp/article/K17269881?utm_source=f5support\u0026amp%3Butm_medium=RSS\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://usn.ubuntu.com/4186-2/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2020/dsa-4602\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpujul2020.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]}]}}"
}
}
rhsa-2019_3844
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel-rt is now available for Red Hat Enterprise MRG 2.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* hw: Machine Check Error on Page Size Change (IFU) (CVE-2018-12207)\n\n* hw: TSX Transaction Asynchronous Abort (TAA) (CVE-2019-11135)\n\n* hw: Intel GPU Denial Of Service while accessing MMIO in lower power state (CVE-2019-0154)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2019:3844",
"url": "https://access.redhat.com/errata/RHSA-2019:3844"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce",
"url": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/tsx-asynchronousabort",
"url": "https://access.redhat.com/solutions/tsx-asynchronousabort"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/i915-graphics",
"url": "https://access.redhat.com/solutions/i915-graphics"
},
{
"category": "external",
"summary": "1646768",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646768"
},
{
"category": "external",
"summary": "1724393",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1724393"
},
{
"category": "external",
"summary": "1753062",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753062"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_3844.json"
}
],
"title": "Red Hat Security Advisory: kernel-rt security update",
"tracking": {
"current_release_date": "2024-11-15T03:17:38+00:00",
"generator": {
"date": "2024-11-15T03:17:38+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2019:3844",
"initial_release_date": "2019-11-12T21:08:54+00:00",
"revision_history": [
{
"date": "2019-11-12T21:08:54+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2019-11-12T21:08:54+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-15T03:17:38+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat MRG Realtime for RHEL 6 Server v.2",
"product": {
"name": "Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_mrg:2:server:el6"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise MRG for RHEL-6"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"product": {
"name": "kernel-rt-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"product_id": "kernel-rt-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@3.10.0-693.60.2.rt56.655.el6rt?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"product": {
"name": "kernel-rt-debug-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"product_id": "kernel-rt-debug-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug@3.10.0-693.60.2.rt56.655.el6rt?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"product": {
"name": "kernel-rt-debug-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"product_id": "kernel-rt-debug-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-devel@3.10.0-693.60.2.rt56.655.el6rt?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"product": {
"name": "kernel-rt-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"product_id": "kernel-rt-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-devel@3.10.0-693.60.2.rt56.655.el6rt?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"product": {
"name": "kernel-rt-trace-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"product_id": "kernel-rt-trace-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace@3.10.0-693.60.2.rt56.655.el6rt?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"product": {
"name": "kernel-rt-trace-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"product_id": "kernel-rt-trace-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace-devel@3.10.0-693.60.2.rt56.655.el6rt?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-vanilla-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"product": {
"name": "kernel-rt-vanilla-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"product_id": "kernel-rt-vanilla-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-vanilla@3.10.0-693.60.2.rt56.655.el6rt?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-vanilla-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"product": {
"name": "kernel-rt-vanilla-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"product_id": "kernel-rt-vanilla-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-vanilla-devel@3.10.0-693.60.2.rt56.655.el6rt?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"product": {
"name": "kernel-rt-debug-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"product_id": "kernel-rt-debug-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@3.10.0-693.60.2.rt56.655.el6rt?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"product": {
"name": "kernel-rt-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"product_id": "kernel-rt-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo@3.10.0-693.60.2.rt56.655.el6rt?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"product": {
"name": "kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"product_id": "kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@3.10.0-693.60.2.rt56.655.el6rt?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"product": {
"name": "kernel-rt-trace-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"product_id": "kernel-rt-trace-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace-debuginfo@3.10.0-693.60.2.rt56.655.el6rt?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-vanilla-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"product": {
"name": "kernel-rt-vanilla-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"product_id": "kernel-rt-vanilla-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-vanilla-debuginfo@3.10.0-693.60.2.rt56.655.el6rt?arch=x86_64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-1:3.10.0-693.60.2.rt56.655.el6rt.src",
"product": {
"name": "kernel-rt-1:3.10.0-693.60.2.rt56.655.el6rt.src",
"product_id": "kernel-rt-1:3.10.0-693.60.2.rt56.655.el6rt.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@3.10.0-693.60.2.rt56.655.el6rt?arch=src\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-doc-1:3.10.0-693.60.2.rt56.655.el6rt.noarch",
"product": {
"name": "kernel-rt-doc-1:3.10.0-693.60.2.rt56.655.el6rt.noarch",
"product_id": "kernel-rt-doc-1:3.10.0-693.60.2.rt56.655.el6rt.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-doc@3.10.0-693.60.2.rt56.655.el6rt?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-firmware-1:3.10.0-693.60.2.rt56.655.el6rt.noarch",
"product": {
"name": "kernel-rt-firmware-1:3.10.0-693.60.2.rt56.655.el6rt.noarch",
"product_id": "kernel-rt-firmware-1:3.10.0-693.60.2.rt56.655.el6rt.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-firmware@3.10.0-693.60.2.rt56.655.el6rt?arch=noarch\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-1:3.10.0-693.60.2.rt56.655.el6rt.src as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.60.2.rt56.655.el6rt.src"
},
"product_reference": "kernel-rt-1:3.10.0-693.60.2.rt56.655.el6rt.src",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64"
},
"product_reference": "kernel-rt-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64"
},
"product_reference": "kernel-rt-debug-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64"
},
"product_reference": "kernel-rt-debug-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64"
},
"product_reference": "kernel-rt-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64"
},
"product_reference": "kernel-rt-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-doc-1:3.10.0-693.60.2.rt56.655.el6rt.noarch as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.60.2.rt56.655.el6rt.noarch"
},
"product_reference": "kernel-rt-doc-1:3.10.0-693.60.2.rt56.655.el6rt.noarch",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-firmware-1:3.10.0-693.60.2.rt56.655.el6rt.noarch as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.60.2.rt56.655.el6rt.noarch"
},
"product_reference": "kernel-rt-firmware-1:3.10.0-693.60.2.rt56.655.el6rt.noarch",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64"
},
"product_reference": "kernel-rt-trace-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64"
},
"product_reference": "kernel-rt-trace-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64"
},
"product_reference": "kernel-rt-trace-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-vanilla-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64"
},
"product_reference": "kernel-rt-vanilla-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-vanilla-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64"
},
"product_reference": "kernel-rt-vanilla-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-vanilla-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64"
},
"product_reference": "kernel-rt-vanilla-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Intel"
]
},
{
"names": [
"Deepak Gupta"
],
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2018-12207",
"cwe": {
"id": "CWE-226",
"name": "Sensitive Information in Resource Not Removed Before Reuse"
},
"discovery_date": "2018-11-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1646768"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way Intel CPUs handle inconsistency between, virtual to physical memory address translations in CPU\u0027s local cache and system software\u0027s Paging structure entries. A privileged guest user may use this flaw to induce a hardware Machine Check Error on the host processor, resulting in a severe DoS scenario by halting the processor.\r\n\r\nSystem software like OS OR Virtual Machine Monitor (VMM) use virtual memory system for storing program instructions and data in memory. Virtual Memory system uses Paging structures like Page Tables and Page Directories to manage system memory. The processor\u0027s Memory Management Unit (MMU) uses Paging structure entries to translate program\u0027s virtual memory addresses to physical memory addresses. The processor stores these address translations into its local cache buffer called - Translation Lookaside Buffer (TLB). TLB has two parts, one for instructions and other for data addresses.\r\n\r\nSystem software can modify its Paging structure entries to change address mappings OR certain attributes like page size etc. Upon such Paging structure alterations in memory, system software must invalidate the corresponding address translations in the processor\u0027s TLB cache. But before this TLB invalidation takes place, a privileged guest user may trigger an instruction fetch operation, which could use an already cached, but now invalid, virtual to physical address translation from Instruction TLB (ITLB). Thus accessing an invalid physical memory address and resulting in halting the processor due to the Machine Check Error (MCE) on Page Size Change.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: Machine Check Error on Page Size Change (IFU)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.60.2.rt56.655.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.60.2.rt56.655.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.60.2.rt56.655.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-12207"
},
{
"category": "external",
"summary": "RHBZ#1646768",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646768"
},
{
"category": "external",
"summary": "RHSB-ifu-page-mce",
"url": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-12207",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12207"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-12207",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12207"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-11-12T21:08:54+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.60.2.rt56.655.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.60.2.rt56.655.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.60.2.rt56.655.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:3844"
},
{
"category": "workaround",
"details": "For mitigation related information, please refer to the Red Hat vulnerability article: https://access.redhat.com/security/vulnerabilities/ifu-page-mce .",
"product_ids": [
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.60.2.rt56.655.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.60.2.rt56.655.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.60.2.rt56.655.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.60.2.rt56.655.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.60.2.rt56.655.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.60.2.rt56.655.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: Machine Check Error on Page Size Change (IFU)"
},
{
"acknowledgments": [
{
"names": [
"Intel"
]
}
],
"cve": "CVE-2019-0154",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"discovery_date": "2019-06-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1724393"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Intel graphics hardware (GPU) where a local attacker with the ability to issue an ioctl could trigger a hardware level crash if MMIO registers were read while the graphics card was in a low-power state. This creates a denial of service situation and the GPU and connected displays will remain unusable until a reboot occurs.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: Intel GPU Denial Of Service while accessing MMIO in lower power state",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Intel plans to release BIOS firmware to correct this issue. Red Hat\u0027s kernel update should mitigate this vulnerability. Some older hardware will not have BIOS firmware update and will rely on operating system level protection to prevent access while the device is in low-power states. For more information see https://access.redhat.com/solutions/i915-graphics",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.60.2.rt56.655.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.60.2.rt56.655.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.60.2.rt56.655.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-0154"
},
{
"category": "external",
"summary": "RHBZ#1724393",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1724393"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-0154",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0154"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-0154",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0154"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/i915-graphics",
"url": "https://access.redhat.com/solutions/i915-graphics"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00260.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00260.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-11-12T21:08:54+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.60.2.rt56.655.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.60.2.rt56.655.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.60.2.rt56.655.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:3844"
},
{
"category": "workaround",
"details": "Preventing loading of the i915 kernel module will prevent attackers from using this exploit against the system however the power management functionality of the card will be disabled and the system may draw additional power. See this KCS article (https://access.redhat.com/solutions/41278) for instructions on how to disable a kernel module. Graphical displays may also be at low resolution or not work correctly. This mitigation may not be suitable if running graphical tools locally is required.",
"product_ids": [
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.60.2.rt56.655.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.60.2.rt56.655.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.60.2.rt56.655.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.60.2.rt56.655.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.60.2.rt56.655.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.60.2.rt56.655.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: Intel GPU Denial Of Service while accessing MMIO in lower power state"
},
{
"acknowledgments": [
{
"names": [
"Intel"
]
}
],
"cve": "CVE-2019-11135",
"cwe": {
"id": "CWE-203",
"name": "Observable Discrepancy"
},
"discovery_date": "2019-09-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1753062"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way Intel CPUs handle speculative execution of instructions when the TSX Asynchronous Abort (TAA) error occurs. A local authenticated attacker with the ability to monitor execution times could infer the TSX memory state by comparing abort execution times. This could allow information disclosure via this observed side-channel for any TSX transaction being executed while an attacker is able to observe abort timing.\r\n\r\nIntel\u0027s Transactional Synchronisation Extensions (TSX) are set of instructions which enable transactional memory support to improve performance of the multi-threaded applications, in the lock-protected critical sections. The CPU executes instructions in the critical-sections as transactions, while ensuring their atomic state. When such transaction execution is unsuccessful, the processor cannot ensure atomic updates to the transaction memory, so the processor rolls back or aborts such transaction execution.\r\n\r\nWhile TSX Asynchronous Abort (TAA) is pending, CPU may continue to read data from architectural buffers and pass it to the dependent speculative operations. This may cause information leakage via speculative side-channel means, which is quite similar to the Microarchitectural Data Sampling (MDS) issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: TSX Transaction Asynchronous Abort (TAA)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "libvirt and qemu-kvm on Red Hat Enterprise Linux 6 are not affected by this vulnerability as they do not support MSR-based CPU features.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.60.2.rt56.655.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.60.2.rt56.655.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.60.2.rt56.655.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11135"
},
{
"category": "external",
"summary": "RHBZ#1753062",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753062"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11135",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11135"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11135",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11135"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/tsx-asynchronousabort",
"url": "https://access.redhat.com/solutions/tsx-asynchronousabort"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00270.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00270.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-11-12T21:08:54+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.60.2.rt56.655.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.60.2.rt56.655.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.60.2.rt56.655.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:3844"
},
{
"category": "workaround",
"details": "For mitigation related information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/solutions/tsx-asynchronousabort",
"product_ids": [
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.60.2.rt56.655.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.60.2.rt56.655.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.60.2.rt56.655.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.60.2.rt56.655.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.60.2.rt56.655.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.60.2.rt56.655.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: TSX Transaction Asynchronous Abort (TAA)"
}
]
}
rhsa-2019:3835
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* hw: Machine Check Error on Page Size Change (IFU) (CVE-2018-12207)\n\n* hw: TSX Transaction Asynchronous Abort (TAA) (CVE-2019-11135)\n\n* hw: Intel GPU Denial Of Service while accessing MMIO in lower power state (CVE-2019-0154)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2019:3835",
"url": "https://access.redhat.com/errata/RHSA-2019:3835"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce",
"url": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/tsx-asynchronousabort",
"url": "https://access.redhat.com/solutions/tsx-asynchronousabort"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/i915-graphics",
"url": "https://access.redhat.com/solutions/i915-graphics"
},
{
"category": "external",
"summary": "1646768",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646768"
},
{
"category": "external",
"summary": "1724393",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1724393"
},
{
"category": "external",
"summary": "1753062",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753062"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_3835.json"
}
],
"title": "Red Hat Security Advisory: kernel-rt security update",
"tracking": {
"current_release_date": "2025-10-09T18:15:54+00:00",
"generator": {
"date": "2025-10-09T18:15:54+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2019:3835",
"initial_release_date": "2019-11-12T19:26:53+00:00",
"revision_history": [
{
"date": "2019-11-12T19:26:53+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2019-11-12T19:26:53+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T18:15:54+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.7.Z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras_rt:7"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Realtime (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.7.Z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras_rt:7"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"product": {
"name": "kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"product_id": "kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@3.10.0-1062.4.2.rt56.1028.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"product": {
"name": "kernel-rt-debug-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"product_id": "kernel-rt-debug-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug@3.10.0-1062.4.2.rt56.1028.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"product": {
"name": "kernel-rt-debug-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"product_id": "kernel-rt-debug-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-devel@3.10.0-1062.4.2.rt56.1028.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"product": {
"name": "kernel-rt-debug-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"product_id": "kernel-rt-debug-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@3.10.0-1062.4.2.rt56.1028.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"product": {
"name": "kernel-rt-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"product_id": "kernel-rt-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-devel@3.10.0-1062.4.2.rt56.1028.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"product": {
"name": "kernel-rt-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"product_id": "kernel-rt-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-kvm@3.10.0-1062.4.2.rt56.1028.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"product": {
"name": "kernel-rt-trace-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"product_id": "kernel-rt-trace-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace@3.10.0-1062.4.2.rt56.1028.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"product": {
"name": "kernel-rt-trace-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"product_id": "kernel-rt-trace-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace-devel@3.10.0-1062.4.2.rt56.1028.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"product": {
"name": "kernel-rt-trace-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"product_id": "kernel-rt-trace-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace-kvm@3.10.0-1062.4.2.rt56.1028.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"product": {
"name": "kernel-rt-debug-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"product_id": "kernel-rt-debug-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@3.10.0-1062.4.2.rt56.1028.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"product": {
"name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"product_id": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-kvm-debuginfo@3.10.0-1062.4.2.rt56.1028.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"product": {
"name": "kernel-rt-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"product_id": "kernel-rt-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo@3.10.0-1062.4.2.rt56.1028.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"product": {
"name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"product_id": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@3.10.0-1062.4.2.rt56.1028.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"product": {
"name": "kernel-rt-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"product_id": "kernel-rt-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-kvm-debuginfo@3.10.0-1062.4.2.rt56.1028.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"product": {
"name": "kernel-rt-trace-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"product_id": "kernel-rt-trace-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace-debuginfo@3.10.0-1062.4.2.rt56.1028.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"product": {
"name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"product_id": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace-kvm-debuginfo@3.10.0-1062.4.2.rt56.1028.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.src",
"product": {
"name": "kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.src",
"product_id": "kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@3.10.0-1062.4.2.rt56.1028.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-doc-0:3.10.0-1062.4.2.rt56.1028.el7.noarch",
"product": {
"name": "kernel-rt-doc-0:3.10.0-1062.4.2.rt56.1028.el7.noarch",
"product_id": "kernel-rt-doc-0:3.10.0-1062.4.2.rt56.1028.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-doc@3.10.0-1062.4.2.rt56.1028.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.src as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.src"
},
"product_reference": "kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.src",
"relates_to_product_reference": "7Server-NFV-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64"
},
"product_reference": "kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.7.Z:kernel-rt-debug-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64"
},
"product_reference": "kernel-rt-debug-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.7.Z:kernel-rt-debug-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.7.Z:kernel-rt-debug-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.7.Z:kernel-rt-debug-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.7.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.7.Z:kernel-rt-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.7.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.7.Z:kernel-rt-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64"
},
"product_reference": "kernel-rt-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-doc-0:3.10.0-1062.4.2.rt56.1028.el7.noarch as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.7.Z:kernel-rt-doc-0:3.10.0-1062.4.2.rt56.1028.el7.noarch"
},
"product_reference": "kernel-rt-doc-0:3.10.0-1062.4.2.rt56.1028.el7.noarch",
"relates_to_product_reference": "7Server-NFV-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.7.Z:kernel-rt-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64"
},
"product_reference": "kernel-rt-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.7.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64"
},
"product_reference": "kernel-rt-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.7.Z:kernel-rt-trace-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64"
},
"product_reference": "kernel-rt-trace-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.7.Z:kernel-rt-trace-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64"
},
"product_reference": "kernel-rt-trace-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.7.Z:kernel-rt-trace-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64"
},
"product_reference": "kernel-rt-trace-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.7.Z:kernel-rt-trace-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64"
},
"product_reference": "kernel-rt-trace-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.7.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64"
},
"product_reference": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.src as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.src"
},
"product_reference": "kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.src",
"relates_to_product_reference": "7Server-RT-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64"
},
"product_reference": "kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.7.Z:kernel-rt-debug-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64"
},
"product_reference": "kernel-rt-debug-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.7.Z:kernel-rt-debug-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.7.Z:kernel-rt-debug-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.7.Z:kernel-rt-debug-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.7.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.7.Z:kernel-rt-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.7.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.7.Z:kernel-rt-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64"
},
"product_reference": "kernel-rt-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-doc-0:3.10.0-1062.4.2.rt56.1028.el7.noarch as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.7.Z:kernel-rt-doc-0:3.10.0-1062.4.2.rt56.1028.el7.noarch"
},
"product_reference": "kernel-rt-doc-0:3.10.0-1062.4.2.rt56.1028.el7.noarch",
"relates_to_product_reference": "7Server-RT-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.7.Z:kernel-rt-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64"
},
"product_reference": "kernel-rt-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.7.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64"
},
"product_reference": "kernel-rt-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.7.Z:kernel-rt-trace-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64"
},
"product_reference": "kernel-rt-trace-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.7.Z:kernel-rt-trace-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64"
},
"product_reference": "kernel-rt-trace-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.7.Z:kernel-rt-trace-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64"
},
"product_reference": "kernel-rt-trace-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.7.Z:kernel-rt-trace-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64"
},
"product_reference": "kernel-rt-trace-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.7.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64"
},
"product_reference": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.7.Z"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Intel"
]
},
{
"names": [
"Deepak Gupta"
],
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2018-12207",
"cwe": {
"id": "CWE-226",
"name": "Sensitive Information in Resource Not Removed Before Reuse"
},
"discovery_date": "2018-11-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1646768"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way Intel CPUs handle inconsistency between, virtual to physical memory address translations in CPU\u0027s local cache and system software\u0027s Paging structure entries. A privileged guest user may use this flaw to induce a hardware Machine Check Error on the host processor, resulting in a severe DoS scenario by halting the processor.\r\n\r\nSystem software like OS OR Virtual Machine Monitor (VMM) use virtual memory system for storing program instructions and data in memory. Virtual Memory system uses Paging structures like Page Tables and Page Directories to manage system memory. The processor\u0027s Memory Management Unit (MMU) uses Paging structure entries to translate program\u0027s virtual memory addresses to physical memory addresses. The processor stores these address translations into its local cache buffer called - Translation Lookaside Buffer (TLB). TLB has two parts, one for instructions and other for data addresses.\r\n\r\nSystem software can modify its Paging structure entries to change address mappings OR certain attributes like page size etc. Upon such Paging structure alterations in memory, system software must invalidate the corresponding address translations in the processor\u0027s TLB cache. But before this TLB invalidation takes place, a privileged guest user may trigger an instruction fetch operation, which could use an already cached, but now invalid, virtual to physical address translation from Instruction TLB (ITLB). Thus accessing an invalid physical memory address and resulting in halting the processor due to the Machine Check Error (MCE) on Page Size Change.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: Machine Check Error on Page Size Change (IFU)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-NFV-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.src",
"7Server-NFV-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-doc-0:3.10.0-1062.4.2.rt56.1028.el7.noarch",
"7Server-NFV-7.7.Z:kernel-rt-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.src",
"7Server-RT-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-doc-0:3.10.0-1062.4.2.rt56.1028.el7.noarch",
"7Server-RT-7.7.Z:kernel-rt-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-12207"
},
{
"category": "external",
"summary": "RHBZ#1646768",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646768"
},
{
"category": "external",
"summary": "RHSB-ifu-page-mce",
"url": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-12207",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12207"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-12207",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12207"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-11-12T19:26:53+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-NFV-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.src",
"7Server-NFV-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-doc-0:3.10.0-1062.4.2.rt56.1028.el7.noarch",
"7Server-NFV-7.7.Z:kernel-rt-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.src",
"7Server-RT-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-doc-0:3.10.0-1062.4.2.rt56.1028.el7.noarch",
"7Server-RT-7.7.Z:kernel-rt-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:3835"
},
{
"category": "workaround",
"details": "For mitigation related information, please refer to the Red Hat vulnerability article: https://access.redhat.com/security/vulnerabilities/ifu-page-mce .",
"product_ids": [
"7Server-NFV-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.src",
"7Server-NFV-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-doc-0:3.10.0-1062.4.2.rt56.1028.el7.noarch",
"7Server-NFV-7.7.Z:kernel-rt-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.src",
"7Server-RT-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-doc-0:3.10.0-1062.4.2.rt56.1028.el7.noarch",
"7Server-RT-7.7.Z:kernel-rt-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7Server-NFV-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.src",
"7Server-NFV-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-doc-0:3.10.0-1062.4.2.rt56.1028.el7.noarch",
"7Server-NFV-7.7.Z:kernel-rt-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.src",
"7Server-RT-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-doc-0:3.10.0-1062.4.2.rt56.1028.el7.noarch",
"7Server-RT-7.7.Z:kernel-rt-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: Machine Check Error on Page Size Change (IFU)"
},
{
"acknowledgments": [
{
"names": [
"Intel"
]
}
],
"cve": "CVE-2019-0154",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"discovery_date": "2019-06-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1724393"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Intel graphics hardware (GPU) where a local attacker with the ability to issue an ioctl could trigger a hardware level crash if MMIO registers were read while the graphics card was in a low-power state. This creates a denial of service situation and the GPU and connected displays will remain unusable until a reboot occurs.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: Intel GPU Denial Of Service while accessing MMIO in lower power state",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Intel plans to release BIOS firmware to correct this issue. Red Hat\u0027s kernel update should mitigate this vulnerability. Some older hardware will not have BIOS firmware update and will rely on operating system level protection to prevent access while the device is in low-power states. For more information see https://access.redhat.com/solutions/i915-graphics",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-NFV-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.src",
"7Server-NFV-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-doc-0:3.10.0-1062.4.2.rt56.1028.el7.noarch",
"7Server-NFV-7.7.Z:kernel-rt-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.src",
"7Server-RT-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-doc-0:3.10.0-1062.4.2.rt56.1028.el7.noarch",
"7Server-RT-7.7.Z:kernel-rt-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-0154"
},
{
"category": "external",
"summary": "RHBZ#1724393",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1724393"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-0154",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0154"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-0154",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0154"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/i915-graphics",
"url": "https://access.redhat.com/solutions/i915-graphics"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00260.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00260.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-11-12T19:26:53+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-NFV-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.src",
"7Server-NFV-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-doc-0:3.10.0-1062.4.2.rt56.1028.el7.noarch",
"7Server-NFV-7.7.Z:kernel-rt-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.src",
"7Server-RT-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-doc-0:3.10.0-1062.4.2.rt56.1028.el7.noarch",
"7Server-RT-7.7.Z:kernel-rt-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:3835"
},
{
"category": "workaround",
"details": "Preventing loading of the i915 kernel module will prevent attackers from using this exploit against the system however the power management functionality of the card will be disabled and the system may draw additional power. See this KCS article (https://access.redhat.com/solutions/41278) for instructions on how to disable a kernel module. Graphical displays may also be at low resolution or not work correctly. This mitigation may not be suitable if running graphical tools locally is required.",
"product_ids": [
"7Server-NFV-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.src",
"7Server-NFV-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-doc-0:3.10.0-1062.4.2.rt56.1028.el7.noarch",
"7Server-NFV-7.7.Z:kernel-rt-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.src",
"7Server-RT-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-doc-0:3.10.0-1062.4.2.rt56.1028.el7.noarch",
"7Server-RT-7.7.Z:kernel-rt-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7Server-NFV-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.src",
"7Server-NFV-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-doc-0:3.10.0-1062.4.2.rt56.1028.el7.noarch",
"7Server-NFV-7.7.Z:kernel-rt-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.src",
"7Server-RT-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-doc-0:3.10.0-1062.4.2.rt56.1028.el7.noarch",
"7Server-RT-7.7.Z:kernel-rt-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: Intel GPU Denial Of Service while accessing MMIO in lower power state"
},
{
"acknowledgments": [
{
"names": [
"Intel"
]
}
],
"cve": "CVE-2019-11135",
"cwe": {
"id": "CWE-203",
"name": "Observable Discrepancy"
},
"discovery_date": "2019-09-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1753062"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way Intel CPUs handle speculative execution of instructions when the TSX Asynchronous Abort (TAA) error occurs. A local authenticated attacker with the ability to monitor execution times could infer the TSX memory state by comparing abort execution times. This could allow information disclosure via this observed side-channel for any TSX transaction being executed while an attacker is able to observe abort timing.\r\n\r\nIntel\u0027s Transactional Synchronisation Extensions (TSX) are set of instructions which enable transactional memory support to improve performance of the multi-threaded applications, in the lock-protected critical sections. The CPU executes instructions in the critical-sections as transactions, while ensuring their atomic state. When such transaction execution is unsuccessful, the processor cannot ensure atomic updates to the transaction memory, so the processor rolls back or aborts such transaction execution.\r\n\r\nWhile TSX Asynchronous Abort (TAA) is pending, CPU may continue to read data from architectural buffers and pass it to the dependent speculative operations. This may cause information leakage via speculative side-channel means, which is quite similar to the Microarchitectural Data Sampling (MDS) issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: TSX Transaction Asynchronous Abort (TAA)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "libvirt and qemu-kvm on Red Hat Enterprise Linux 6 are not affected by this vulnerability as they do not support MSR-based CPU features.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-NFV-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.src",
"7Server-NFV-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-doc-0:3.10.0-1062.4.2.rt56.1028.el7.noarch",
"7Server-NFV-7.7.Z:kernel-rt-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.src",
"7Server-RT-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-doc-0:3.10.0-1062.4.2.rt56.1028.el7.noarch",
"7Server-RT-7.7.Z:kernel-rt-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11135"
},
{
"category": "external",
"summary": "RHBZ#1753062",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753062"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11135",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11135"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11135",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11135"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/tsx-asynchronousabort",
"url": "https://access.redhat.com/solutions/tsx-asynchronousabort"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00270.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00270.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-11-12T19:26:53+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-NFV-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.src",
"7Server-NFV-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-doc-0:3.10.0-1062.4.2.rt56.1028.el7.noarch",
"7Server-NFV-7.7.Z:kernel-rt-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.src",
"7Server-RT-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-doc-0:3.10.0-1062.4.2.rt56.1028.el7.noarch",
"7Server-RT-7.7.Z:kernel-rt-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:3835"
},
{
"category": "workaround",
"details": "For mitigation related information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/solutions/tsx-asynchronousabort",
"product_ids": [
"7Server-NFV-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.src",
"7Server-NFV-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-doc-0:3.10.0-1062.4.2.rt56.1028.el7.noarch",
"7Server-NFV-7.7.Z:kernel-rt-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.src",
"7Server-RT-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-doc-0:3.10.0-1062.4.2.rt56.1028.el7.noarch",
"7Server-RT-7.7.Z:kernel-rt-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"7Server-NFV-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.src",
"7Server-NFV-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-doc-0:3.10.0-1062.4.2.rt56.1028.el7.noarch",
"7Server-NFV-7.7.Z:kernel-rt-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.src",
"7Server-RT-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-doc-0:3.10.0-1062.4.2.rt56.1028.el7.noarch",
"7Server-RT-7.7.Z:kernel-rt-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: TSX Transaction Asynchronous Abort (TAA)"
}
]
}
rhsa-2019_3833
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* hw: Machine Check Error on Page Size Change (IFU) (CVE-2018-12207)\n\n* hw: TSX Transaction Asynchronous Abort (TAA) (CVE-2019-11135)\n\n* hw: Intel GPU Denial Of Service while accessing MMIO in lower power state (CVE-2019-0154)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2019:3833",
"url": "https://access.redhat.com/errata/RHSA-2019:3833"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce",
"url": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/tsx-asynchronousabort",
"url": "https://access.redhat.com/solutions/tsx-asynchronousabort"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/i915-graphics",
"url": "https://access.redhat.com/solutions/i915-graphics"
},
{
"category": "external",
"summary": "1646768",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646768"
},
{
"category": "external",
"summary": "1724393",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1724393"
},
{
"category": "external",
"summary": "1753062",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753062"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_3833.json"
}
],
"title": "Red Hat Security Advisory: kernel-rt security update",
"tracking": {
"current_release_date": "2024-11-15T03:17:29+00:00",
"generator": {
"date": "2024-11-15T03:17:29+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2019:3833",
"initial_release_date": "2019-11-12T20:49:30+00:00",
"revision_history": [
{
"date": "2019-11-12T20:49:30+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2019-11-12T20:49:30+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-15T03:17:29+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.1.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::nfv"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Real Time (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.1.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::realtime"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"product": {
"name": "kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"product_id": "kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@4.18.0-147.0.2.rt24.94.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"product": {
"name": "kernel-rt-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"product_id": "kernel-rt-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-core@4.18.0-147.0.2.rt24.94.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"product": {
"name": "kernel-rt-debug-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"product_id": "kernel-rt-debug-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug@4.18.0-147.0.2.rt24.94.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"product": {
"name": "kernel-rt-debug-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"product_id": "kernel-rt-debug-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-core@4.18.0-147.0.2.rt24.94.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"product": {
"name": "kernel-rt-debug-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"product_id": "kernel-rt-debug-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-devel@4.18.0-147.0.2.rt24.94.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"product": {
"name": "kernel-rt-debug-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"product_id": "kernel-rt-debug-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@4.18.0-147.0.2.rt24.94.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"product": {
"name": "kernel-rt-debug-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"product_id": "kernel-rt-debug-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules@4.18.0-147.0.2.rt24.94.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"product": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"product_id": "kernel-rt-debug-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules-extra@4.18.0-147.0.2.rt24.94.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"product": {
"name": "kernel-rt-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"product_id": "kernel-rt-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-devel@4.18.0-147.0.2.rt24.94.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"product": {
"name": "kernel-rt-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"product_id": "kernel-rt-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-kvm@4.18.0-147.0.2.rt24.94.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"product": {
"name": "kernel-rt-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"product_id": "kernel-rt-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules@4.18.0-147.0.2.rt24.94.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"product": {
"name": "kernel-rt-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"product_id": "kernel-rt-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules-extra@4.18.0-147.0.2.rt24.94.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"product": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"product_id": "kernel-rt-debug-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@4.18.0-147.0.2.rt24.94.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"product": {
"name": "kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"product_id": "kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-kvm-debuginfo@4.18.0-147.0.2.rt24.94.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"product": {
"name": "kernel-rt-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"product_id": "kernel-rt-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo@4.18.0-147.0.2.rt24.94.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"product": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"product_id": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@4.18.0-147.0.2.rt24.94.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"product": {
"name": "kernel-rt-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"product_id": "kernel-rt-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-kvm-debuginfo@4.18.0-147.0.2.rt24.94.el8_1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.src",
"product": {
"name": "kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.src",
"product_id": "kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@4.18.0-147.0.2.rt24.94.el8_1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.src as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.src"
},
"product_reference": "kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.src",
"relates_to_product_reference": "NFV-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64"
},
"product_reference": "kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"relates_to_product_reference": "NFV-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.1.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64"
},
"product_reference": "kernel-rt-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"relates_to_product_reference": "NFV-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64"
},
"product_reference": "kernel-rt-debug-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"relates_to_product_reference": "NFV-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"relates_to_product_reference": "NFV-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"relates_to_product_reference": "NFV-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"relates_to_product_reference": "NFV-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"relates_to_product_reference": "NFV-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"relates_to_product_reference": "NFV-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"relates_to_product_reference": "NFV-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"relates_to_product_reference": "NFV-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"relates_to_product_reference": "NFV-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"relates_to_product_reference": "NFV-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.1.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64"
},
"product_reference": "kernel-rt-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"relates_to_product_reference": "NFV-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64"
},
"product_reference": "kernel-rt-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"relates_to_product_reference": "NFV-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64"
},
"product_reference": "kernel-rt-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"relates_to_product_reference": "NFV-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.1.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64"
},
"product_reference": "kernel-rt-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"relates_to_product_reference": "NFV-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.1.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"relates_to_product_reference": "NFV-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.src as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.src"
},
"product_reference": "kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.src",
"relates_to_product_reference": "RT-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64"
},
"product_reference": "kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"relates_to_product_reference": "RT-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.1.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64"
},
"product_reference": "kernel-rt-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"relates_to_product_reference": "RT-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64"
},
"product_reference": "kernel-rt-debug-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"relates_to_product_reference": "RT-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"relates_to_product_reference": "RT-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"relates_to_product_reference": "RT-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"relates_to_product_reference": "RT-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"relates_to_product_reference": "RT-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"relates_to_product_reference": "RT-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"relates_to_product_reference": "RT-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"relates_to_product_reference": "RT-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"relates_to_product_reference": "RT-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"relates_to_product_reference": "RT-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.1.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64"
},
"product_reference": "kernel-rt-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"relates_to_product_reference": "RT-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64"
},
"product_reference": "kernel-rt-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"relates_to_product_reference": "RT-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64"
},
"product_reference": "kernel-rt-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"relates_to_product_reference": "RT-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.1.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64"
},
"product_reference": "kernel-rt-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"relates_to_product_reference": "RT-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.1.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"relates_to_product_reference": "RT-8.1.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Intel"
]
},
{
"names": [
"Deepak Gupta"
],
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2018-12207",
"cwe": {
"id": "CWE-226",
"name": "Sensitive Information in Resource Not Removed Before Reuse"
},
"discovery_date": "2018-11-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1646768"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way Intel CPUs handle inconsistency between, virtual to physical memory address translations in CPU\u0027s local cache and system software\u0027s Paging structure entries. A privileged guest user may use this flaw to induce a hardware Machine Check Error on the host processor, resulting in a severe DoS scenario by halting the processor.\r\n\r\nSystem software like OS OR Virtual Machine Monitor (VMM) use virtual memory system for storing program instructions and data in memory. Virtual Memory system uses Paging structures like Page Tables and Page Directories to manage system memory. The processor\u0027s Memory Management Unit (MMU) uses Paging structure entries to translate program\u0027s virtual memory addresses to physical memory addresses. The processor stores these address translations into its local cache buffer called - Translation Lookaside Buffer (TLB). TLB has two parts, one for instructions and other for data addresses.\r\n\r\nSystem software can modify its Paging structure entries to change address mappings OR certain attributes like page size etc. Upon such Paging structure alterations in memory, system software must invalidate the corresponding address translations in the processor\u0027s TLB cache. But before this TLB invalidation takes place, a privileged guest user may trigger an instruction fetch operation, which could use an already cached, but now invalid, virtual to physical address translation from Instruction TLB (ITLB). Thus accessing an invalid physical memory address and resulting in halting the processor due to the Machine Check Error (MCE) on Page Size Change.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: Machine Check Error on Page Size Change (IFU)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.src",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.src",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-12207"
},
{
"category": "external",
"summary": "RHBZ#1646768",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646768"
},
{
"category": "external",
"summary": "RHSB-ifu-page-mce",
"url": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-12207",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12207"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-12207",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12207"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-11-12T20:49:30+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.src",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.src",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:3833"
},
{
"category": "workaround",
"details": "For mitigation related information, please refer to the Red Hat vulnerability article: https://access.redhat.com/security/vulnerabilities/ifu-page-mce .",
"product_ids": [
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.src",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.src",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.src",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.src",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: Machine Check Error on Page Size Change (IFU)"
},
{
"acknowledgments": [
{
"names": [
"Intel"
]
}
],
"cve": "CVE-2019-0154",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"discovery_date": "2019-06-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1724393"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Intel graphics hardware (GPU) where a local attacker with the ability to issue an ioctl could trigger a hardware level crash if MMIO registers were read while the graphics card was in a low-power state. This creates a denial of service situation and the GPU and connected displays will remain unusable until a reboot occurs.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: Intel GPU Denial Of Service while accessing MMIO in lower power state",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Intel plans to release BIOS firmware to correct this issue. Red Hat\u0027s kernel update should mitigate this vulnerability. Some older hardware will not have BIOS firmware update and will rely on operating system level protection to prevent access while the device is in low-power states. For more information see https://access.redhat.com/solutions/i915-graphics",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.src",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.src",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-0154"
},
{
"category": "external",
"summary": "RHBZ#1724393",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1724393"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-0154",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0154"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-0154",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0154"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/i915-graphics",
"url": "https://access.redhat.com/solutions/i915-graphics"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00260.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00260.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-11-12T20:49:30+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.src",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.src",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:3833"
},
{
"category": "workaround",
"details": "Preventing loading of the i915 kernel module will prevent attackers from using this exploit against the system however the power management functionality of the card will be disabled and the system may draw additional power. See this KCS article (https://access.redhat.com/solutions/41278) for instructions on how to disable a kernel module. Graphical displays may also be at low resolution or not work correctly. This mitigation may not be suitable if running graphical tools locally is required.",
"product_ids": [
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.src",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.src",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.src",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.src",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: Intel GPU Denial Of Service while accessing MMIO in lower power state"
},
{
"acknowledgments": [
{
"names": [
"Intel"
]
}
],
"cve": "CVE-2019-11135",
"cwe": {
"id": "CWE-203",
"name": "Observable Discrepancy"
},
"discovery_date": "2019-09-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1753062"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way Intel CPUs handle speculative execution of instructions when the TSX Asynchronous Abort (TAA) error occurs. A local authenticated attacker with the ability to monitor execution times could infer the TSX memory state by comparing abort execution times. This could allow information disclosure via this observed side-channel for any TSX transaction being executed while an attacker is able to observe abort timing.\r\n\r\nIntel\u0027s Transactional Synchronisation Extensions (TSX) are set of instructions which enable transactional memory support to improve performance of the multi-threaded applications, in the lock-protected critical sections. The CPU executes instructions in the critical-sections as transactions, while ensuring their atomic state. When such transaction execution is unsuccessful, the processor cannot ensure atomic updates to the transaction memory, so the processor rolls back or aborts such transaction execution.\r\n\r\nWhile TSX Asynchronous Abort (TAA) is pending, CPU may continue to read data from architectural buffers and pass it to the dependent speculative operations. This may cause information leakage via speculative side-channel means, which is quite similar to the Microarchitectural Data Sampling (MDS) issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: TSX Transaction Asynchronous Abort (TAA)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "libvirt and qemu-kvm on Red Hat Enterprise Linux 6 are not affected by this vulnerability as they do not support MSR-based CPU features.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.src",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.src",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11135"
},
{
"category": "external",
"summary": "RHBZ#1753062",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753062"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11135",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11135"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11135",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11135"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/tsx-asynchronousabort",
"url": "https://access.redhat.com/solutions/tsx-asynchronousabort"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00270.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00270.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-11-12T20:49:30+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.src",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.src",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:3833"
},
{
"category": "workaround",
"details": "For mitigation related information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/solutions/tsx-asynchronousabort",
"product_ids": [
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.src",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.src",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.src",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.src",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: TSX Transaction Asynchronous Abort (TAA)"
}
]
}
RHSA-2019:3839
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 7.4 Advanced Update Support, Red Hat Enterprise Linux 7.4 Telco Extended Update Support, and Red Hat Enterprise Linux 7.4 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* hw: Machine Check Error on Page Size Change (IFU) (CVE-2018-12207)\n\n* hw: TSX Transaction Asynchronous Abort (TAA) (CVE-2019-11135)\n\n* hw: Intel GPU Denial Of Service while accessing MMIO in lower power state (CVE-2019-0154)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2019:3839",
"url": "https://access.redhat.com/errata/RHSA-2019:3839"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce",
"url": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/tsx-asynchronousabort",
"url": "https://access.redhat.com/solutions/tsx-asynchronousabort"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/i915-graphics",
"url": "https://access.redhat.com/solutions/i915-graphics"
},
{
"category": "external",
"summary": "1646768",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646768"
},
{
"category": "external",
"summary": "1724393",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1724393"
},
{
"category": "external",
"summary": "1753062",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753062"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_3839.json"
}
],
"title": "Red Hat Security Advisory: kernel security update",
"tracking": {
"current_release_date": "2025-10-09T18:16:00+00:00",
"generator": {
"date": "2025-10-09T18:16:00+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2019:3839",
"initial_release_date": "2019-11-12T21:37:14+00:00",
"revision_history": [
{
"date": "2019-11-12T21:37:14+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2019-11-12T21:37:14+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T18:16:00+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product": {
"name": "Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.4::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.4::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product": {
"name": "Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:7.4::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:7.4::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server TUS (v. 7.4)",
"product": {
"name": "Red Hat Enterprise Linux Server TUS (v. 7.4)",
"product_id": "7Server-7.4.TUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_tus:7.4::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.4)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.4)",
"product_id": "7Server-optional-7.4.TUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_tus:7.4::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-693.60.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-693.60.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"product_id": "kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-693.60.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-693.60.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-693.60.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"product": {
"name": "perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"product_id": "perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-693.60.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"product_id": "python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-693.60.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-693.60.2.el7.x86_64",
"product": {
"name": "kernel-0:3.10.0-693.60.2.el7.x86_64",
"product_id": "kernel-0:3.10.0-693.60.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-693.60.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"product": {
"name": "kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"product_id": "kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-693.60.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"product_id": "kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-693.60.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"product": {
"name": "kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"product_id": "kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-693.60.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"product": {
"name": "kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"product_id": "kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-693.60.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"product": {
"name": "kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"product_id": "kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-693.60.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"product_id": "kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-693.60.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-693.60.2.el7.x86_64",
"product": {
"name": "perf-0:3.10.0-693.60.2.el7.x86_64",
"product_id": "perf-0:3.10.0-693.60.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-693.60.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-693.60.2.el7.x86_64",
"product": {
"name": "python-perf-0:3.10.0-693.60.2.el7.x86_64",
"product_id": "python-perf-0:3.10.0-693.60.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-693.60.2.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-693.60.2.el7.src",
"product": {
"name": "kernel-0:3.10.0-693.60.2.el7.src",
"product_id": "kernel-0:3.10.0-693.60.2.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-693.60.2.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"product": {
"name": "kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"product_id": "kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-693.60.2.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"product": {
"name": "kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"product_id": "kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@3.10.0-693.60.2.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-693.60.2.el7.ppc64le",
"product": {
"name": "kernel-debug-devel-0:3.10.0-693.60.2.el7.ppc64le",
"product_id": "kernel-debug-devel-0:3.10.0-693.60.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-693.60.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.ppc64le",
"product_id": "kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-693.60.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"product_id": "kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-693.60.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"product_id": "kernel-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-693.60.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.60.2.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.60.2.el7.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.60.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@3.10.0-693.60.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"product_id": "kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-693.60.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"product": {
"name": "perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"product_id": "perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-693.60.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"product_id": "python-perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-693.60.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-693.60.2.el7.ppc64le",
"product": {
"name": "kernel-0:3.10.0-693.60.2.el7.ppc64le",
"product_id": "kernel-0:3.10.0-693.60.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-693.60.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:3.10.0-693.60.2.el7.ppc64le",
"product": {
"name": "kernel-bootwrapper-0:3.10.0-693.60.2.el7.ppc64le",
"product_id": "kernel-bootwrapper-0:3.10.0-693.60.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-693.60.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-693.60.2.el7.ppc64le",
"product": {
"name": "kernel-debug-0:3.10.0-693.60.2.el7.ppc64le",
"product_id": "kernel-debug-0:3.10.0-693.60.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-693.60.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-693.60.2.el7.ppc64le",
"product": {
"name": "kernel-devel-0:3.10.0-693.60.2.el7.ppc64le",
"product_id": "kernel-devel-0:3.10.0-693.60.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-693.60.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-693.60.2.el7.ppc64le",
"product": {
"name": "kernel-headers-0:3.10.0-693.60.2.el7.ppc64le",
"product_id": "kernel-headers-0:3.10.0-693.60.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-693.60.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-693.60.2.el7.ppc64le",
"product": {
"name": "kernel-tools-0:3.10.0-693.60.2.el7.ppc64le",
"product_id": "kernel-tools-0:3.10.0-693.60.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-693.60.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-693.60.2.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-0:3.10.0-693.60.2.el7.ppc64le",
"product_id": "kernel-tools-libs-0:3.10.0-693.60.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-693.60.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-693.60.2.el7.ppc64le",
"product": {
"name": "perf-0:3.10.0-693.60.2.el7.ppc64le",
"product_id": "perf-0:3.10.0-693.60.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-693.60.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-693.60.2.el7.ppc64le",
"product": {
"name": "python-perf-0:3.10.0-693.60.2.el7.ppc64le",
"product_id": "python-perf-0:3.10.0-693.60.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-693.60.2.el7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.60.2.el7.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-693.60.2.el7.src",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-693.60.2.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:perf-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:python-perf-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.60.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-693.60.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.60.2.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-693.60.2.el7.src",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-693.60.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.60.2.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-693.60.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.60.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-693.60.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.60.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.60.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.60.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.60.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.60.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.60.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.60.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-693.60.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-693.60.2.el7.noarch as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-doc-0:3.10.0-693.60.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.60.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-693.60.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.60.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-693.60.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.60.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.60.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.60.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:perf-0:3.10.0-693.60.2.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-693.60.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:perf-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.60.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-693.60.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.60.2.el7.src as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)",
"product_id": "7Server-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-693.60.2.el7.src",
"relates_to_product_reference": "7Server-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)",
"product_id": "7Server-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)",
"product_id": "7Server-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"relates_to_product_reference": "7Server-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)",
"product_id": "7Server-7.4.TUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)",
"product_id": "7Server-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)",
"product_id": "7Server-7.4.TUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)",
"product_id": "7Server-7.4.TUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)",
"product_id": "7Server-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)",
"product_id": "7Server-7.4.TUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-693.60.2.el7.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)",
"product_id": "7Server-7.4.TUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"relates_to_product_reference": "7Server-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)",
"product_id": "7Server-7.4.TUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)",
"product_id": "7Server-7.4.TUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)",
"product_id": "7Server-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)",
"product_id": "7Server-7.4.TUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)",
"product_id": "7Server-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)",
"product_id": "7Server-7.4.TUS:perf-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)",
"product_id": "7Server-7.4.TUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)",
"product_id": "7Server-7.4.TUS:python-perf-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)",
"product_id": "7Server-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.60.2.el7.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-693.60.2.el7.src",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-693.60.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:perf-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.60.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-693.60.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.60.2.el7.src as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-693.60.2.el7.src",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-693.60.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.60.2.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-693.60.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.60.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-693.60.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.60.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.60.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.60.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.60.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.60.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.60.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.60.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-693.60.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-693.60.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-doc-0:3.10.0-693.60.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.60.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-693.60.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.60.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-693.60.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.60.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.60.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.60.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:perf-0:3.10.0-693.60.2.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-693.60.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:perf-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.60.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-693.60.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.60.2.el7.src as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)",
"product_id": "7Server-optional-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-693.60.2.el7.src",
"relates_to_product_reference": "7Server-optional-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)",
"product_id": "7Server-optional-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)",
"product_id": "7Server-optional-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)",
"product_id": "7Server-optional-7.4.TUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)",
"product_id": "7Server-optional-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)",
"product_id": "7Server-optional-7.4.TUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)",
"product_id": "7Server-optional-7.4.TUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)",
"product_id": "7Server-optional-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)",
"product_id": "7Server-optional-7.4.TUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-693.60.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)",
"product_id": "7Server-optional-7.4.TUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)",
"product_id": "7Server-optional-7.4.TUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)",
"product_id": "7Server-optional-7.4.TUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)",
"product_id": "7Server-optional-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)",
"product_id": "7Server-optional-7.4.TUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)",
"product_id": "7Server-optional-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)",
"product_id": "7Server-optional-7.4.TUS:perf-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)",
"product_id": "7Server-optional-7.4.TUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)",
"product_id": "7Server-optional-7.4.TUS:python-perf-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)",
"product_id": "7Server-optional-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.TUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Intel"
]
},
{
"names": [
"Deepak Gupta"
],
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2018-12207",
"cwe": {
"id": "CWE-226",
"name": "Sensitive Information in Resource Not Removed Before Reuse"
},
"discovery_date": "2018-11-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1646768"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way Intel CPUs handle inconsistency between, virtual to physical memory address translations in CPU\u0027s local cache and system software\u0027s Paging structure entries. A privileged guest user may use this flaw to induce a hardware Machine Check Error on the host processor, resulting in a severe DoS scenario by halting the processor.\r\n\r\nSystem software like OS OR Virtual Machine Monitor (VMM) use virtual memory system for storing program instructions and data in memory. Virtual Memory system uses Paging structures like Page Tables and Page Directories to manage system memory. The processor\u0027s Memory Management Unit (MMU) uses Paging structure entries to translate program\u0027s virtual memory addresses to physical memory addresses. The processor stores these address translations into its local cache buffer called - Translation Lookaside Buffer (TLB). TLB has two parts, one for instructions and other for data addresses.\r\n\r\nSystem software can modify its Paging structure entries to change address mappings OR certain attributes like page size etc. Upon such Paging structure alterations in memory, system software must invalidate the corresponding address translations in the processor\u0027s TLB cache. But before this TLB invalidation takes place, a privileged guest user may trigger an instruction fetch operation, which could use an already cached, but now invalid, virtual to physical address translation from Instruction TLB (ITLB). Thus accessing an invalid physical memory address and resulting in halting the processor due to the Machine Check Error (MCE) on Page Size Change.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: Machine Check Error on Page Size Change (IFU)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:perf-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.TUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.TUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-12207"
},
{
"category": "external",
"summary": "RHBZ#1646768",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646768"
},
{
"category": "external",
"summary": "RHSB-ifu-page-mce",
"url": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-12207",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12207"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-12207",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12207"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-11-12T21:37:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:perf-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.TUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.TUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:3839"
},
{
"category": "workaround",
"details": "For mitigation related information, please refer to the Red Hat vulnerability article: https://access.redhat.com/security/vulnerabilities/ifu-page-mce .",
"product_ids": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:perf-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.TUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.TUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:perf-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.TUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.TUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: Machine Check Error on Page Size Change (IFU)"
},
{
"acknowledgments": [
{
"names": [
"Intel"
]
}
],
"cve": "CVE-2019-0154",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"discovery_date": "2019-06-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1724393"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Intel graphics hardware (GPU) where a local attacker with the ability to issue an ioctl could trigger a hardware level crash if MMIO registers were read while the graphics card was in a low-power state. This creates a denial of service situation and the GPU and connected displays will remain unusable until a reboot occurs.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: Intel GPU Denial Of Service while accessing MMIO in lower power state",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Intel plans to release BIOS firmware to correct this issue. Red Hat\u0027s kernel update should mitigate this vulnerability. Some older hardware will not have BIOS firmware update and will rely on operating system level protection to prevent access while the device is in low-power states. For more information see https://access.redhat.com/solutions/i915-graphics",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:perf-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.TUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.TUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-0154"
},
{
"category": "external",
"summary": "RHBZ#1724393",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1724393"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-0154",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0154"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-0154",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0154"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/i915-graphics",
"url": "https://access.redhat.com/solutions/i915-graphics"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00260.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00260.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-11-12T21:37:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:perf-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.TUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.TUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:3839"
},
{
"category": "workaround",
"details": "Preventing loading of the i915 kernel module will prevent attackers from using this exploit against the system however the power management functionality of the card will be disabled and the system may draw additional power. See this KCS article (https://access.redhat.com/solutions/41278) for instructions on how to disable a kernel module. Graphical displays may also be at low resolution or not work correctly. This mitigation may not be suitable if running graphical tools locally is required.",
"product_ids": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:perf-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.TUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.TUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:perf-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.TUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.TUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: Intel GPU Denial Of Service while accessing MMIO in lower power state"
},
{
"acknowledgments": [
{
"names": [
"Intel"
]
}
],
"cve": "CVE-2019-11135",
"cwe": {
"id": "CWE-203",
"name": "Observable Discrepancy"
},
"discovery_date": "2019-09-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1753062"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way Intel CPUs handle speculative execution of instructions when the TSX Asynchronous Abort (TAA) error occurs. A local authenticated attacker with the ability to monitor execution times could infer the TSX memory state by comparing abort execution times. This could allow information disclosure via this observed side-channel for any TSX transaction being executed while an attacker is able to observe abort timing.\r\n\r\nIntel\u0027s Transactional Synchronisation Extensions (TSX) are set of instructions which enable transactional memory support to improve performance of the multi-threaded applications, in the lock-protected critical sections. The CPU executes instructions in the critical-sections as transactions, while ensuring their atomic state. When such transaction execution is unsuccessful, the processor cannot ensure atomic updates to the transaction memory, so the processor rolls back or aborts such transaction execution.\r\n\r\nWhile TSX Asynchronous Abort (TAA) is pending, CPU may continue to read data from architectural buffers and pass it to the dependent speculative operations. This may cause information leakage via speculative side-channel means, which is quite similar to the Microarchitectural Data Sampling (MDS) issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: TSX Transaction Asynchronous Abort (TAA)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "libvirt and qemu-kvm on Red Hat Enterprise Linux 6 are not affected by this vulnerability as they do not support MSR-based CPU features.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:perf-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.TUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.TUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11135"
},
{
"category": "external",
"summary": "RHBZ#1753062",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753062"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11135",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11135"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11135",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11135"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/tsx-asynchronousabort",
"url": "https://access.redhat.com/solutions/tsx-asynchronousabort"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00270.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00270.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-11-12T21:37:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:perf-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.TUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.TUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:3839"
},
{
"category": "workaround",
"details": "For mitigation related information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/solutions/tsx-asynchronousabort",
"product_ids": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:perf-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.TUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.TUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:perf-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.TUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.TUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: TSX Transaction Asynchronous Abort (TAA)"
}
]
}
rhsa-2020_0028
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kpatch-patch is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.\n\nSecurity Fix(es):\n\n* hw: Machine Check Error on Page Size Change (IFU) (CVE-2018-12207)\n\n* hw: TSX Transaction Asynchronous Abort (TAA) (CVE-2019-11135)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2020:0028",
"url": "https://access.redhat.com/errata/RHSA-2020:0028"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce",
"url": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/tsx-asynchronousabort",
"url": "https://access.redhat.com/solutions/tsx-asynchronousabort"
},
{
"category": "external",
"summary": "1646768",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646768"
},
{
"category": "external",
"summary": "1753062",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753062"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_0028.json"
}
],
"title": "Red Hat Security Advisory: kpatch-patch security update",
"tracking": {
"current_release_date": "2024-11-15T03:19:26+00:00",
"generator": {
"date": "2024-11-15T03:19:26+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2020:0028",
"initial_release_date": "2020-01-06T14:46:13+00:00",
"revision_history": [
{
"date": "2020-01-06T14:46:13+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2020-01-06T14:46:13+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-15T03:19:26+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_4_1-0:1-4.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_4_1-0:1-4.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_4_1-0:1-4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_4_1@1-4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_4_1-debuginfo-0:1-4.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_4_1-debuginfo-0:1-4.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_4_1-debuginfo-0:1-4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_4_1-debuginfo@1-4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_1_2-0:1-7.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_1_2-0:1-7.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_1_2-0:1-7.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_1_2@1-7.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_1_2-debuginfo-0:1-7.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_1_2-debuginfo-0:1-7.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_1_2-debuginfo-0:1-7.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_1_2-debuginfo@1-7.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_1_1-0:1-8.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_1_1-0:1-8.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_1_1-0:1-8.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_1_1@1-8.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_1_1-debuginfo-0:1-8.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_1_1-debuginfo-0:1-8.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_1_1-debuginfo-0:1-8.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_1_1-debuginfo@1-8.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062-0:1-9.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062-0:1-9.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062-0:1-9.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062@1-9.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062-debuginfo-0:1-9.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062-debuginfo-0:1-9.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062-debuginfo-0:1-9.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062-debuginfo@1-9.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_4_1-0:1-4.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1062_4_1-0:1-4.el7.src",
"product_id": "kpatch-patch-3_10_0-1062_4_1-0:1-4.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_4_1@1-4.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_1_2-0:1-7.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1062_1_2-0:1-7.el7.src",
"product_id": "kpatch-patch-3_10_0-1062_1_2-0:1-7.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_1_2@1-7.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_1_1-0:1-8.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1062_1_1-0:1-8.el7.src",
"product_id": "kpatch-patch-3_10_0-1062_1_1-0:1-8.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_1_1@1-8.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062-0:1-9.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1062-0:1-9.el7.src",
"product_id": "kpatch-patch-3_10_0-1062-0:1-9.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062@1-9.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062-0:1-9.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kpatch-patch-3_10_0-1062-0:1-9.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1062-0:1-9.el7.src",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062-0:1-9.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kpatch-patch-3_10_0-1062-0:1-9.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062-0:1-9.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062-debuginfo-0:1-9.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kpatch-patch-3_10_0-1062-debuginfo-0:1-9.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062-debuginfo-0:1-9.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_1_1-0:1-8.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_1-0:1-8.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1062_1_1-0:1-8.el7.src",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_1_1-0:1-8.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_1-0:1-8.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_1_1-0:1-8.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_1_1-debuginfo-0:1-8.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_1-debuginfo-0:1-8.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_1_1-debuginfo-0:1-8.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_1_2-0:1-7.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_2-0:1-7.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1062_1_2-0:1-7.el7.src",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_1_2-0:1-7.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_2-0:1-7.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_1_2-0:1-7.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_1_2-debuginfo-0:1-7.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_2-debuginfo-0:1-7.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_1_2-debuginfo-0:1-7.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_4_1-0:1-4.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kpatch-patch-3_10_0-1062_4_1-0:1-4.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1062_4_1-0:1-4.el7.src",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_4_1-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kpatch-patch-3_10_0-1062_4_1-0:1-4.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_4_1-0:1-4.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_4_1-debuginfo-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kpatch-patch-3_10_0-1062_4_1-debuginfo-0:1-4.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_4_1-debuginfo-0:1-4.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.Z"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Intel"
]
},
{
"names": [
"Deepak Gupta"
],
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2018-12207",
"cwe": {
"id": "CWE-226",
"name": "Sensitive Information in Resource Not Removed Before Reuse"
},
"discovery_date": "2018-11-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1646768"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way Intel CPUs handle inconsistency between, virtual to physical memory address translations in CPU\u0027s local cache and system software\u0027s Paging structure entries. A privileged guest user may use this flaw to induce a hardware Machine Check Error on the host processor, resulting in a severe DoS scenario by halting the processor.\r\n\r\nSystem software like OS OR Virtual Machine Monitor (VMM) use virtual memory system for storing program instructions and data in memory. Virtual Memory system uses Paging structures like Page Tables and Page Directories to manage system memory. The processor\u0027s Memory Management Unit (MMU) uses Paging structure entries to translate program\u0027s virtual memory addresses to physical memory addresses. The processor stores these address translations into its local cache buffer called - Translation Lookaside Buffer (TLB). TLB has two parts, one for instructions and other for data addresses.\r\n\r\nSystem software can modify its Paging structure entries to change address mappings OR certain attributes like page size etc. Upon such Paging structure alterations in memory, system software must invalidate the corresponding address translations in the processor\u0027s TLB cache. But before this TLB invalidation takes place, a privileged guest user may trigger an instruction fetch operation, which could use an already cached, but now invalid, virtual to physical address translation from Instruction TLB (ITLB). Thus accessing an invalid physical memory address and resulting in halting the processor due to the Machine Check Error (MCE) on Page Size Change.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: Machine Check Error on Page Size Change (IFU)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.7.Z:kpatch-patch-3_10_0-1062-0:1-9.el7.src",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062-0:1-9.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062-debuginfo-0:1-9.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_1-0:1-8.el7.src",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_1-0:1-8.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_1-debuginfo-0:1-8.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_2-0:1-7.el7.src",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_2-0:1-7.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_2-debuginfo-0:1-7.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_4_1-0:1-4.el7.src",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_4_1-0:1-4.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_4_1-debuginfo-0:1-4.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-12207"
},
{
"category": "external",
"summary": "RHBZ#1646768",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646768"
},
{
"category": "external",
"summary": "RHSB-ifu-page-mce",
"url": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-12207",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12207"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-12207",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12207"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-01-06T14:46:13+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-7.7.Z:kpatch-patch-3_10_0-1062-0:1-9.el7.src",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062-0:1-9.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062-debuginfo-0:1-9.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_1-0:1-8.el7.src",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_1-0:1-8.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_1-debuginfo-0:1-8.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_2-0:1-7.el7.src",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_2-0:1-7.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_2-debuginfo-0:1-7.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_4_1-0:1-4.el7.src",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_4_1-0:1-4.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_4_1-debuginfo-0:1-4.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2020:0028"
},
{
"category": "workaround",
"details": "For mitigation related information, please refer to the Red Hat vulnerability article: https://access.redhat.com/security/vulnerabilities/ifu-page-mce .",
"product_ids": [
"7Server-7.7.Z:kpatch-patch-3_10_0-1062-0:1-9.el7.src",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062-0:1-9.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062-debuginfo-0:1-9.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_1-0:1-8.el7.src",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_1-0:1-8.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_1-debuginfo-0:1-8.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_2-0:1-7.el7.src",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_2-0:1-7.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_2-debuginfo-0:1-7.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_4_1-0:1-4.el7.src",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_4_1-0:1-4.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_4_1-debuginfo-0:1-4.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7Server-7.7.Z:kpatch-patch-3_10_0-1062-0:1-9.el7.src",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062-0:1-9.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062-debuginfo-0:1-9.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_1-0:1-8.el7.src",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_1-0:1-8.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_1-debuginfo-0:1-8.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_2-0:1-7.el7.src",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_2-0:1-7.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_2-debuginfo-0:1-7.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_4_1-0:1-4.el7.src",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_4_1-0:1-4.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_4_1-debuginfo-0:1-4.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: Machine Check Error on Page Size Change (IFU)"
},
{
"acknowledgments": [
{
"names": [
"Intel"
]
}
],
"cve": "CVE-2019-11135",
"cwe": {
"id": "CWE-203",
"name": "Observable Discrepancy"
},
"discovery_date": "2019-09-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1753062"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way Intel CPUs handle speculative execution of instructions when the TSX Asynchronous Abort (TAA) error occurs. A local authenticated attacker with the ability to monitor execution times could infer the TSX memory state by comparing abort execution times. This could allow information disclosure via this observed side-channel for any TSX transaction being executed while an attacker is able to observe abort timing.\r\n\r\nIntel\u0027s Transactional Synchronisation Extensions (TSX) are set of instructions which enable transactional memory support to improve performance of the multi-threaded applications, in the lock-protected critical sections. The CPU executes instructions in the critical-sections as transactions, while ensuring their atomic state. When such transaction execution is unsuccessful, the processor cannot ensure atomic updates to the transaction memory, so the processor rolls back or aborts such transaction execution.\r\n\r\nWhile TSX Asynchronous Abort (TAA) is pending, CPU may continue to read data from architectural buffers and pass it to the dependent speculative operations. This may cause information leakage via speculative side-channel means, which is quite similar to the Microarchitectural Data Sampling (MDS) issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: TSX Transaction Asynchronous Abort (TAA)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "libvirt and qemu-kvm on Red Hat Enterprise Linux 6 are not affected by this vulnerability as they do not support MSR-based CPU features.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.7.Z:kpatch-patch-3_10_0-1062-0:1-9.el7.src",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062-0:1-9.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062-debuginfo-0:1-9.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_1-0:1-8.el7.src",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_1-0:1-8.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_1-debuginfo-0:1-8.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_2-0:1-7.el7.src",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_2-0:1-7.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_2-debuginfo-0:1-7.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_4_1-0:1-4.el7.src",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_4_1-0:1-4.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_4_1-debuginfo-0:1-4.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11135"
},
{
"category": "external",
"summary": "RHBZ#1753062",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753062"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11135",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11135"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11135",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11135"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/tsx-asynchronousabort",
"url": "https://access.redhat.com/solutions/tsx-asynchronousabort"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00270.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00270.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-01-06T14:46:13+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-7.7.Z:kpatch-patch-3_10_0-1062-0:1-9.el7.src",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062-0:1-9.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062-debuginfo-0:1-9.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_1-0:1-8.el7.src",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_1-0:1-8.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_1-debuginfo-0:1-8.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_2-0:1-7.el7.src",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_2-0:1-7.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_2-debuginfo-0:1-7.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_4_1-0:1-4.el7.src",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_4_1-0:1-4.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_4_1-debuginfo-0:1-4.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2020:0028"
},
{
"category": "workaround",
"details": "For mitigation related information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/solutions/tsx-asynchronousabort",
"product_ids": [
"7Server-7.7.Z:kpatch-patch-3_10_0-1062-0:1-9.el7.src",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062-0:1-9.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062-debuginfo-0:1-9.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_1-0:1-8.el7.src",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_1-0:1-8.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_1-debuginfo-0:1-8.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_2-0:1-7.el7.src",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_2-0:1-7.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_2-debuginfo-0:1-7.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_4_1-0:1-4.el7.src",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_4_1-0:1-4.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_4_1-debuginfo-0:1-4.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"7Server-7.7.Z:kpatch-patch-3_10_0-1062-0:1-9.el7.src",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062-0:1-9.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062-debuginfo-0:1-9.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_1-0:1-8.el7.src",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_1-0:1-8.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_1-debuginfo-0:1-8.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_2-0:1-7.el7.src",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_2-0:1-7.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_2-debuginfo-0:1-7.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_4_1-0:1-4.el7.src",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_4_1-0:1-4.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_4_1-debuginfo-0:1-4.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: TSX Transaction Asynchronous Abort (TAA)"
}
]
}
rhsa-2019_3916
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for machine-os-content-container is now available for Red Hat OpenShift Container Platform 4.2.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments.\n\nThis is a text-only advisory for the machine-os-content container image, which includes RPM packages for Red Hat Enterprise Linux CoreOS.\n\nSecurity Fix(es):\n\n* A flaw was found in the way Intel CPUs handled inconsistency between virtual to physical memory address translations in the CPU\u0027s local cache and the system software\u0027s Paging structure entries. A privileged guest user can exploit this flaw to induce a hardware Machine Check Error (MCE) on the host processor, resulting in a severe DoS scenario by halting the processor. System software like the OS OR Virtual Machine Monitor (VMM) use the virtual memory system for storing program instructions and data in memory. The virtual memory system uses Paging structures like Page Tables and Page Directories to manage system memory. The processor\u0027s Memory Management Unit (MMU) uses Paging structure entries to translate a program\u0027s virtual memory addresses to physical memory addresses. The processor stores these address translations into its local cache buffer, called the Translation Lookaside Buffer (TLB). TLB has two parts, one for instructions and the other for data addresses. System software can modify its Paging structure entries to change address mappings or certain attributes like page size, etc. Upon such Paging structure alterations in memory, system software must invalidate the corresponding address translations in the processor\u0027s TLB cache. Before this TLB invalidation takes place, however, a privileged guest user could trigger an instruction fetch operation, which could use an already cached, but now invalid, virtual to physical address translation from Instruction TLB (ITLB). This would access an invalid physical memory address, resulting in halting the processor due to the MCE on Page Size Change. (CVE-2018-12207)\n\n* A flaw was found in the way sudo implemented running commands with an arbitrary user ID. If a sudoers entry is written to allow users to run a command as any user except root, this flaw can be used by an attacker to bypass that restriction. (CVE-2019-14287)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2019:3916",
"url": "https://access.redhat.com/errata/RHSA-2019:3916"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce",
"url": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1646768",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646768"
},
{
"category": "external",
"summary": "1760531",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1760531"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_3916.json"
}
],
"title": "Red Hat Security Advisory: OpenShift Container Platform 4.2.5 machine-os-content-container security update",
"tracking": {
"current_release_date": "2024-11-15T04:12:38+00:00",
"generator": {
"date": "2024-11-15T04:12:38+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2019:3916",
"initial_release_date": "2019-11-19T15:56:26+00:00",
"revision_history": [
{
"date": "2019-11-19T15:56:26+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2019-11-19T15:56:26+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-15T04:12:38+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenShift Container Platform 4",
"product": {
"name": "Red Hat OpenShift Container Platform 4",
"product_id": "Red Hat OpenShift Container Platform 4",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:4.2"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift Enterprise"
}
],
"category": "vendor",
"name": "Red Hat"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Intel"
]
},
{
"names": [
"Deepak Gupta"
],
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2018-12207",
"cwe": {
"id": "CWE-226",
"name": "Sensitive Information in Resource Not Removed Before Reuse"
},
"discovery_date": "2018-11-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1646768"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way Intel CPUs handle inconsistency between, virtual to physical memory address translations in CPU\u0027s local cache and system software\u0027s Paging structure entries. A privileged guest user may use this flaw to induce a hardware Machine Check Error on the host processor, resulting in a severe DoS scenario by halting the processor.\r\n\r\nSystem software like OS OR Virtual Machine Monitor (VMM) use virtual memory system for storing program instructions and data in memory. Virtual Memory system uses Paging structures like Page Tables and Page Directories to manage system memory. The processor\u0027s Memory Management Unit (MMU) uses Paging structure entries to translate program\u0027s virtual memory addresses to physical memory addresses. The processor stores these address translations into its local cache buffer called - Translation Lookaside Buffer (TLB). TLB has two parts, one for instructions and other for data addresses.\r\n\r\nSystem software can modify its Paging structure entries to change address mappings OR certain attributes like page size etc. Upon such Paging structure alterations in memory, system software must invalidate the corresponding address translations in the processor\u0027s TLB cache. But before this TLB invalidation takes place, a privileged guest user may trigger an instruction fetch operation, which could use an already cached, but now invalid, virtual to physical address translation from Instruction TLB (ITLB). Thus accessing an invalid physical memory address and resulting in halting the processor due to the Machine Check Error (MCE) on Page Size Change.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: Machine Check Error on Page Size Change (IFU)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Container Platform 4"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-12207"
},
{
"category": "external",
"summary": "RHBZ#1646768",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646768"
},
{
"category": "external",
"summary": "RHSB-ifu-page-mce",
"url": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-12207",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12207"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-12207",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12207"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-11-19T15:56:26+00:00",
"details": "See the following documentation, which will be updated shortly for release 4.2.5, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.2/release_notes/ocp-4-2-release-notes.html",
"product_ids": [
"Red Hat OpenShift Container Platform 4"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:3916"
},
{
"category": "workaround",
"details": "For mitigation related information, please refer to the Red Hat vulnerability article: https://access.redhat.com/security/vulnerabilities/ifu-page-mce .",
"product_ids": [
"Red Hat OpenShift Container Platform 4"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"Red Hat OpenShift Container Platform 4"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: Machine Check Error on Page Size Change (IFU)"
},
{
"acknowledgments": [
{
"names": [
"the Sudo project"
]
},
{
"names": [
"Joe Vennix"
],
"organization": "Apple Information Security",
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2019-14287",
"cwe": {
"id": "CWE-267",
"name": "Privilege Defined With Unsafe Actions"
},
"discovery_date": "2019-10-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1760531"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way sudo implemented running commands with arbitrary user ID. If a sudoers entry is written to allow the attacker to run a command as any user except root, this flaw can be used by the attacker to bypass that restriction.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "sudo: Privilege escalation via \u0027Runas\u0027 specification with \u0027ALL\u0027 keyword",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw only affects specific, non-default configurations of sudo, in which sudoers configuration entry allows a user to run a command as any user except root, for example:\n\nsomeuser myhost = (ALL, !root) /usr/bin/somecommand\n\nThis configuration allows user \"someuser\" to run somecommand as any other user except root. However, this flaw also allows someuser to run somecommand as root by specifying the target user using the numeric id of -1. Only the specified command can be run, this flaw does NOT allow user to run other commands that those specified in the sudoers configuration.\n\nAny other configurations of sudo (including configurations that allow user to run commands as any user including root and configurations that allow user to run command as a specific other user) are NOT affected by this flaw.\n\nRed Hat Virtualization Hypervisor includes an affected version of sudo, however the default configuration is not vulnerable to this flaw.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Container Platform 4"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-14287"
},
{
"category": "external",
"summary": "RHBZ#1760531",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1760531"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-14287",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14287"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14287",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14287"
},
{
"category": "external",
"summary": "https://www.sudo.ws/alerts/minus_1_uid.html",
"url": "https://www.sudo.ws/alerts/minus_1_uid.html"
}
],
"release_date": "2019-10-14T15:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-11-19T15:56:26+00:00",
"details": "See the following documentation, which will be updated shortly for release 4.2.5, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.2/release_notes/ocp-4-2-release-notes.html",
"product_ids": [
"Red Hat OpenShift Container Platform 4"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:3916"
},
{
"category": "workaround",
"details": "This vulnerability only affects configurations of sudo that have a runas user list that includes an exclusion of root. The most simple example is:\n\n~~~\nsomeuser ALL=(ALL, !root) /usr/bin/somecommand\n~~~\n\nThe exclusion is specified using an excalamation mark (!). In this example, the \"root\" user is specified by name. The root user may also be identified in other ways, such as by user id:\n\n~~~\nsomeuser ALL=(ALL, !#0) /usr/bin/somecommand\n~~~\n\nor by reference to a runas alias:\n\n~~~\nRunas_Alias MYGROUP = root, adminuser\nsomeuser ALL=(ALL, !MYGROUP) /usr/bin/somecommand\n~~~\n\nTo ensure your sudoers configuration is not affected by this vulnerability, we recommend examining each sudoers entry that includes the `!` character in the runas specification, to ensure that the root user is not among the exclusions. These can be found in the /etc/sudoers file or files under /etc/sudoers.d.",
"product_ids": [
"Red Hat OpenShift Container Platform 4"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"Red Hat OpenShift Container Platform 4"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "sudo: Privilege escalation via \u0027Runas\u0027 specification with \u0027ALL\u0027 keyword"
}
]
}
RHSA-2020:0204
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 8.0 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* hw: Machine Check Error on Page Size Change (IFU) (CVE-2018-12207)\n\n* hw: TSX Transaction Asynchronous Abort (TAA) (CVE-2019-11135)\n\n* kernel: nfs: use-after-free in svc_process_common() (CVE-2018-16884)\n\n* hw: Intel GPU blitter manipulation can allow for arbitrary kernel memory write (CVE-2019-0155)\n\n* Kernel: vhost_net: infinite loop while receiving packets leads to DoS (CVE-2019-3900)\n\n* Kernel: page cache side channel attacks (CVE-2019-5489)\n\n* hardware: bluetooth: BR/EDR encryption key negotiation attacks (KNOB) (CVE-2019-9506)\n\n* kernel: Heap overflow in mwifiex_uap_parse_tail_ies function in drivers/net/wireless/marvell/mwifiex/ie.c (CVE-2019-10126)\n\n* kernel: heap overflow in mwifiex_update_vs_ie() function of Marvell WiFi driver (CVE-2019-14816)\n\n* Kernel: KVM: OOB memory access via mmio ring buffer (CVE-2019-14821)\n\n* kernel: heap overflow in marvell/mwifiex/tdls.c (CVE-2019-14901)\n\n* hw: Intel GPU Denial Of Service while accessing MMIO in lower power state (CVE-2019-0154)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* Backport TCP follow-up for small buffers (BZ#1739184)\n\n* TCP performance regression after CVE-2019-11478 bug fix (BZ#1743170)\n\n* RHEL8.0 - bnx2x link down, caused by transmit timeouts during load test (Marvell/Cavium/QLogic) (L3:) (BZ#1743548)\n\n* block: blk-mq improvement (BZ#1780567)\n\n* RHEL8.0 - Regression to RHEL7.6 by changing force_latency found during RHEL8.0 validation for SAP HANA on POWER (BZ#1781111)\n\n* blk-mq: overwirte performance drops on real MQ device (BZ#1782183)\n\n* RHEL8: creating vport takes lot of memory i.e 2GB per vport which leads to drain out system memory quickly. (BZ#1782705)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2020:0204",
"url": "https://access.redhat.com/errata/RHSA-2020:0204"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce",
"url": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce"
},
{
"category": "external",
"summary": "1646768",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646768"
},
{
"category": "external",
"summary": "1660375",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1660375"
},
{
"category": "external",
"summary": "1664110",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1664110"
},
{
"category": "external",
"summary": "1698757",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1698757"
},
{
"category": "external",
"summary": "1716992",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1716992"
},
{
"category": "external",
"summary": "1724393",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1724393"
},
{
"category": "external",
"summary": "1724398",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1724398"
},
{
"category": "external",
"summary": "1727857",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1727857"
},
{
"category": "external",
"summary": "1744149",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1744149"
},
{
"category": "external",
"summary": "1746708",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1746708"
},
{
"category": "external",
"summary": "1753062",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753062"
},
{
"category": "external",
"summary": "1773519",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1773519"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_0204.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2025-10-09T18:16:00+00:00",
"generator": {
"date": "2025-10-09T18:16:00+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2020:0204",
"initial_release_date": "2020-01-22T21:26:18+00:00",
"revision_history": [
{
"date": "2020-01-22T21:26:18+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2020-01-22T21:26:18+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T18:16:00+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:8.0::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-80.15.1.el8_0.ppc64le",
"product": {
"name": "bpftool-0:4.18.0-80.15.1.el8_0.ppc64le",
"product_id": "bpftool-0:4.18.0-80.15.1.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-80.15.1.el8_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-80.15.1.el8_0.ppc64le",
"product": {
"name": "kernel-0:4.18.0-80.15.1.el8_0.ppc64le",
"product_id": "kernel-0:4.18.0-80.15.1.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-80.15.1.el8_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"product": {
"name": "kernel-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"product_id": "kernel-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-80.15.1.el8_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"product": {
"name": "kernel-cross-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"product_id": "kernel-cross-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-80.15.1.el8_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-80.15.1.el8_0.ppc64le",
"product": {
"name": "kernel-debug-0:4.18.0-80.15.1.el8_0.ppc64le",
"product_id": "kernel-debug-0:4.18.0-80.15.1.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-80.15.1.el8_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"product": {
"name": "kernel-debug-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"product_id": "kernel-debug-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-80.15.1.el8_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"product": {
"name": "kernel-debug-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"product_id": "kernel-debug-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-80.15.1.el8_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"product": {
"name": "kernel-debug-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"product_id": "kernel-debug-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-80.15.1.el8_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"product_id": "kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-80.15.1.el8_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"product": {
"name": "kernel-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"product_id": "kernel-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-80.15.1.el8_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"product": {
"name": "kernel-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"product_id": "kernel-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-80.15.1.el8_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"product": {
"name": "kernel-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"product_id": "kernel-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-80.15.1.el8_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"product": {
"name": "kernel-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"product_id": "kernel-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-80.15.1.el8_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-80.15.1.el8_0.ppc64le",
"product": {
"name": "kernel-tools-0:4.18.0-80.15.1.el8_0.ppc64le",
"product_id": "kernel-tools-0:4.18.0-80.15.1.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-80.15.1.el8_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-80.15.1.el8_0.ppc64le",
"product": {
"name": "kernel-tools-libs-0:4.18.0-80.15.1.el8_0.ppc64le",
"product_id": "kernel-tools-libs-0:4.18.0-80.15.1.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-80.15.1.el8_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"product": {
"name": "perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"product_id": "perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-80.15.1.el8_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"product": {
"name": "python3-perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"product_id": "python3-perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-80.15.1.el8_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"product_id": "bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-80.15.1.el8_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"product_id": "kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-80.15.1.el8_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"product": {
"name": "kernel-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"product_id": "kernel-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-80.15.1.el8_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-80.15.1.el8_0.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-80.15.1.el8_0.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:4.18.0-80.15.1.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.18.0-80.15.1.el8_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"product_id": "kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-80.15.1.el8_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"product": {
"name": "perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"product_id": "perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-80.15.1.el8_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"product_id": "python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-80.15.1.el8_0?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-80.15.1.el8_0.x86_64",
"product": {
"name": "bpftool-0:4.18.0-80.15.1.el8_0.x86_64",
"product_id": "bpftool-0:4.18.0-80.15.1.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-80.15.1.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-80.15.1.el8_0.x86_64",
"product": {
"name": "kernel-0:4.18.0-80.15.1.el8_0.x86_64",
"product_id": "kernel-0:4.18.0-80.15.1.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-80.15.1.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-80.15.1.el8_0.x86_64",
"product": {
"name": "kernel-core-0:4.18.0-80.15.1.el8_0.x86_64",
"product_id": "kernel-core-0:4.18.0-80.15.1.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-80.15.1.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"product_id": "kernel-cross-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-80.15.1.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-80.15.1.el8_0.x86_64",
"product": {
"name": "kernel-debug-0:4.18.0-80.15.1.el8_0.x86_64",
"product_id": "kernel-debug-0:4.18.0-80.15.1.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-80.15.1.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-80.15.1.el8_0.x86_64",
"product": {
"name": "kernel-debug-core-0:4.18.0-80.15.1.el8_0.x86_64",
"product_id": "kernel-debug-core-0:4.18.0-80.15.1.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-80.15.1.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"product_id": "kernel-debug-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-80.15.1.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"product_id": "kernel-debug-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-80.15.1.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-80.15.1.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"product": {
"name": "kernel-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"product_id": "kernel-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-80.15.1.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"product": {
"name": "kernel-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"product_id": "kernel-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-80.15.1.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"product": {
"name": "kernel-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"product_id": "kernel-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-80.15.1.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"product_id": "kernel-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-80.15.1.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-80.15.1.el8_0.x86_64",
"product": {
"name": "kernel-tools-0:4.18.0-80.15.1.el8_0.x86_64",
"product_id": "kernel-tools-0:4.18.0-80.15.1.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-80.15.1.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-80.15.1.el8_0.x86_64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-80.15.1.el8_0.x86_64",
"product_id": "kernel-tools-libs-0:4.18.0-80.15.1.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-80.15.1.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-80.15.1.el8_0.x86_64",
"product": {
"name": "perf-0:4.18.0-80.15.1.el8_0.x86_64",
"product_id": "perf-0:4.18.0-80.15.1.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-80.15.1.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-80.15.1.el8_0.x86_64",
"product": {
"name": "python3-perf-0:4.18.0-80.15.1.el8_0.x86_64",
"product_id": "python3-perf-0:4.18.0-80.15.1.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-80.15.1.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"product_id": "bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-80.15.1.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-80.15.1.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"product_id": "kernel-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-80.15.1.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-80.15.1.el8_0.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-80.15.1.el8_0.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:4.18.0-80.15.1.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@4.18.0-80.15.1.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-80.15.1.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"product": {
"name": "perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"product_id": "perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-80.15.1.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"product_id": "python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-80.15.1.el8_0?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:4.18.0-80.15.1.el8_0.src",
"product": {
"name": "kernel-0:4.18.0-80.15.1.el8_0.src",
"product_id": "kernel-0:4.18.0-80.15.1.el8_0.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-80.15.1.el8_0?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:4.18.0-80.15.1.el8_0.noarch",
"product": {
"name": "kernel-abi-whitelists-0:4.18.0-80.15.1.el8_0.noarch",
"product_id": "kernel-abi-whitelists-0:4.18.0-80.15.1.el8_0.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@4.18.0-80.15.1.el8_0?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:4.18.0-80.15.1.el8_0.noarch",
"product": {
"name": "kernel-doc-0:4.18.0-80.15.1.el8_0.noarch",
"product_id": "kernel-doc-0:4.18.0-80.15.1.el8_0.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@4.18.0-80.15.1.el8_0?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-80.15.1.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-80.15.1.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-80.15.1.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.x86_64"
},
"product_reference": "bpftool-0:4.18.0-80.15.1.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-80.15.1.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.ppc64le"
},
"product_reference": "kernel-0:4.18.0-80.15.1.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-80.15.1.el8_0.src as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.src"
},
"product_reference": "kernel-0:4.18.0-80.15.1.el8_0.src",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-80.15.1.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.x86_64"
},
"product_reference": "kernel-0:4.18.0-80.15.1.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:4.18.0-80.15.1.el8_0.noarch as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.15.1.el8_0.noarch"
},
"product_reference": "kernel-abi-whitelists-0:4.18.0-80.15.1.el8_0.noarch",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-80.15.1.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-80.15.1.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-80.15.1.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-80.15.1.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-80.15.1.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-80.15.1.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-80.15.1.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-80.15.1.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-80.15.1.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-80.15.1.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-80.15.1.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-80.15.1.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-80.15.1.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-80.15.1.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-80.15.1.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-80.15.1.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-80.15.1.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.15.1.el8_0.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-80.15.1.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-80.15.1.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.15.1.el8_0.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-80.15.1.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-80.15.1.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-80.15.1.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-80.15.1.el8_0.noarch as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.15.1.el8_0.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-80.15.1.el8_0.noarch",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-80.15.1.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-80.15.1.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-80.15.1.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-80.15.1.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-80.15.1.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-80.15.1.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-80.15.1.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-80.15.1.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-80.15.1.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-80.15.1.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-80.15.1.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-80.15.1.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-80.15.1.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.ppc64le"
},
"product_reference": "perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-80.15.1.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.x86_64"
},
"product_reference": "perf-0:4.18.0-80.15.1.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-80.15.1.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-80.15.1.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-80.15.1.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Intel"
]
},
{
"names": [
"Deepak Gupta"
],
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2018-12207",
"cwe": {
"id": "CWE-226",
"name": "Sensitive Information in Resource Not Removed Before Reuse"
},
"discovery_date": "2018-11-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1646768"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way Intel CPUs handle inconsistency between, virtual to physical memory address translations in CPU\u0027s local cache and system software\u0027s Paging structure entries. A privileged guest user may use this flaw to induce a hardware Machine Check Error on the host processor, resulting in a severe DoS scenario by halting the processor.\r\n\r\nSystem software like OS OR Virtual Machine Monitor (VMM) use virtual memory system for storing program instructions and data in memory. Virtual Memory system uses Paging structures like Page Tables and Page Directories to manage system memory. The processor\u0027s Memory Management Unit (MMU) uses Paging structure entries to translate program\u0027s virtual memory addresses to physical memory addresses. The processor stores these address translations into its local cache buffer called - Translation Lookaside Buffer (TLB). TLB has two parts, one for instructions and other for data addresses.\r\n\r\nSystem software can modify its Paging structure entries to change address mappings OR certain attributes like page size etc. Upon such Paging structure alterations in memory, system software must invalidate the corresponding address translations in the processor\u0027s TLB cache. But before this TLB invalidation takes place, a privileged guest user may trigger an instruction fetch operation, which could use an already cached, but now invalid, virtual to physical address translation from Instruction TLB (ITLB). Thus accessing an invalid physical memory address and resulting in halting the processor due to the Machine Check Error (MCE) on Page Size Change.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: Machine Check Error on Page Size Change (IFU)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.src",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-12207"
},
{
"category": "external",
"summary": "RHBZ#1646768",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646768"
},
{
"category": "external",
"summary": "RHSB-ifu-page-mce",
"url": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-12207",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12207"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-12207",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12207"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-01-22T21:26:18+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.src",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2020:0204"
},
{
"category": "workaround",
"details": "For mitigation related information, please refer to the Red Hat vulnerability article: https://access.redhat.com/security/vulnerabilities/ifu-page-mce .",
"product_ids": [
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.src",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.src",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: Machine Check Error on Page Size Change (IFU)"
},
{
"acknowledgments": [
{
"names": [
"Evgenii Shatokhin",
"Vasily Averin"
],
"organization": "Virtuozzo"
}
],
"cve": "CVE-2018-16884",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2018-12-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1660375"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u0027s NFS41+ subsystem. NFS41+ shares mounted in different network namespaces at the same time can make bc_svc_process() use wrong back-channel IDs and cause a use-after-free vulnerability. Thus a malicious container user can cause a host kernel memory corruption and a system panic. Due to the nature of the flaw, privilege escalation cannot be fully ruled out.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: nfs: use-after-free in svc_process_common()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.src",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-16884"
},
{
"category": "external",
"summary": "RHBZ#1660375",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1660375"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-16884",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16884"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-16884",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-16884"
}
],
"release_date": "2018-11-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-01-22T21:26:18+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.src",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2020:0204"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:H",
"version": "3.0"
},
"products": [
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.src",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: nfs: use-after-free in svc_process_common()"
},
{
"acknowledgments": [
{
"names": [
"Intel"
]
}
],
"cve": "CVE-2019-0154",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"discovery_date": "2019-06-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1724393"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Intel graphics hardware (GPU) where a local attacker with the ability to issue an ioctl could trigger a hardware level crash if MMIO registers were read while the graphics card was in a low-power state. This creates a denial of service situation and the GPU and connected displays will remain unusable until a reboot occurs.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: Intel GPU Denial Of Service while accessing MMIO in lower power state",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Intel plans to release BIOS firmware to correct this issue. Red Hat\u0027s kernel update should mitigate this vulnerability. Some older hardware will not have BIOS firmware update and will rely on operating system level protection to prevent access while the device is in low-power states. For more information see https://access.redhat.com/solutions/i915-graphics",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.src",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-0154"
},
{
"category": "external",
"summary": "RHBZ#1724393",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1724393"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-0154",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0154"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-0154",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0154"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/i915-graphics",
"url": "https://access.redhat.com/solutions/i915-graphics"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00260.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00260.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-01-22T21:26:18+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.src",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2020:0204"
},
{
"category": "workaround",
"details": "Preventing loading of the i915 kernel module will prevent attackers from using this exploit against the system however the power management functionality of the card will be disabled and the system may draw additional power. See this KCS article (https://access.redhat.com/solutions/41278) for instructions on how to disable a kernel module. Graphical displays may also be at low resolution or not work correctly. This mitigation may not be suitable if running graphical tools locally is required.",
"product_ids": [
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.src",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.src",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: Intel GPU Denial Of Service while accessing MMIO in lower power state"
},
{
"acknowledgments": [
{
"names": [
"Intel"
]
}
],
"cve": "CVE-2019-0155",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"discovery_date": "2019-06-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1724398"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Intel graphics hardware (GPU), where a local attacker with the ability to issue commands to the GPU could inadvertently lead to memory corruption and possible privilege escalation. The attacker could use the GPU blitter to perform privilege MMIO operations, not limited to the address space required to function correctly.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: Intel GPU blitter manipulation can allow for arbitrary kernel memory write",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/solutions/i915-graphics",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.src",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-0155"
},
{
"category": "external",
"summary": "RHBZ#1724398",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1724398"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-0155",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0155"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-0155",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0155"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/i915-graphics",
"url": "https://access.redhat.com/solutions/i915-graphics"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00242.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00242.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-01-22T21:26:18+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.src",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2020:0204"
},
{
"category": "workaround",
"details": "Preventing loading of the i915 kernel module will prevent attackers from using this exploit against the system however the power management functionality of the card will be disabled and the system may draw additional power. See this KCS article( https://access.redhat.com/solutions/41278 ) for instructions on how to disable a kernel module. Graphical displays may also be at low resolution or not work correctly. This mitigation may not be suitable if running graphical tools locally is required.",
"product_ids": [
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.src",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.src",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: Intel GPU blitter manipulation can allow for arbitrary kernel memory write"
},
{
"acknowledgments": [
{
"names": [
"Jason Wang"
],
"organization": "Red Hat Inc.",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2019-3900",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2019-04-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1698757"
}
],
"notes": [
{
"category": "description",
"text": "An infinite loop issue was found in the vhost_net kernel module while handling incoming packets in handle_rx(). The infinite loop could occur if one end sends packets faster than the other end can process them. A guest user, maybe a remote one, could use this flaw to stall the vhost_net kernel thread, resulting in a DoS scenario.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Kernel: vhost_net: infinite loop while receiving packets leads to DoS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue does not affect the versions of the kernel package as shipped with Red Hat Enterprise Linux 5 and Red Hat Enterprise MRG 2.\n\nThis issue affects the version of Linux kernel as shipped with Red Hat Enterprise Linux 6 and 7. Future kernel updates for Red Hat Enterprise Linux 6 and 7 may address this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.src",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-3900"
},
{
"category": "external",
"summary": "RHBZ#1698757",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1698757"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-3900",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3900"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-3900",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-3900"
}
],
"release_date": "2019-04-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-01-22T21:26:18+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.src",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2020:0204"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.src",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "Kernel: vhost_net: infinite loop while receiving packets leads to DoS"
},
{
"cve": "CVE-2019-5489",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2019-01-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1664110"
}
],
"notes": [
{
"category": "description",
"text": "A new software page cache side channel attack scenario was discovered in operating systems that implement the very common \u0027page cache\u0027 caching mechanism. A malicious user/process could use \u0027in memory\u0027 page-cache knowledge to infer access timings to shared memory and gain knowledge which can be used to reduce effectiveness of cryptographic strength by monitoring algorithmic behavior, infer access patterns of memory to determine code paths taken, and exfiltrate data to a blinded attacker through page-granularity access times as a side-channel.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Kernel: page cache side channel attacks",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.src",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-5489"
},
{
"category": "external",
"summary": "RHBZ#1664110",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1664110"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-5489",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5489"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-5489",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-5489"
}
],
"release_date": "2019-01-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-01-22T21:26:18+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.src",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2020:0204"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:L/A:N",
"version": "3.0"
},
"products": [
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.src",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "Kernel: page cache side channel attacks"
},
{
"cve": "CVE-2019-9506",
"cwe": {
"id": "CWE-327",
"name": "Use of a Broken or Risky Cryptographic Algorithm"
},
"discovery_date": "2019-06-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1727857"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in the Bluetooth protocol. An attacker within physical proximity to the Bluetooth connection could downgrade the encryption protocol to be trivially brute forced.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hardware: bluetooth: BR/EDR encryption key negotiation attacks (KNOB)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.src",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-9506"
},
{
"category": "external",
"summary": "RHBZ#1727857",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1727857"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-9506",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9506"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9506",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9506"
}
],
"release_date": "2019-08-10T09:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-01-22T21:26:18+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.src",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2020:0204"
},
{
"category": "workaround",
"details": "At this time there is no known mitigation if bluetooth hardware is to be continue to be used. Replacing the hardware with its wired version and disabling bluetooth may be a suitable alternative for some environments.",
"product_ids": [
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.src",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L",
"version": "3.0"
},
"products": [
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.src",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hardware: bluetooth: BR/EDR encryption key negotiation attacks (KNOB)"
},
{
"acknowledgments": [
{
"names": [
"huangwen"
],
"organization": "ADLab of Venustech"
}
],
"cve": "CVE-2019-10126",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2019-05-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1716992"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the mwifiex implementation in the Linux kernel. A system connecting to wireless access point could be manipulated by an attacker with advanced permissions on the access point into localized memory corruption or possibly privilege escalation.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Heap overflow in mwifiex_uap_parse_tail_ies function in drivers/net/wireless/marvell/mwifiex/ie.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.src",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-10126"
},
{
"category": "external",
"summary": "RHBZ#1716992",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1716992"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-10126",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10126"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-10126",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10126"
}
],
"release_date": "2019-05-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-01-22T21:26:18+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.src",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2020:0204"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.src",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Heap overflow in mwifiex_uap_parse_tail_ies function in drivers/net/wireless/marvell/mwifiex/ie.c"
},
{
"acknowledgments": [
{
"names": [
"Intel"
]
}
],
"cve": "CVE-2019-11135",
"cwe": {
"id": "CWE-203",
"name": "Observable Discrepancy"
},
"discovery_date": "2019-09-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1753062"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way Intel CPUs handle speculative execution of instructions when the TSX Asynchronous Abort (TAA) error occurs. A local authenticated attacker with the ability to monitor execution times could infer the TSX memory state by comparing abort execution times. This could allow information disclosure via this observed side-channel for any TSX transaction being executed while an attacker is able to observe abort timing.\r\n\r\nIntel\u0027s Transactional Synchronisation Extensions (TSX) are set of instructions which enable transactional memory support to improve performance of the multi-threaded applications, in the lock-protected critical sections. The CPU executes instructions in the critical-sections as transactions, while ensuring their atomic state. When such transaction execution is unsuccessful, the processor cannot ensure atomic updates to the transaction memory, so the processor rolls back or aborts such transaction execution.\r\n\r\nWhile TSX Asynchronous Abort (TAA) is pending, CPU may continue to read data from architectural buffers and pass it to the dependent speculative operations. This may cause information leakage via speculative side-channel means, which is quite similar to the Microarchitectural Data Sampling (MDS) issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: TSX Transaction Asynchronous Abort (TAA)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "libvirt and qemu-kvm on Red Hat Enterprise Linux 6 are not affected by this vulnerability as they do not support MSR-based CPU features.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.src",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11135"
},
{
"category": "external",
"summary": "RHBZ#1753062",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753062"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11135",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11135"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11135",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11135"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/tsx-asynchronousabort",
"url": "https://access.redhat.com/solutions/tsx-asynchronousabort"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00270.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00270.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-01-22T21:26:18+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.src",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2020:0204"
},
{
"category": "workaround",
"details": "For mitigation related information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/solutions/tsx-asynchronousabort",
"product_ids": [
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.src",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.src",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: TSX Transaction Asynchronous Abort (TAA)"
},
{
"acknowledgments": [
{
"names": [
"Huangwen"
],
"organization": "ADLab of Venustech"
}
],
"cve": "CVE-2019-14816",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2019-08-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1744149"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the Linux kernel\u0027s Marvell WiFi chip driver. Where, while parsing vendor-specific informational attributes, an attacker on the same WiFi physical network segment could cause a system crash, resulting in a denial of service, or potentially execute arbitrary code. This flaw affects the network interface at the most basic level meaning the attacker only needs to affiliate with the same network device as the vulnerable system to create an attack path.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: heap overflow in mwifiex_update_vs_ie() function of Marvell WiFi driver",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.src",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-14816"
},
{
"category": "external",
"summary": "RHBZ#1744149",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1744149"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-14816",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14816"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14816",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14816"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7caac62ed598a196d6ddf8d9c121e12e082cac3a",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7caac62ed598a196d6ddf8d9c121e12e082cac3a"
}
],
"release_date": "2019-08-28T10:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-01-22T21:26:18+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.src",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2020:0204"
},
{
"category": "workaround",
"details": "At this time there is no mitigation to the flaw, if you are able to disable wireless and your system is able to work this will be a temporary mitigation until a kernel update is available for installation.",
"product_ids": [
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.src",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.src",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: heap overflow in mwifiex_update_vs_ie() function of Marvell WiFi driver"
},
{
"acknowledgments": [
{
"names": [
"Matt Delco"
],
"organization": "Google.com"
}
],
"cve": "CVE-2019-14821",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2019-08-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1746708"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds access issue was found in the way Linux kernel\u0027s KVM hypervisor implements the Coalesced MMIO write operation. It operates on an MMIO ring buffer \u0027struct kvm_coalesced_mmio\u0027 object, wherein write indices \u0027ring-\u003efirst\u0027 and \u0027ring-\u003elast\u0027 value could be supplied by a host user-space process. An unprivileged host user or process with access to \u0027/dev/kvm\u0027 device could use this flaw to crash the host kernel, resulting in a denial of service or potentially escalating privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Kernel: KVM: OOB memory access via mmio ring buffer",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue requires unprivileged users to have access to \u0027/dev/kvm\u0027 device. So restricting access to \u0027/dev/kvm\u0027 device to known trusted users could limit its exploitation by untrusted users/processes.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.src",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-14821"
},
{
"category": "external",
"summary": "RHBZ#1746708",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1746708"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-14821",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14821"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14821",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14821"
}
],
"release_date": "2019-09-17T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-01-22T21:26:18+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.src",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2020:0204"
},
{
"category": "workaround",
"details": "Restrict access to the \u0027/dev/kvm\u0027 device to trusted users.",
"product_ids": [
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.src",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.src",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "Kernel: KVM: OOB memory access via mmio ring buffer"
},
{
"acknowledgments": [
{
"names": [
"Huangwen and Wang Qize"
],
"organization": "ADLab of VenusTech"
}
],
"cve": "CVE-2019-14901",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2019-11-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1773519"
}
],
"notes": [
{
"category": "description",
"text": "A heap overflow flaw was found in the Linux kernel\u0027s Marvell WiFi chip driver. The vulnerability allows a remote attacker to cause a system crash, resulting in a denial of service, or execute arbitrary code. The highest threat with this vulnerability is with the availability of the system. If code execution occurs, the code will run with the permissions of root. This will affect both confidentiality and integrity of files on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: heap overflow in marvell/mwifiex/tdls.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.src",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-14901"
},
{
"category": "external",
"summary": "RHBZ#1773519",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1773519"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-14901",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14901"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14901",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14901"
}
],
"release_date": "2019-11-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-01-22T21:26:18+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.src",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2020:0204"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.src",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: heap overflow in marvell/mwifiex/tdls.c"
}
]
}
rhsa-2019:3836
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 6.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* hw: Machine Check Error on Page Size Change (IFU) (CVE-2018-12207)\n\n* hw: TSX Transaction Asynchronous Abort (TAA) (CVE-2019-11135)\n\n* Kernel: vhost_net: infinite loop while receiving packets leads to DoS (CVE-2019-3900)\n\n* hw: Intel GPU Denial Of Service while accessing MMIO in lower power state (CVE-2019-0154)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* [Intel 6.10 Bug] With mWait/C-states disabled, HT on, ibrs enabled, performance impact observed on user space benchmark (BZ#1560787)\n\n* kernel-2.6.32-573.60.2.el6 hangs/resets during boot in efi_enter_virtual_mode() on Xeon v2 E7-2870 (BZ#1645724)\n\n* Slab leak: skbuff_head_cache slab object still allocated after mcast processes are stopped and \"fragments dropped after timeout\" errors are shown (BZ#1752536)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2019:3836",
"url": "https://access.redhat.com/errata/RHSA-2019:3836"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce",
"url": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/tsx-asynchronousabort",
"url": "https://access.redhat.com/solutions/tsx-asynchronousabort"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/i915-graphics",
"url": "https://access.redhat.com/solutions/i915-graphics"
},
{
"category": "external",
"summary": "1646768",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646768"
},
{
"category": "external",
"summary": "1698757",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1698757"
},
{
"category": "external",
"summary": "1724393",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1724393"
},
{
"category": "external",
"summary": "1753062",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753062"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_3836.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2025-10-09T18:15:57+00:00",
"generator": {
"date": "2025-10-09T18:15:57+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2019:3836",
"initial_release_date": "2019-11-12T21:11:39+00:00",
"revision_history": [
{
"date": "2019-11-12T21:11:39+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2019-11-12T21:11:39+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T18:15:57+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux HPC Node (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::workstation"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::workstation"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.32-754.24.2.el6.i686",
"product": {
"name": "kernel-0:2.6.32-754.24.2.el6.i686",
"product_id": "kernel-0:2.6.32-754.24.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-754.24.2.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-754.24.2.el6.i686",
"product": {
"name": "kernel-debug-0:2.6.32-754.24.2.el6.i686",
"product_id": "kernel-debug-0:2.6.32-754.24.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-754.24.2.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"product": {
"name": "kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"product_id": "kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-754.24.2.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-754.24.2.el6.i686",
"product": {
"name": "kernel-devel-0:2.6.32-754.24.2.el6.i686",
"product_id": "kernel-devel-0:2.6.32-754.24.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-754.24.2.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.32-754.24.2.el6.i686",
"product": {
"name": "kernel-headers-0:2.6.32-754.24.2.el6.i686",
"product_id": "kernel-headers-0:2.6.32-754.24.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.32-754.24.2.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "perf-0:2.6.32-754.24.2.el6.i686",
"product": {
"name": "perf-0:2.6.32-754.24.2.el6.i686",
"product_id": "perf-0:2.6.32-754.24.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-754.24.2.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"product_id": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-754.24.2.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"product": {
"name": "kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"product_id": "kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-754.24.2.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"product": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"product_id": "kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-i686@2.6.32-754.24.2.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"product": {
"name": "perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"product_id": "perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-754.24.2.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"product": {
"name": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"product_id": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-754.24.2.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:2.6.32-754.24.2.el6.i686",
"product": {
"name": "python-perf-0:2.6.32-754.24.2.el6.i686",
"product_id": "python-perf-0:2.6.32-754.24.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@2.6.32-754.24.2.el6?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.32-754.24.2.el6.x86_64",
"product": {
"name": "kernel-0:2.6.32-754.24.2.el6.x86_64",
"product_id": "kernel-0:2.6.32-754.24.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-754.24.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"product": {
"name": "kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"product_id": "kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-754.24.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"product": {
"name": "kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"product_id": "kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-754.24.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"product": {
"name": "kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"product_id": "kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-754.24.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"product": {
"name": "kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"product_id": "kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.32-754.24.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:2.6.32-754.24.2.el6.x86_64",
"product": {
"name": "perf-0:2.6.32-754.24.2.el6.x86_64",
"product_id": "perf-0:2.6.32-754.24.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-754.24.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"product_id": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-754.24.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"product": {
"name": "kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"product_id": "kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-754.24.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@2.6.32-754.24.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"product": {
"name": "perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"product_id": "perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-754.24.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"product": {
"name": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"product_id": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-754.24.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:2.6.32-754.24.2.el6.x86_64",
"product": {
"name": "python-perf-0:2.6.32-754.24.2.el6.x86_64",
"product_id": "python-perf-0:2.6.32-754.24.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@2.6.32-754.24.2.el6?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.32-754.24.2.el6.src",
"product": {
"name": "kernel-0:2.6.32-754.24.2.el6.src",
"product_id": "kernel-0:2.6.32-754.24.2.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-754.24.2.el6?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"product": {
"name": "kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"product_id": "kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@2.6.32-754.24.2.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"product": {
"name": "kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"product_id": "kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@2.6.32-754.24.2.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"product": {
"name": "kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"product_id": "kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-firmware@2.6.32-754.24.2.el6?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.32-754.24.2.el6.s390x",
"product": {
"name": "kernel-0:2.6.32-754.24.2.el6.s390x",
"product_id": "kernel-0:2.6.32-754.24.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-754.24.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"product": {
"name": "kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"product_id": "kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-754.24.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"product": {
"name": "kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"product_id": "kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-754.24.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"product": {
"name": "kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"product_id": "kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-754.24.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"product": {
"name": "kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"product_id": "kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.32-754.24.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"product": {
"name": "kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"product_id": "kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump@2.6.32-754.24.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"product": {
"name": "kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"product_id": "kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.32-754.24.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:2.6.32-754.24.2.el6.s390x",
"product": {
"name": "perf-0:2.6.32-754.24.2.el6.s390x",
"product_id": "perf-0:2.6.32-754.24.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-754.24.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"product_id": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-754.24.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"product": {
"name": "kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"product_id": "kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-754.24.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@2.6.32-754.24.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"product": {
"name": "kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"product_id": "kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.32-754.24.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"product": {
"name": "perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"product_id": "perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-754.24.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"product": {
"name": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"product_id": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-754.24.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:2.6.32-754.24.2.el6.s390x",
"product": {
"name": "python-perf-0:2.6.32-754.24.2.el6.s390x",
"product_id": "python-perf-0:2.6.32-754.24.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@2.6.32-754.24.2.el6?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.32-754.24.2.el6.ppc64",
"product": {
"name": "kernel-0:2.6.32-754.24.2.el6.ppc64",
"product_id": "kernel-0:2.6.32-754.24.2.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-754.24.2.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"product": {
"name": "kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"product_id": "kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@2.6.32-754.24.2.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"product": {
"name": "kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"product_id": "kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-754.24.2.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"product": {
"name": "kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"product_id": "kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-754.24.2.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"product": {
"name": "kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"product_id": "kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-754.24.2.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"product": {
"name": "kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"product_id": "kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.32-754.24.2.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "perf-0:2.6.32-754.24.2.el6.ppc64",
"product": {
"name": "perf-0:2.6.32-754.24.2.el6.ppc64",
"product_id": "perf-0:2.6.32-754.24.2.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-754.24.2.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"product_id": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-754.24.2.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"product": {
"name": "kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"product_id": "kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-754.24.2.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"product": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"product_id": "kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64@2.6.32-754.24.2.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"product": {
"name": "perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"product_id": "perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-754.24.2.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"product": {
"name": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"product_id": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-754.24.2.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:2.6.32-754.24.2.el6.ppc64",
"product": {
"name": "python-perf-0:2.6.32-754.24.2.el6.ppc64",
"product_id": "python-perf-0:2.6.32-754.24.2.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@2.6.32-754.24.2.el6?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.24.2.el6.src as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.src"
},
"product_reference": "kernel-0:2.6.32-754.24.2.el6.src",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-754.24.2.el6.noarch as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-754.24.2.el6.noarch as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "perf-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "perf-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "perf-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "python-perf-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.24.2.el6.src as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src"
},
"product_reference": "kernel-0:2.6.32-754.24.2.el6.src",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-754.24.2.el6.noarch as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-754.24.2.el6.noarch as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "perf-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "perf-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "perf-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "python-perf-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.24.2.el6.src as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.src"
},
"product_reference": "kernel-0:2.6.32-754.24.2.el6.src",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-754.24.2.el6.noarch as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-754.24.2.el6.noarch as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "perf-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "perf-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "perf-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "python-perf-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.24.2.el6.src as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src"
},
"product_reference": "kernel-0:2.6.32-754.24.2.el6.src",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-754.24.2.el6.noarch as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-754.24.2.el6.noarch as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "perf-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "perf-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "perf-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "python-perf-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.24.2.el6.src as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.src"
},
"product_reference": "kernel-0:2.6.32-754.24.2.el6.src",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-754.24.2.el6.noarch as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-754.24.2.el6.noarch as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "perf-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "perf-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "perf-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "python-perf-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.24.2.el6.src as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src"
},
"product_reference": "kernel-0:2.6.32-754.24.2.el6.src",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-754.24.2.el6.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-754.24.2.el6.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "perf-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "perf-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "perf-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "python-perf-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.24.2.el6.src as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.src"
},
"product_reference": "kernel-0:2.6.32-754.24.2.el6.src",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-754.24.2.el6.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-754.24.2.el6.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "perf-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "perf-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "perf-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "python-perf-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.24.2.el6.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src"
},
"product_reference": "kernel-0:2.6.32-754.24.2.el6.src",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-754.24.2.el6.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-754.24.2.el6.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "perf-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "perf-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "perf-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "python-perf-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Intel"
]
},
{
"names": [
"Deepak Gupta"
],
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2018-12207",
"cwe": {
"id": "CWE-226",
"name": "Sensitive Information in Resource Not Removed Before Reuse"
},
"discovery_date": "2018-11-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1646768"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way Intel CPUs handle inconsistency between, virtual to physical memory address translations in CPU\u0027s local cache and system software\u0027s Paging structure entries. A privileged guest user may use this flaw to induce a hardware Machine Check Error on the host processor, resulting in a severe DoS scenario by halting the processor.\r\n\r\nSystem software like OS OR Virtual Machine Monitor (VMM) use virtual memory system for storing program instructions and data in memory. Virtual Memory system uses Paging structures like Page Tables and Page Directories to manage system memory. The processor\u0027s Memory Management Unit (MMU) uses Paging structure entries to translate program\u0027s virtual memory addresses to physical memory addresses. The processor stores these address translations into its local cache buffer called - Translation Lookaside Buffer (TLB). TLB has two parts, one for instructions and other for data addresses.\r\n\r\nSystem software can modify its Paging structure entries to change address mappings OR certain attributes like page size etc. Upon such Paging structure alterations in memory, system software must invalidate the corresponding address translations in the processor\u0027s TLB cache. But before this TLB invalidation takes place, a privileged guest user may trigger an instruction fetch operation, which could use an already cached, but now invalid, virtual to physical address translation from Instruction TLB (ITLB). Thus accessing an invalid physical memory address and resulting in halting the processor due to the Machine Check Error (MCE) on Page Size Change.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: Machine Check Error on Page Size Change (IFU)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Client-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Server-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-12207"
},
{
"category": "external",
"summary": "RHBZ#1646768",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646768"
},
{
"category": "external",
"summary": "RHSB-ifu-page-mce",
"url": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-12207",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12207"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-12207",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12207"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-11-12T21:11:39+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Client-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Server-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:3836"
},
{
"category": "workaround",
"details": "For mitigation related information, please refer to the Red Hat vulnerability article: https://access.redhat.com/security/vulnerabilities/ifu-page-mce .",
"product_ids": [
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Client-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Server-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Client-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Server-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: Machine Check Error on Page Size Change (IFU)"
},
{
"acknowledgments": [
{
"names": [
"Intel"
]
}
],
"cve": "CVE-2019-0154",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"discovery_date": "2019-06-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1724393"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Intel graphics hardware (GPU) where a local attacker with the ability to issue an ioctl could trigger a hardware level crash if MMIO registers were read while the graphics card was in a low-power state. This creates a denial of service situation and the GPU and connected displays will remain unusable until a reboot occurs.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: Intel GPU Denial Of Service while accessing MMIO in lower power state",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Intel plans to release BIOS firmware to correct this issue. Red Hat\u0027s kernel update should mitigate this vulnerability. Some older hardware will not have BIOS firmware update and will rely on operating system level protection to prevent access while the device is in low-power states. For more information see https://access.redhat.com/solutions/i915-graphics",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Client-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Server-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-0154"
},
{
"category": "external",
"summary": "RHBZ#1724393",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1724393"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-0154",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0154"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-0154",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0154"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/i915-graphics",
"url": "https://access.redhat.com/solutions/i915-graphics"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00260.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00260.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-11-12T21:11:39+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Client-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Server-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:3836"
},
{
"category": "workaround",
"details": "Preventing loading of the i915 kernel module will prevent attackers from using this exploit against the system however the power management functionality of the card will be disabled and the system may draw additional power. See this KCS article (https://access.redhat.com/solutions/41278) for instructions on how to disable a kernel module. Graphical displays may also be at low resolution or not work correctly. This mitigation may not be suitable if running graphical tools locally is required.",
"product_ids": [
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Client-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Server-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Client-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Server-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: Intel GPU Denial Of Service while accessing MMIO in lower power state"
},
{
"acknowledgments": [
{
"names": [
"Jason Wang"
],
"organization": "Red Hat Inc.",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2019-3900",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2019-04-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1698757"
}
],
"notes": [
{
"category": "description",
"text": "An infinite loop issue was found in the vhost_net kernel module while handling incoming packets in handle_rx(). The infinite loop could occur if one end sends packets faster than the other end can process them. A guest user, maybe a remote one, could use this flaw to stall the vhost_net kernel thread, resulting in a DoS scenario.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Kernel: vhost_net: infinite loop while receiving packets leads to DoS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue does not affect the versions of the kernel package as shipped with Red Hat Enterprise Linux 5 and Red Hat Enterprise MRG 2.\n\nThis issue affects the version of Linux kernel as shipped with Red Hat Enterprise Linux 6 and 7. Future kernel updates for Red Hat Enterprise Linux 6 and 7 may address this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Client-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Server-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-3900"
},
{
"category": "external",
"summary": "RHBZ#1698757",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1698757"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-3900",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3900"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-3900",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-3900"
}
],
"release_date": "2019-04-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-11-12T21:11:39+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Client-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Server-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:3836"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Client-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Server-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "Kernel: vhost_net: infinite loop while receiving packets leads to DoS"
},
{
"acknowledgments": [
{
"names": [
"Intel"
]
}
],
"cve": "CVE-2019-11135",
"cwe": {
"id": "CWE-203",
"name": "Observable Discrepancy"
},
"discovery_date": "2019-09-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1753062"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way Intel CPUs handle speculative execution of instructions when the TSX Asynchronous Abort (TAA) error occurs. A local authenticated attacker with the ability to monitor execution times could infer the TSX memory state by comparing abort execution times. This could allow information disclosure via this observed side-channel for any TSX transaction being executed while an attacker is able to observe abort timing.\r\n\r\nIntel\u0027s Transactional Synchronisation Extensions (TSX) are set of instructions which enable transactional memory support to improve performance of the multi-threaded applications, in the lock-protected critical sections. The CPU executes instructions in the critical-sections as transactions, while ensuring their atomic state. When such transaction execution is unsuccessful, the processor cannot ensure atomic updates to the transaction memory, so the processor rolls back or aborts such transaction execution.\r\n\r\nWhile TSX Asynchronous Abort (TAA) is pending, CPU may continue to read data from architectural buffers and pass it to the dependent speculative operations. This may cause information leakage via speculative side-channel means, which is quite similar to the Microarchitectural Data Sampling (MDS) issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: TSX Transaction Asynchronous Abort (TAA)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "libvirt and qemu-kvm on Red Hat Enterprise Linux 6 are not affected by this vulnerability as they do not support MSR-based CPU features.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Client-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Server-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11135"
},
{
"category": "external",
"summary": "RHBZ#1753062",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753062"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11135",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11135"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11135",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11135"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/tsx-asynchronousabort",
"url": "https://access.redhat.com/solutions/tsx-asynchronousabort"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00270.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00270.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-11-12T21:11:39+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Client-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Server-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:3836"
},
{
"category": "workaround",
"details": "For mitigation related information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/solutions/tsx-asynchronousabort",
"product_ids": [
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Client-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Server-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Client-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Server-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: TSX Transaction Asynchronous Abort (TAA)"
}
]
}
RHSA-2019:3837
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 7.6 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* hw: Machine Check Error on Page Size Change (IFU) (CVE-2018-12207)\n\n* hw: TSX Transaction Asynchronous Abort (TAA) (CVE-2019-11135)\n\n* hw: Intel GPU Denial Of Service while accessing MMIO in lower power state (CVE-2019-0154)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2019:3837",
"url": "https://access.redhat.com/errata/RHSA-2019:3837"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce",
"url": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/tsx-asynchronousabort",
"url": "https://access.redhat.com/solutions/tsx-asynchronousabort"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/i915-graphics",
"url": "https://access.redhat.com/solutions/i915-graphics"
},
{
"category": "external",
"summary": "1646768",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646768"
},
{
"category": "external",
"summary": "1724393",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1724393"
},
{
"category": "external",
"summary": "1753062",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753062"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_3837.json"
}
],
"title": "Red Hat Security Advisory: kernel security update",
"tracking": {
"current_release_date": "2025-10-09T18:15:54+00:00",
"generator": {
"date": "2025-10-09T18:15:54+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2019:3837",
"initial_release_date": "2019-11-12T20:54:34+00:00",
"revision_history": [
{
"date": "2019-11-12T20:54:34+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2019-11-12T20:54:34+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T18:15:54+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product": {
"name": "Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::hypervisor"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.6::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.6::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product": {
"name": "Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.6::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-957.38.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-957.38.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"product_id": "kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-957.38.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-957.38.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-957.38.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"product": {
"name": "perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"product_id": "perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-957.38.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"product_id": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-957.38.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-0:3.10.0-957.38.2.el7.x86_64",
"product": {
"name": "bpftool-0:3.10.0-957.38.2.el7.x86_64",
"product_id": "bpftool-0:3.10.0-957.38.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@3.10.0-957.38.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-957.38.2.el7.x86_64",
"product": {
"name": "kernel-0:3.10.0-957.38.2.el7.x86_64",
"product_id": "kernel-0:3.10.0-957.38.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-957.38.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"product": {
"name": "kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"product_id": "kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-957.38.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"product_id": "kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-957.38.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"product": {
"name": "kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"product_id": "kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-957.38.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"product": {
"name": "kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"product_id": "kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-957.38.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"product": {
"name": "kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"product_id": "kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-957.38.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"product_id": "kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-957.38.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-957.38.2.el7.x86_64",
"product": {
"name": "perf-0:3.10.0-957.38.2.el7.x86_64",
"product_id": "perf-0:3.10.0-957.38.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-957.38.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-957.38.2.el7.x86_64",
"product": {
"name": "python-perf-0:3.10.0-957.38.2.el7.x86_64",
"product_id": "python-perf-0:3.10.0-957.38.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-957.38.2.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"product": {
"name": "kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"product_id": "kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-957.38.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"product_id": "kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-957.38.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"product_id": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-957.38.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"product_id": "kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-957.38.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@3.10.0-957.38.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"product_id": "kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-957.38.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"product": {
"name": "perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"product_id": "perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-957.38.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"product_id": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-957.38.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-957.38.2.el7.ppc64le",
"product": {
"name": "kernel-0:3.10.0-957.38.2.el7.ppc64le",
"product_id": "kernel-0:3.10.0-957.38.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-957.38.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"product": {
"name": "kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"product_id": "kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-957.38.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"product": {
"name": "kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"product_id": "kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-957.38.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"product": {
"name": "kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"product_id": "kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-957.38.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"product": {
"name": "kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"product_id": "kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-957.38.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"product": {
"name": "kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"product_id": "kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-957.38.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"product_id": "kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-957.38.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-957.38.2.el7.ppc64le",
"product": {
"name": "perf-0:3.10.0-957.38.2.el7.ppc64le",
"product_id": "perf-0:3.10.0-957.38.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-957.38.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"product": {
"name": "python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"product_id": "python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-957.38.2.el7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-957.38.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-957.38.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"product_id": "kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-957.38.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"product": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"product_id": "kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64@3.10.0-957.38.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-957.38.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"product": {
"name": "perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"product_id": "perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-957.38.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"product_id": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-957.38.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-957.38.2.el7.ppc64",
"product": {
"name": "kernel-0:3.10.0-957.38.2.el7.ppc64",
"product_id": "kernel-0:3.10.0-957.38.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-957.38.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"product": {
"name": "kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"product_id": "kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-957.38.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"product": {
"name": "kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"product_id": "kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-957.38.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"product_id": "kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-957.38.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"product": {
"name": "kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"product_id": "kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-957.38.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"product": {
"name": "kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"product_id": "kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-957.38.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"product": {
"name": "kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"product_id": "kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-957.38.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"product_id": "kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-957.38.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-957.38.2.el7.ppc64",
"product": {
"name": "perf-0:3.10.0-957.38.2.el7.ppc64",
"product_id": "perf-0:3.10.0-957.38.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-957.38.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-957.38.2.el7.ppc64",
"product": {
"name": "python-perf-0:3.10.0-957.38.2.el7.ppc64",
"product_id": "python-perf-0:3.10.0-957.38.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-957.38.2.el7?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-957.38.2.el7.src",
"product": {
"name": "kernel-0:3.10.0-957.38.2.el7.src",
"product_id": "kernel-0:3.10.0-957.38.2.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-957.38.2.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"product": {
"name": "kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"product_id": "kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-957.38.2.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"product": {
"name": "kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"product_id": "kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@3.10.0-957.38.2.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-957.38.2.el7.s390x",
"product": {
"name": "kernel-0:3.10.0-957.38.2.el7.s390x",
"product_id": "kernel-0:3.10.0-957.38.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-957.38.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"product": {
"name": "kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"product_id": "kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-957.38.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"product": {
"name": "kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"product_id": "kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-957.38.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"product": {
"name": "kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"product_id": "kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-957.38.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"product": {
"name": "kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"product_id": "kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-957.38.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"product": {
"name": "kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"product_id": "kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump@3.10.0-957.38.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"product": {
"name": "kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"product_id": "kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-devel@3.10.0-957.38.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-957.38.2.el7.s390x",
"product": {
"name": "perf-0:3.10.0-957.38.2.el7.s390x",
"product_id": "perf-0:3.10.0-957.38.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-957.38.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-957.38.2.el7.s390x",
"product": {
"name": "python-perf-0:3.10.0-957.38.2.el7.s390x",
"product_id": "python-perf-0:3.10.0-957.38.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-957.38.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"product_id": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-957.38.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"product": {
"name": "kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"product_id": "kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-957.38.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@3.10.0-957.38.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"product": {
"name": "kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"product_id": "kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@3.10.0-957.38.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"product": {
"name": "perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"product_id": "perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-957.38.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"product_id": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-957.38.2.el7?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.38.2.el7.src as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-957.38.2.el7.src",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-957.38.2.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "perf-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.38.2.el7.src as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-957.38.2.el7.src",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-957.38.2.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "perf-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:bpftool-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.38.2.el7.src as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-957.38.2.el7.src",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-957.38.2.el7.noarch as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-doc-0:3.10.0-957.38.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-kdump-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "perf-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.38.2.el7.src as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-957.38.2.el7.src",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-957.38.2.el7.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "perf-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.38.2.el7.src as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-957.38.2.el7.src",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-957.38.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "perf-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Intel"
]
},
{
"names": [
"Deepak Gupta"
],
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2018-12207",
"cwe": {
"id": "CWE-226",
"name": "Sensitive Information in Resource Not Removed Before Reuse"
},
"discovery_date": "2018-11-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1646768"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way Intel CPUs handle inconsistency between, virtual to physical memory address translations in CPU\u0027s local cache and system software\u0027s Paging structure entries. A privileged guest user may use this flaw to induce a hardware Machine Check Error on the host processor, resulting in a severe DoS scenario by halting the processor.\r\n\r\nSystem software like OS OR Virtual Machine Monitor (VMM) use virtual memory system for storing program instructions and data in memory. Virtual Memory system uses Paging structures like Page Tables and Page Directories to manage system memory. The processor\u0027s Memory Management Unit (MMU) uses Paging structure entries to translate program\u0027s virtual memory addresses to physical memory addresses. The processor stores these address translations into its local cache buffer called - Translation Lookaside Buffer (TLB). TLB has two parts, one for instructions and other for data addresses.\r\n\r\nSystem software can modify its Paging structure entries to change address mappings OR certain attributes like page size etc. Upon such Paging structure alterations in memory, system software must invalidate the corresponding address translations in the processor\u0027s TLB cache. But before this TLB invalidation takes place, a privileged guest user may trigger an instruction fetch operation, which could use an already cached, but now invalid, virtual to physical address translation from Instruction TLB (ITLB). Thus accessing an invalid physical memory address and resulting in halting the processor due to the Machine Check Error (MCE) on Page Size Change.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: Machine Check Error on Page Size Change (IFU)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7ComputeNode-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7ComputeNode-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7ComputeNode-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.src",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7Server-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7Server-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-12207"
},
{
"category": "external",
"summary": "RHBZ#1646768",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646768"
},
{
"category": "external",
"summary": "RHSB-ifu-page-mce",
"url": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-12207",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12207"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-12207",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12207"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-11-12T20:54:34+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7ComputeNode-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7ComputeNode-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7ComputeNode-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.src",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7Server-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7Server-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:3837"
},
{
"category": "workaround",
"details": "For mitigation related information, please refer to the Red Hat vulnerability article: https://access.redhat.com/security/vulnerabilities/ifu-page-mce .",
"product_ids": [
"7ComputeNode-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7ComputeNode-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7ComputeNode-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.src",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7Server-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7Server-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7ComputeNode-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7ComputeNode-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7ComputeNode-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.src",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7Server-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7Server-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: Machine Check Error on Page Size Change (IFU)"
},
{
"acknowledgments": [
{
"names": [
"Intel"
]
}
],
"cve": "CVE-2019-0154",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"discovery_date": "2019-06-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1724393"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Intel graphics hardware (GPU) where a local attacker with the ability to issue an ioctl could trigger a hardware level crash if MMIO registers were read while the graphics card was in a low-power state. This creates a denial of service situation and the GPU and connected displays will remain unusable until a reboot occurs.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: Intel GPU Denial Of Service while accessing MMIO in lower power state",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Intel plans to release BIOS firmware to correct this issue. Red Hat\u0027s kernel update should mitigate this vulnerability. Some older hardware will not have BIOS firmware update and will rely on operating system level protection to prevent access while the device is in low-power states. For more information see https://access.redhat.com/solutions/i915-graphics",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7ComputeNode-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7ComputeNode-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7ComputeNode-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.src",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7Server-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7Server-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-0154"
},
{
"category": "external",
"summary": "RHBZ#1724393",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1724393"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-0154",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0154"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-0154",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0154"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/i915-graphics",
"url": "https://access.redhat.com/solutions/i915-graphics"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00260.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00260.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-11-12T20:54:34+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7ComputeNode-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7ComputeNode-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7ComputeNode-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.src",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7Server-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7Server-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:3837"
},
{
"category": "workaround",
"details": "Preventing loading of the i915 kernel module will prevent attackers from using this exploit against the system however the power management functionality of the card will be disabled and the system may draw additional power. See this KCS article (https://access.redhat.com/solutions/41278) for instructions on how to disable a kernel module. Graphical displays may also be at low resolution or not work correctly. This mitigation may not be suitable if running graphical tools locally is required.",
"product_ids": [
"7ComputeNode-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7ComputeNode-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7ComputeNode-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.src",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7Server-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7Server-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7ComputeNode-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7ComputeNode-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7ComputeNode-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.src",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7Server-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7Server-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: Intel GPU Denial Of Service while accessing MMIO in lower power state"
},
{
"acknowledgments": [
{
"names": [
"Intel"
]
}
],
"cve": "CVE-2019-11135",
"cwe": {
"id": "CWE-203",
"name": "Observable Discrepancy"
},
"discovery_date": "2019-09-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1753062"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way Intel CPUs handle speculative execution of instructions when the TSX Asynchronous Abort (TAA) error occurs. A local authenticated attacker with the ability to monitor execution times could infer the TSX memory state by comparing abort execution times. This could allow information disclosure via this observed side-channel for any TSX transaction being executed while an attacker is able to observe abort timing.\r\n\r\nIntel\u0027s Transactional Synchronisation Extensions (TSX) are set of instructions which enable transactional memory support to improve performance of the multi-threaded applications, in the lock-protected critical sections. The CPU executes instructions in the critical-sections as transactions, while ensuring their atomic state. When such transaction execution is unsuccessful, the processor cannot ensure atomic updates to the transaction memory, so the processor rolls back or aborts such transaction execution.\r\n\r\nWhile TSX Asynchronous Abort (TAA) is pending, CPU may continue to read data from architectural buffers and pass it to the dependent speculative operations. This may cause information leakage via speculative side-channel means, which is quite similar to the Microarchitectural Data Sampling (MDS) issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: TSX Transaction Asynchronous Abort (TAA)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "libvirt and qemu-kvm on Red Hat Enterprise Linux 6 are not affected by this vulnerability as they do not support MSR-based CPU features.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7ComputeNode-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7ComputeNode-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7ComputeNode-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.src",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7Server-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7Server-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11135"
},
{
"category": "external",
"summary": "RHBZ#1753062",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753062"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11135",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11135"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11135",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11135"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/tsx-asynchronousabort",
"url": "https://access.redhat.com/solutions/tsx-asynchronousabort"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00270.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00270.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-11-12T20:54:34+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7ComputeNode-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7ComputeNode-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7ComputeNode-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.src",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7Server-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7Server-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:3837"
},
{
"category": "workaround",
"details": "For mitigation related information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/solutions/tsx-asynchronousabort",
"product_ids": [
"7ComputeNode-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7ComputeNode-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7ComputeNode-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.src",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7Server-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7Server-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"7ComputeNode-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7ComputeNode-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7ComputeNode-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.src",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7Server-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7Server-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: TSX Transaction Asynchronous Abort (TAA)"
}
]
}
RHSA-2019:3834
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* hw: Machine Check Error on Page Size Change (IFU) (CVE-2018-12207)\n\n* hw: TSX Transaction Asynchronous Abort (TAA) (CVE-2019-11135)\n\n* hw: Intel GPU Denial Of Service while accessing MMIO in lower power state (CVE-2019-0154)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2019:3834",
"url": "https://access.redhat.com/errata/RHSA-2019:3834"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce",
"url": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/tsx-asynchronousabort",
"url": "https://access.redhat.com/solutions/tsx-asynchronousabort"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/i915-graphics",
"url": "https://access.redhat.com/solutions/i915-graphics"
},
{
"category": "external",
"summary": "1646768",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646768"
},
{
"category": "external",
"summary": "1724393",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1724393"
},
{
"category": "external",
"summary": "1753062",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753062"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_3834.json"
}
],
"title": "Red Hat Security Advisory: kernel security update",
"tracking": {
"current_release_date": "2025-10-09T18:15:53+00:00",
"generator": {
"date": "2025-10-09T18:15:53+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2019:3834",
"initial_release_date": "2019-11-12T21:02:41+00:00",
"revision_history": [
{
"date": "2019-11-12T21:02:41+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2019-11-12T21:02:41+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T18:15:53+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Client (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Client Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"product": {
"name": "bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"product_id": "bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@3.10.0-1062.4.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-1062.4.2.el7.x86_64",
"product": {
"name": "kernel-0:3.10.0-1062.4.2.el7.x86_64",
"product_id": "kernel-0:3.10.0-1062.4.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-1062.4.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"product": {
"name": "kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"product_id": "kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-1062.4.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"product_id": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-1062.4.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"product": {
"name": "kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"product_id": "kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-1062.4.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"product": {
"name": "kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"product_id": "kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-1062.4.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"product": {
"name": "kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"product_id": "kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-1062.4.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"product_id": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-1062.4.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-1062.4.2.el7.x86_64",
"product": {
"name": "perf-0:3.10.0-1062.4.2.el7.x86_64",
"product_id": "perf-0:3.10.0-1062.4.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-1062.4.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"product": {
"name": "python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"product_id": "python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-1062.4.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"product": {
"name": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"product_id": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@3.10.0-1062.4.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-1062.4.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"product_id": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-1062.4.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-1062.4.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-1062.4.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"product": {
"name": "perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"product_id": "perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-1062.4.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"product_id": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-1062.4.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-1062.4.2.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-1062.4.2.el7.src",
"product": {
"name": "kernel-0:3.10.0-1062.4.2.el7.src",
"product_id": "kernel-0:3.10.0-1062.4.2.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-1062.4.2.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"product": {
"name": "kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"product_id": "kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-1062.4.2.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"product": {
"name": "kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"product_id": "kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@3.10.0-1062.4.2.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:3.10.0-1062.4.2.el7.s390x",
"product": {
"name": "bpftool-0:3.10.0-1062.4.2.el7.s390x",
"product_id": "bpftool-0:3.10.0-1062.4.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@3.10.0-1062.4.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-1062.4.2.el7.s390x",
"product": {
"name": "kernel-0:3.10.0-1062.4.2.el7.s390x",
"product_id": "kernel-0:3.10.0-1062.4.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-1062.4.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"product": {
"name": "kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"product_id": "kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-1062.4.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"product": {
"name": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"product_id": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-1062.4.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"product": {
"name": "kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"product_id": "kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-1062.4.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"product": {
"name": "kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"product_id": "kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-1062.4.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"product": {
"name": "kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"product_id": "kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump@3.10.0-1062.4.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"product": {
"name": "kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"product_id": "kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-devel@3.10.0-1062.4.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-1062.4.2.el7.s390x",
"product": {
"name": "perf-0:3.10.0-1062.4.2.el7.s390x",
"product_id": "perf-0:3.10.0-1062.4.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-1062.4.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-1062.4.2.el7.s390x",
"product": {
"name": "python-perf-0:3.10.0-1062.4.2.el7.s390x",
"product_id": "python-perf-0:3.10.0-1062.4.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-1062.4.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"product": {
"name": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"product_id": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@3.10.0-1062.4.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"product_id": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-1062.4.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"product": {
"name": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"product_id": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-1062.4.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@3.10.0-1062.4.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"product": {
"name": "kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"product_id": "kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@3.10.0-1062.4.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"product": {
"name": "perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"product_id": "perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-1062.4.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"product_id": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-1062.4.2.el7?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"product": {
"name": "bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"product_id": "bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@3.10.0-1062.4.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-1062.4.2.el7.ppc64",
"product": {
"name": "kernel-0:3.10.0-1062.4.2.el7.ppc64",
"product_id": "kernel-0:3.10.0-1062.4.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-1062.4.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"product": {
"name": "kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"product_id": "kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-1062.4.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"product": {
"name": "kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"product_id": "kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-1062.4.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"product_id": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-1062.4.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"product": {
"name": "kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"product_id": "kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-1062.4.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"product": {
"name": "kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"product_id": "kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-1062.4.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"product": {
"name": "kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"product_id": "kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-1062.4.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"product_id": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-1062.4.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-1062.4.2.el7.ppc64",
"product": {
"name": "perf-0:3.10.0-1062.4.2.el7.ppc64",
"product_id": "perf-0:3.10.0-1062.4.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-1062.4.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"product": {
"name": "python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"product_id": "python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-1062.4.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"product": {
"name": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"product_id": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@3.10.0-1062.4.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-1062.4.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"product_id": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-1062.4.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"product": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"product_id": "kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64@3.10.0-1062.4.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-1062.4.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"product": {
"name": "perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"product_id": "perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-1062.4.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"product_id": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-1062.4.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-1062.4.2.el7?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"product": {
"name": "bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"product_id": "bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@3.10.0-1062.4.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"product": {
"name": "kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"product_id": "kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-1062.4.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"product": {
"name": "kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"product_id": "kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-1062.4.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"product": {
"name": "kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"product_id": "kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-1062.4.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"product": {
"name": "kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"product_id": "kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-1062.4.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"product": {
"name": "kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"product_id": "kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-1062.4.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"product": {
"name": "kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"product_id": "kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-1062.4.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"product_id": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-1062.4.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-1062.4.2.el7.ppc64le",
"product": {
"name": "perf-0:3.10.0-1062.4.2.el7.ppc64le",
"product_id": "perf-0:3.10.0-1062.4.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-1062.4.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"product": {
"name": "python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"product_id": "python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-1062.4.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"product": {
"name": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"product_id": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@3.10.0-1062.4.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"product_id": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-1062.4.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"product_id": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-1062.4.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@3.10.0-1062.4.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"product_id": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-1062.4.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"product": {
"name": "perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"product_id": "perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-1062.4.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"product_id": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-1062.4.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"product": {
"name": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"product_id": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-1062.4.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"product_id": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-1062.4.2.el7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "bpftool-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.4.2.el7.src as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-1062.4.2.el7.src",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1062.4.2.el7.noarch as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "perf-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "bpftool-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.4.2.el7.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-1062.4.2.el7.src",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1062.4.2.el7.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "perf-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "bpftool-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.4.2.el7.src as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-1062.4.2.el7.src",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1062.4.2.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "perf-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "bpftool-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.4.2.el7.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-1062.4.2.el7.src",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1062.4.2.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "perf-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "bpftool-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.4.2.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-1062.4.2.el7.src",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1062.4.2.el7.noarch as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "perf-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "bpftool-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.4.2.el7.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-1062.4.2.el7.src",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1062.4.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "perf-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "bpftool-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.4.2.el7.src as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-1062.4.2.el7.src",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1062.4.2.el7.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "perf-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "bpftool-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.4.2.el7.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-1062.4.2.el7.src",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1062.4.2.el7.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "perf-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Intel"
]
},
{
"names": [
"Deepak Gupta"
],
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2018-12207",
"cwe": {
"id": "CWE-226",
"name": "Sensitive Information in Resource Not Removed Before Reuse"
},
"discovery_date": "2018-11-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1646768"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way Intel CPUs handle inconsistency between, virtual to physical memory address translations in CPU\u0027s local cache and system software\u0027s Paging structure entries. A privileged guest user may use this flaw to induce a hardware Machine Check Error on the host processor, resulting in a severe DoS scenario by halting the processor.\r\n\r\nSystem software like OS OR Virtual Machine Monitor (VMM) use virtual memory system for storing program instructions and data in memory. Virtual Memory system uses Paging structures like Page Tables and Page Directories to manage system memory. The processor\u0027s Memory Management Unit (MMU) uses Paging structure entries to translate program\u0027s virtual memory addresses to physical memory addresses. The processor stores these address translations into its local cache buffer called - Translation Lookaside Buffer (TLB). TLB has two parts, one for instructions and other for data addresses.\r\n\r\nSystem software can modify its Paging structure entries to change address mappings OR certain attributes like page size etc. Upon such Paging structure alterations in memory, system software must invalidate the corresponding address translations in the processor\u0027s TLB cache. But before this TLB invalidation takes place, a privileged guest user may trigger an instruction fetch operation, which could use an already cached, but now invalid, virtual to physical address translation from Instruction TLB (ITLB). Thus accessing an invalid physical memory address and resulting in halting the processor due to the Machine Check Error (MCE) on Page Size Change.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: Machine Check Error on Page Size Change (IFU)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Client-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Client-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7ComputeNode-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7ComputeNode-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Server-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Server-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Workstation-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Workstation-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-12207"
},
{
"category": "external",
"summary": "RHBZ#1646768",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646768"
},
{
"category": "external",
"summary": "RHSB-ifu-page-mce",
"url": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-12207",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12207"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-12207",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12207"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-11-12T21:02:41+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Client-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Client-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7ComputeNode-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7ComputeNode-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Server-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Server-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Workstation-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Workstation-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:3834"
},
{
"category": "workaround",
"details": "For mitigation related information, please refer to the Red Hat vulnerability article: https://access.redhat.com/security/vulnerabilities/ifu-page-mce .",
"product_ids": [
"7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Client-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Client-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7ComputeNode-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7ComputeNode-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Server-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Server-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Workstation-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Workstation-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Client-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Client-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7ComputeNode-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7ComputeNode-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Server-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Server-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Workstation-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Workstation-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: Machine Check Error on Page Size Change (IFU)"
},
{
"acknowledgments": [
{
"names": [
"Intel"
]
}
],
"cve": "CVE-2019-0154",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"discovery_date": "2019-06-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1724393"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Intel graphics hardware (GPU) where a local attacker with the ability to issue an ioctl could trigger a hardware level crash if MMIO registers were read while the graphics card was in a low-power state. This creates a denial of service situation and the GPU and connected displays will remain unusable until a reboot occurs.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: Intel GPU Denial Of Service while accessing MMIO in lower power state",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Intel plans to release BIOS firmware to correct this issue. Red Hat\u0027s kernel update should mitigate this vulnerability. Some older hardware will not have BIOS firmware update and will rely on operating system level protection to prevent access while the device is in low-power states. For more information see https://access.redhat.com/solutions/i915-graphics",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Client-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Client-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7ComputeNode-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7ComputeNode-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Server-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Server-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Workstation-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Workstation-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-0154"
},
{
"category": "external",
"summary": "RHBZ#1724393",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1724393"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-0154",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0154"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-0154",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0154"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/i915-graphics",
"url": "https://access.redhat.com/solutions/i915-graphics"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00260.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00260.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-11-12T21:02:41+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Client-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Client-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7ComputeNode-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7ComputeNode-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Server-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Server-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Workstation-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Workstation-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:3834"
},
{
"category": "workaround",
"details": "Preventing loading of the i915 kernel module will prevent attackers from using this exploit against the system however the power management functionality of the card will be disabled and the system may draw additional power. See this KCS article (https://access.redhat.com/solutions/41278) for instructions on how to disable a kernel module. Graphical displays may also be at low resolution or not work correctly. This mitigation may not be suitable if running graphical tools locally is required.",
"product_ids": [
"7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Client-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Client-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7ComputeNode-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7ComputeNode-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Server-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Server-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Workstation-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Workstation-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Client-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Client-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7ComputeNode-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7ComputeNode-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Server-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Server-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Workstation-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Workstation-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: Intel GPU Denial Of Service while accessing MMIO in lower power state"
},
{
"acknowledgments": [
{
"names": [
"Intel"
]
}
],
"cve": "CVE-2019-11135",
"cwe": {
"id": "CWE-203",
"name": "Observable Discrepancy"
},
"discovery_date": "2019-09-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1753062"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way Intel CPUs handle speculative execution of instructions when the TSX Asynchronous Abort (TAA) error occurs. A local authenticated attacker with the ability to monitor execution times could infer the TSX memory state by comparing abort execution times. This could allow information disclosure via this observed side-channel for any TSX transaction being executed while an attacker is able to observe abort timing.\r\n\r\nIntel\u0027s Transactional Synchronisation Extensions (TSX) are set of instructions which enable transactional memory support to improve performance of the multi-threaded applications, in the lock-protected critical sections. The CPU executes instructions in the critical-sections as transactions, while ensuring their atomic state. When such transaction execution is unsuccessful, the processor cannot ensure atomic updates to the transaction memory, so the processor rolls back or aborts such transaction execution.\r\n\r\nWhile TSX Asynchronous Abort (TAA) is pending, CPU may continue to read data from architectural buffers and pass it to the dependent speculative operations. This may cause information leakage via speculative side-channel means, which is quite similar to the Microarchitectural Data Sampling (MDS) issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: TSX Transaction Asynchronous Abort (TAA)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "libvirt and qemu-kvm on Red Hat Enterprise Linux 6 are not affected by this vulnerability as they do not support MSR-based CPU features.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Client-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Client-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7ComputeNode-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7ComputeNode-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Server-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Server-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Workstation-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Workstation-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11135"
},
{
"category": "external",
"summary": "RHBZ#1753062",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753062"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11135",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11135"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11135",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11135"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/tsx-asynchronousabort",
"url": "https://access.redhat.com/solutions/tsx-asynchronousabort"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00270.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00270.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-11-12T21:02:41+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Client-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Client-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7ComputeNode-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7ComputeNode-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Server-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Server-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Workstation-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Workstation-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:3834"
},
{
"category": "workaround",
"details": "For mitigation related information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/solutions/tsx-asynchronousabort",
"product_ids": [
"7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Client-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Client-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7ComputeNode-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7ComputeNode-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Server-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Server-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Workstation-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Workstation-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Client-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Client-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7ComputeNode-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7ComputeNode-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Server-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Server-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Workstation-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Workstation-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: TSX Transaction Asynchronous Abort (TAA)"
}
]
}
rhsa-2020_0026
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kpatch-patch is now available for Red Hat Enterprise Linux 7.6 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.\n\nSecurity Fix(es):\n\n* hw: Machine Check Error on Page Size Change (IFU) (CVE-2018-12207)\n\n* hw: TSX Transaction Asynchronous Abort (TAA) (CVE-2019-11135)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgements, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2020:0026",
"url": "https://access.redhat.com/errata/RHSA-2020:0026"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce",
"url": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/tsx-asynchronousabort",
"url": "https://access.redhat.com/solutions/tsx-asynchronousabort"
},
{
"category": "external",
"summary": "1646768",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646768"
},
{
"category": "external",
"summary": "1753062",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753062"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_0026.json"
}
],
"title": "Red Hat Security Advisory: kpatch-patch security update",
"tracking": {
"current_release_date": "2024-11-15T03:19:33+00:00",
"generator": {
"date": "2024-11-15T03:19:33+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2020:0026",
"initial_release_date": "2020-01-06T14:16:53+00:00",
"revision_history": [
{
"date": "2020-01-06T14:16:53+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2020-01-06T14:16:53+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-15T03:19:33+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product": {
"name": "Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.6::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_35_2-0:1-4.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_35_2-0:1-4.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_35_2-0:1-4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_35_2@1-4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_35_2-debuginfo-0:1-4.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_35_2-debuginfo-0:1-4.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_35_2-debuginfo-0:1-4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_35_2-debuginfo@1-4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_38_1-0:1-3.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_38_1-0:1-3.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_38_1-0:1-3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_38_1@1-3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_38_1-debuginfo-0:1-3.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_38_1-debuginfo-0:1-3.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_38_1-debuginfo-0:1-3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_38_1-debuginfo@1-3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_35_1-0:1-5.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_35_1-0:1-5.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_35_1-0:1-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_35_1@1-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_35_1-debuginfo-0:1-5.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_35_1-debuginfo-0:1-5.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_35_1-debuginfo-0:1-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_35_1-debuginfo@1-5.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_35_2-0:1-4.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-957_35_2-0:1-4.el7.src",
"product_id": "kpatch-patch-3_10_0-957_35_2-0:1-4.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_35_2@1-4.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_38_1-0:1-3.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-957_38_1-0:1-3.el7.src",
"product_id": "kpatch-patch-3_10_0-957_38_1-0:1-3.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_38_1@1-3.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_35_1-0:1-5.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-957_35_1-0:1-5.el7.src",
"product_id": "kpatch-patch-3_10_0-957_35_1-0:1-5.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_35_1@1-5.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_35_1-0:1-5.el7.src as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_1-0:1-5.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-957_35_1-0:1-5.el7.src",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_35_1-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_1-0:1-5.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_35_1-0:1-5.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_35_1-debuginfo-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_1-debuginfo-0:1-5.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_35_1-debuginfo-0:1-5.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_35_2-0:1-4.el7.src as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_2-0:1-4.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-957_35_2-0:1-4.el7.src",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_35_2-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_2-0:1-4.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_35_2-0:1-4.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_35_2-debuginfo-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_2-debuginfo-0:1-4.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_35_2-debuginfo-0:1-4.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_38_1-0:1-3.el7.src as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kpatch-patch-3_10_0-957_38_1-0:1-3.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-957_38_1-0:1-3.el7.src",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_38_1-0:1-3.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kpatch-patch-3_10_0-957_38_1-0:1-3.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_38_1-0:1-3.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_38_1-debuginfo-0:1-3.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kpatch-patch-3_10_0-957_38_1-debuginfo-0:1-3.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_38_1-debuginfo-0:1-3.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Intel"
]
},
{
"names": [
"Deepak Gupta"
],
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2018-12207",
"cwe": {
"id": "CWE-226",
"name": "Sensitive Information in Resource Not Removed Before Reuse"
},
"discovery_date": "2018-11-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1646768"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way Intel CPUs handle inconsistency between, virtual to physical memory address translations in CPU\u0027s local cache and system software\u0027s Paging structure entries. A privileged guest user may use this flaw to induce a hardware Machine Check Error on the host processor, resulting in a severe DoS scenario by halting the processor.\r\n\r\nSystem software like OS OR Virtual Machine Monitor (VMM) use virtual memory system for storing program instructions and data in memory. Virtual Memory system uses Paging structures like Page Tables and Page Directories to manage system memory. The processor\u0027s Memory Management Unit (MMU) uses Paging structure entries to translate program\u0027s virtual memory addresses to physical memory addresses. The processor stores these address translations into its local cache buffer called - Translation Lookaside Buffer (TLB). TLB has two parts, one for instructions and other for data addresses.\r\n\r\nSystem software can modify its Paging structure entries to change address mappings OR certain attributes like page size etc. Upon such Paging structure alterations in memory, system software must invalidate the corresponding address translations in the processor\u0027s TLB cache. But before this TLB invalidation takes place, a privileged guest user may trigger an instruction fetch operation, which could use an already cached, but now invalid, virtual to physical address translation from Instruction TLB (ITLB). Thus accessing an invalid physical memory address and resulting in halting the processor due to the Machine Check Error (MCE) on Page Size Change.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: Machine Check Error on Page Size Change (IFU)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_1-0:1-5.el7.src",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_1-0:1-5.el7.x86_64",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_2-0:1-4.el7.src",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_2-0:1-4.el7.x86_64",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_2-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_38_1-0:1-3.el7.src",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_38_1-0:1-3.el7.x86_64",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_38_1-debuginfo-0:1-3.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-12207"
},
{
"category": "external",
"summary": "RHBZ#1646768",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646768"
},
{
"category": "external",
"summary": "RHSB-ifu-page-mce",
"url": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-12207",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12207"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-12207",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12207"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-01-06T14:16:53+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_1-0:1-5.el7.src",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_1-0:1-5.el7.x86_64",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_2-0:1-4.el7.src",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_2-0:1-4.el7.x86_64",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_2-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_38_1-0:1-3.el7.src",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_38_1-0:1-3.el7.x86_64",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_38_1-debuginfo-0:1-3.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2020:0026"
},
{
"category": "workaround",
"details": "For mitigation related information, please refer to the Red Hat vulnerability article: https://access.redhat.com/security/vulnerabilities/ifu-page-mce .",
"product_ids": [
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_1-0:1-5.el7.src",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_1-0:1-5.el7.x86_64",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_2-0:1-4.el7.src",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_2-0:1-4.el7.x86_64",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_2-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_38_1-0:1-3.el7.src",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_38_1-0:1-3.el7.x86_64",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_38_1-debuginfo-0:1-3.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_1-0:1-5.el7.src",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_1-0:1-5.el7.x86_64",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_2-0:1-4.el7.src",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_2-0:1-4.el7.x86_64",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_2-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_38_1-0:1-3.el7.src",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_38_1-0:1-3.el7.x86_64",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_38_1-debuginfo-0:1-3.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: Machine Check Error on Page Size Change (IFU)"
},
{
"acknowledgments": [
{
"names": [
"Intel"
]
}
],
"cve": "CVE-2019-11135",
"cwe": {
"id": "CWE-203",
"name": "Observable Discrepancy"
},
"discovery_date": "2019-09-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1753062"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way Intel CPUs handle speculative execution of instructions when the TSX Asynchronous Abort (TAA) error occurs. A local authenticated attacker with the ability to monitor execution times could infer the TSX memory state by comparing abort execution times. This could allow information disclosure via this observed side-channel for any TSX transaction being executed while an attacker is able to observe abort timing.\r\n\r\nIntel\u0027s Transactional Synchronisation Extensions (TSX) are set of instructions which enable transactional memory support to improve performance of the multi-threaded applications, in the lock-protected critical sections. The CPU executes instructions in the critical-sections as transactions, while ensuring their atomic state. When such transaction execution is unsuccessful, the processor cannot ensure atomic updates to the transaction memory, so the processor rolls back or aborts such transaction execution.\r\n\r\nWhile TSX Asynchronous Abort (TAA) is pending, CPU may continue to read data from architectural buffers and pass it to the dependent speculative operations. This may cause information leakage via speculative side-channel means, which is quite similar to the Microarchitectural Data Sampling (MDS) issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: TSX Transaction Asynchronous Abort (TAA)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "libvirt and qemu-kvm on Red Hat Enterprise Linux 6 are not affected by this vulnerability as they do not support MSR-based CPU features.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_1-0:1-5.el7.src",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_1-0:1-5.el7.x86_64",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_2-0:1-4.el7.src",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_2-0:1-4.el7.x86_64",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_2-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_38_1-0:1-3.el7.src",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_38_1-0:1-3.el7.x86_64",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_38_1-debuginfo-0:1-3.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11135"
},
{
"category": "external",
"summary": "RHBZ#1753062",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753062"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11135",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11135"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11135",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11135"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/tsx-asynchronousabort",
"url": "https://access.redhat.com/solutions/tsx-asynchronousabort"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00270.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00270.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-01-06T14:16:53+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_1-0:1-5.el7.src",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_1-0:1-5.el7.x86_64",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_2-0:1-4.el7.src",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_2-0:1-4.el7.x86_64",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_2-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_38_1-0:1-3.el7.src",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_38_1-0:1-3.el7.x86_64",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_38_1-debuginfo-0:1-3.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2020:0026"
},
{
"category": "workaround",
"details": "For mitigation related information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/solutions/tsx-asynchronousabort",
"product_ids": [
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_1-0:1-5.el7.src",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_1-0:1-5.el7.x86_64",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_2-0:1-4.el7.src",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_2-0:1-4.el7.x86_64",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_2-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_38_1-0:1-3.el7.src",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_38_1-0:1-3.el7.x86_64",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_38_1-debuginfo-0:1-3.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_1-0:1-5.el7.src",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_1-0:1-5.el7.x86_64",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_2-0:1-4.el7.src",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_2-0:1-4.el7.x86_64",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_2-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_38_1-0:1-3.el7.src",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_38_1-0:1-3.el7.x86_64",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_38_1-debuginfo-0:1-3.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: TSX Transaction Asynchronous Abort (TAA)"
}
]
}
RHSA-2019:3844
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel-rt is now available for Red Hat Enterprise MRG 2.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* hw: Machine Check Error on Page Size Change (IFU) (CVE-2018-12207)\n\n* hw: TSX Transaction Asynchronous Abort (TAA) (CVE-2019-11135)\n\n* hw: Intel GPU Denial Of Service while accessing MMIO in lower power state (CVE-2019-0154)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2019:3844",
"url": "https://access.redhat.com/errata/RHSA-2019:3844"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce",
"url": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/tsx-asynchronousabort",
"url": "https://access.redhat.com/solutions/tsx-asynchronousabort"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/i915-graphics",
"url": "https://access.redhat.com/solutions/i915-graphics"
},
{
"category": "external",
"summary": "1646768",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646768"
},
{
"category": "external",
"summary": "1724393",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1724393"
},
{
"category": "external",
"summary": "1753062",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753062"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_3844.json"
}
],
"title": "Red Hat Security Advisory: kernel-rt security update",
"tracking": {
"current_release_date": "2025-10-09T18:15:57+00:00",
"generator": {
"date": "2025-10-09T18:15:57+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2019:3844",
"initial_release_date": "2019-11-12T21:08:54+00:00",
"revision_history": [
{
"date": "2019-11-12T21:08:54+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2019-11-12T21:08:54+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T18:15:57+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat MRG Realtime for RHEL 6 Server v.2",
"product": {
"name": "Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_mrg:2:server:el6"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise MRG for RHEL-6"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"product": {
"name": "kernel-rt-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"product_id": "kernel-rt-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@3.10.0-693.60.2.rt56.655.el6rt?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"product": {
"name": "kernel-rt-debug-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"product_id": "kernel-rt-debug-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug@3.10.0-693.60.2.rt56.655.el6rt?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"product": {
"name": "kernel-rt-debug-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"product_id": "kernel-rt-debug-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-devel@3.10.0-693.60.2.rt56.655.el6rt?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"product": {
"name": "kernel-rt-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"product_id": "kernel-rt-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-devel@3.10.0-693.60.2.rt56.655.el6rt?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"product": {
"name": "kernel-rt-trace-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"product_id": "kernel-rt-trace-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace@3.10.0-693.60.2.rt56.655.el6rt?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"product": {
"name": "kernel-rt-trace-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"product_id": "kernel-rt-trace-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace-devel@3.10.0-693.60.2.rt56.655.el6rt?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-vanilla-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"product": {
"name": "kernel-rt-vanilla-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"product_id": "kernel-rt-vanilla-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-vanilla@3.10.0-693.60.2.rt56.655.el6rt?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-vanilla-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"product": {
"name": "kernel-rt-vanilla-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"product_id": "kernel-rt-vanilla-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-vanilla-devel@3.10.0-693.60.2.rt56.655.el6rt?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"product": {
"name": "kernel-rt-debug-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"product_id": "kernel-rt-debug-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@3.10.0-693.60.2.rt56.655.el6rt?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"product": {
"name": "kernel-rt-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"product_id": "kernel-rt-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo@3.10.0-693.60.2.rt56.655.el6rt?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"product": {
"name": "kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"product_id": "kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@3.10.0-693.60.2.rt56.655.el6rt?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"product": {
"name": "kernel-rt-trace-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"product_id": "kernel-rt-trace-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace-debuginfo@3.10.0-693.60.2.rt56.655.el6rt?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-vanilla-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"product": {
"name": "kernel-rt-vanilla-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"product_id": "kernel-rt-vanilla-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-vanilla-debuginfo@3.10.0-693.60.2.rt56.655.el6rt?arch=x86_64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-1:3.10.0-693.60.2.rt56.655.el6rt.src",
"product": {
"name": "kernel-rt-1:3.10.0-693.60.2.rt56.655.el6rt.src",
"product_id": "kernel-rt-1:3.10.0-693.60.2.rt56.655.el6rt.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@3.10.0-693.60.2.rt56.655.el6rt?arch=src\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-doc-1:3.10.0-693.60.2.rt56.655.el6rt.noarch",
"product": {
"name": "kernel-rt-doc-1:3.10.0-693.60.2.rt56.655.el6rt.noarch",
"product_id": "kernel-rt-doc-1:3.10.0-693.60.2.rt56.655.el6rt.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-doc@3.10.0-693.60.2.rt56.655.el6rt?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-firmware-1:3.10.0-693.60.2.rt56.655.el6rt.noarch",
"product": {
"name": "kernel-rt-firmware-1:3.10.0-693.60.2.rt56.655.el6rt.noarch",
"product_id": "kernel-rt-firmware-1:3.10.0-693.60.2.rt56.655.el6rt.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-firmware@3.10.0-693.60.2.rt56.655.el6rt?arch=noarch\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-1:3.10.0-693.60.2.rt56.655.el6rt.src as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.60.2.rt56.655.el6rt.src"
},
"product_reference": "kernel-rt-1:3.10.0-693.60.2.rt56.655.el6rt.src",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64"
},
"product_reference": "kernel-rt-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64"
},
"product_reference": "kernel-rt-debug-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64"
},
"product_reference": "kernel-rt-debug-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64"
},
"product_reference": "kernel-rt-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64"
},
"product_reference": "kernel-rt-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-doc-1:3.10.0-693.60.2.rt56.655.el6rt.noarch as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.60.2.rt56.655.el6rt.noarch"
},
"product_reference": "kernel-rt-doc-1:3.10.0-693.60.2.rt56.655.el6rt.noarch",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-firmware-1:3.10.0-693.60.2.rt56.655.el6rt.noarch as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.60.2.rt56.655.el6rt.noarch"
},
"product_reference": "kernel-rt-firmware-1:3.10.0-693.60.2.rt56.655.el6rt.noarch",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64"
},
"product_reference": "kernel-rt-trace-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64"
},
"product_reference": "kernel-rt-trace-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64"
},
"product_reference": "kernel-rt-trace-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-vanilla-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64"
},
"product_reference": "kernel-rt-vanilla-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-vanilla-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64"
},
"product_reference": "kernel-rt-vanilla-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-vanilla-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64"
},
"product_reference": "kernel-rt-vanilla-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Intel"
]
},
{
"names": [
"Deepak Gupta"
],
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2018-12207",
"cwe": {
"id": "CWE-226",
"name": "Sensitive Information in Resource Not Removed Before Reuse"
},
"discovery_date": "2018-11-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1646768"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way Intel CPUs handle inconsistency between, virtual to physical memory address translations in CPU\u0027s local cache and system software\u0027s Paging structure entries. A privileged guest user may use this flaw to induce a hardware Machine Check Error on the host processor, resulting in a severe DoS scenario by halting the processor.\r\n\r\nSystem software like OS OR Virtual Machine Monitor (VMM) use virtual memory system for storing program instructions and data in memory. Virtual Memory system uses Paging structures like Page Tables and Page Directories to manage system memory. The processor\u0027s Memory Management Unit (MMU) uses Paging structure entries to translate program\u0027s virtual memory addresses to physical memory addresses. The processor stores these address translations into its local cache buffer called - Translation Lookaside Buffer (TLB). TLB has two parts, one for instructions and other for data addresses.\r\n\r\nSystem software can modify its Paging structure entries to change address mappings OR certain attributes like page size etc. Upon such Paging structure alterations in memory, system software must invalidate the corresponding address translations in the processor\u0027s TLB cache. But before this TLB invalidation takes place, a privileged guest user may trigger an instruction fetch operation, which could use an already cached, but now invalid, virtual to physical address translation from Instruction TLB (ITLB). Thus accessing an invalid physical memory address and resulting in halting the processor due to the Machine Check Error (MCE) on Page Size Change.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: Machine Check Error on Page Size Change (IFU)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.60.2.rt56.655.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.60.2.rt56.655.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.60.2.rt56.655.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-12207"
},
{
"category": "external",
"summary": "RHBZ#1646768",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646768"
},
{
"category": "external",
"summary": "RHSB-ifu-page-mce",
"url": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-12207",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12207"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-12207",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12207"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-11-12T21:08:54+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.60.2.rt56.655.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.60.2.rt56.655.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.60.2.rt56.655.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:3844"
},
{
"category": "workaround",
"details": "For mitigation related information, please refer to the Red Hat vulnerability article: https://access.redhat.com/security/vulnerabilities/ifu-page-mce .",
"product_ids": [
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.60.2.rt56.655.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.60.2.rt56.655.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.60.2.rt56.655.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.60.2.rt56.655.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.60.2.rt56.655.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.60.2.rt56.655.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: Machine Check Error on Page Size Change (IFU)"
},
{
"acknowledgments": [
{
"names": [
"Intel"
]
}
],
"cve": "CVE-2019-0154",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"discovery_date": "2019-06-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1724393"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Intel graphics hardware (GPU) where a local attacker with the ability to issue an ioctl could trigger a hardware level crash if MMIO registers were read while the graphics card was in a low-power state. This creates a denial of service situation and the GPU and connected displays will remain unusable until a reboot occurs.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: Intel GPU Denial Of Service while accessing MMIO in lower power state",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Intel plans to release BIOS firmware to correct this issue. Red Hat\u0027s kernel update should mitigate this vulnerability. Some older hardware will not have BIOS firmware update and will rely on operating system level protection to prevent access while the device is in low-power states. For more information see https://access.redhat.com/solutions/i915-graphics",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.60.2.rt56.655.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.60.2.rt56.655.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.60.2.rt56.655.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-0154"
},
{
"category": "external",
"summary": "RHBZ#1724393",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1724393"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-0154",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0154"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-0154",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0154"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/i915-graphics",
"url": "https://access.redhat.com/solutions/i915-graphics"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00260.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00260.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-11-12T21:08:54+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.60.2.rt56.655.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.60.2.rt56.655.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.60.2.rt56.655.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:3844"
},
{
"category": "workaround",
"details": "Preventing loading of the i915 kernel module will prevent attackers from using this exploit against the system however the power management functionality of the card will be disabled and the system may draw additional power. See this KCS article (https://access.redhat.com/solutions/41278) for instructions on how to disable a kernel module. Graphical displays may also be at low resolution or not work correctly. This mitigation may not be suitable if running graphical tools locally is required.",
"product_ids": [
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.60.2.rt56.655.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.60.2.rt56.655.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.60.2.rt56.655.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.60.2.rt56.655.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.60.2.rt56.655.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.60.2.rt56.655.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: Intel GPU Denial Of Service while accessing MMIO in lower power state"
},
{
"acknowledgments": [
{
"names": [
"Intel"
]
}
],
"cve": "CVE-2019-11135",
"cwe": {
"id": "CWE-203",
"name": "Observable Discrepancy"
},
"discovery_date": "2019-09-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1753062"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way Intel CPUs handle speculative execution of instructions when the TSX Asynchronous Abort (TAA) error occurs. A local authenticated attacker with the ability to monitor execution times could infer the TSX memory state by comparing abort execution times. This could allow information disclosure via this observed side-channel for any TSX transaction being executed while an attacker is able to observe abort timing.\r\n\r\nIntel\u0027s Transactional Synchronisation Extensions (TSX) are set of instructions which enable transactional memory support to improve performance of the multi-threaded applications, in the lock-protected critical sections. The CPU executes instructions in the critical-sections as transactions, while ensuring their atomic state. When such transaction execution is unsuccessful, the processor cannot ensure atomic updates to the transaction memory, so the processor rolls back or aborts such transaction execution.\r\n\r\nWhile TSX Asynchronous Abort (TAA) is pending, CPU may continue to read data from architectural buffers and pass it to the dependent speculative operations. This may cause information leakage via speculative side-channel means, which is quite similar to the Microarchitectural Data Sampling (MDS) issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: TSX Transaction Asynchronous Abort (TAA)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "libvirt and qemu-kvm on Red Hat Enterprise Linux 6 are not affected by this vulnerability as they do not support MSR-based CPU features.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.60.2.rt56.655.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.60.2.rt56.655.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.60.2.rt56.655.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11135"
},
{
"category": "external",
"summary": "RHBZ#1753062",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753062"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11135",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11135"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11135",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11135"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/tsx-asynchronousabort",
"url": "https://access.redhat.com/solutions/tsx-asynchronousabort"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00270.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00270.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-11-12T21:08:54+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.60.2.rt56.655.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.60.2.rt56.655.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.60.2.rt56.655.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:3844"
},
{
"category": "workaround",
"details": "For mitigation related information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/solutions/tsx-asynchronousabort",
"product_ids": [
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.60.2.rt56.655.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.60.2.rt56.655.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.60.2.rt56.655.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.60.2.rt56.655.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.60.2.rt56.655.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.60.2.rt56.655.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: TSX Transaction Asynchronous Abort (TAA)"
}
]
}
RHSA-2019:3832
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* hw: Machine Check Error on Page Size Change (IFU) (CVE-2018-12207)\n\n* hw: TSX Transaction Asynchronous Abort (TAA) (CVE-2019-11135)\n\n* hw: Intel GPU Denial Of Service while accessing MMIO in lower power state (CVE-2019-0154)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2019:3832",
"url": "https://access.redhat.com/errata/RHSA-2019:3832"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce",
"url": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/tsx-asynchronousabort",
"url": "https://access.redhat.com/solutions/tsx-asynchronousabort"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/i915-graphics",
"url": "https://access.redhat.com/solutions/i915-graphics"
},
{
"category": "external",
"summary": "1646768",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646768"
},
{
"category": "external",
"summary": "1724393",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1724393"
},
{
"category": "external",
"summary": "1753062",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753062"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_3832.json"
}
],
"title": "Red Hat Security Advisory: kernel security update",
"tracking": {
"current_release_date": "2025-10-09T18:15:53+00:00",
"generator": {
"date": "2025-10-09T18:15:53+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2019:3832",
"initial_release_date": "2019-11-12T20:48:43+00:00",
"revision_history": [
{
"date": "2019-11-12T20:48:43+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2019-11-12T20:48:43+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T18:15:53+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat CodeReady Linux Builder (v. 8)",
"product": {
"name": "Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::crb"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:8::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-147.0.2.el8_1.s390x",
"product": {
"name": "bpftool-0:4.18.0-147.0.2.el8_1.s390x",
"product_id": "bpftool-0:4.18.0-147.0.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-147.0.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-147.0.2.el8_1.s390x",
"product": {
"name": "kernel-0:4.18.0-147.0.2.el8_1.s390x",
"product_id": "kernel-0:4.18.0-147.0.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-147.0.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-147.0.2.el8_1.s390x",
"product": {
"name": "kernel-core-0:4.18.0-147.0.2.el8_1.s390x",
"product_id": "kernel-core-0:4.18.0-147.0.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-147.0.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-147.0.2.el8_1.s390x",
"product": {
"name": "kernel-cross-headers-0:4.18.0-147.0.2.el8_1.s390x",
"product_id": "kernel-cross-headers-0:4.18.0-147.0.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-147.0.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-147.0.2.el8_1.s390x",
"product": {
"name": "kernel-debug-0:4.18.0-147.0.2.el8_1.s390x",
"product_id": "kernel-debug-0:4.18.0-147.0.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-147.0.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-147.0.2.el8_1.s390x",
"product": {
"name": "kernel-debug-core-0:4.18.0-147.0.2.el8_1.s390x",
"product_id": "kernel-debug-core-0:4.18.0-147.0.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-147.0.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-147.0.2.el8_1.s390x",
"product": {
"name": "kernel-debug-devel-0:4.18.0-147.0.2.el8_1.s390x",
"product_id": "kernel-debug-devel-0:4.18.0-147.0.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-147.0.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-147.0.2.el8_1.s390x",
"product": {
"name": "kernel-debug-modules-0:4.18.0-147.0.2.el8_1.s390x",
"product_id": "kernel-debug-modules-0:4.18.0-147.0.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-147.0.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"product_id": "kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-147.0.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-147.0.2.el8_1.s390x",
"product": {
"name": "kernel-devel-0:4.18.0-147.0.2.el8_1.s390x",
"product_id": "kernel-devel-0:4.18.0-147.0.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-147.0.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-147.0.2.el8_1.s390x",
"product": {
"name": "kernel-headers-0:4.18.0-147.0.2.el8_1.s390x",
"product_id": "kernel-headers-0:4.18.0-147.0.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-147.0.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-147.0.2.el8_1.s390x",
"product": {
"name": "kernel-modules-0:4.18.0-147.0.2.el8_1.s390x",
"product_id": "kernel-modules-0:4.18.0-147.0.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-147.0.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"product": {
"name": "kernel-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"product_id": "kernel-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-147.0.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-147.0.2.el8_1.s390x",
"product": {
"name": "kernel-tools-0:4.18.0-147.0.2.el8_1.s390x",
"product_id": "kernel-tools-0:4.18.0-147.0.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-147.0.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-0:4.18.0-147.0.2.el8_1.s390x",
"product": {
"name": "kernel-zfcpdump-0:4.18.0-147.0.2.el8_1.s390x",
"product_id": "kernel-zfcpdump-0:4.18.0-147.0.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump@4.18.0-147.0.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-core-0:4.18.0-147.0.2.el8_1.s390x",
"product": {
"name": "kernel-zfcpdump-core-0:4.18.0-147.0.2.el8_1.s390x",
"product_id": "kernel-zfcpdump-core-0:4.18.0-147.0.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-core@4.18.0-147.0.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-devel-0:4.18.0-147.0.2.el8_1.s390x",
"product": {
"name": "kernel-zfcpdump-devel-0:4.18.0-147.0.2.el8_1.s390x",
"product_id": "kernel-zfcpdump-devel-0:4.18.0-147.0.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-devel@4.18.0-147.0.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-0:4.18.0-147.0.2.el8_1.s390x",
"product": {
"name": "kernel-zfcpdump-modules-0:4.18.0-147.0.2.el8_1.s390x",
"product_id": "kernel-zfcpdump-modules-0:4.18.0-147.0.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules@4.18.0-147.0.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"product": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"product_id": "kernel-zfcpdump-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-extra@4.18.0-147.0.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-147.0.2.el8_1.s390x",
"product": {
"name": "perf-0:4.18.0-147.0.2.el8_1.s390x",
"product_id": "perf-0:4.18.0-147.0.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-147.0.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-147.0.2.el8_1.s390x",
"product": {
"name": "python3-perf-0:4.18.0-147.0.2.el8_1.s390x",
"product_id": "python3-perf-0:4.18.0-147.0.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-147.0.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"product_id": "bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-147.0.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"product_id": "kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-147.0.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"product": {
"name": "kernel-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"product_id": "kernel-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-147.0.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:4.18.0-147.0.2.el8_1.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-147.0.2.el8_1.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:4.18.0-147.0.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@4.18.0-147.0.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"product_id": "kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-147.0.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"product": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"product_id": "kernel-zfcpdump-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-debuginfo@4.18.0-147.0.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"product": {
"name": "perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"product_id": "perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-147.0.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"product_id": "python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-147.0.2.el8_1?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-147.0.2.el8_1.aarch64",
"product": {
"name": "bpftool-0:4.18.0-147.0.2.el8_1.aarch64",
"product_id": "bpftool-0:4.18.0-147.0.2.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-147.0.2.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-147.0.2.el8_1.aarch64",
"product": {
"name": "kernel-0:4.18.0-147.0.2.el8_1.aarch64",
"product_id": "kernel-0:4.18.0-147.0.2.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-147.0.2.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-147.0.2.el8_1.aarch64",
"product": {
"name": "kernel-core-0:4.18.0-147.0.2.el8_1.aarch64",
"product_id": "kernel-core-0:4.18.0-147.0.2.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-147.0.2.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"product_id": "kernel-cross-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-147.0.2.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-147.0.2.el8_1.aarch64",
"product": {
"name": "kernel-debug-0:4.18.0-147.0.2.el8_1.aarch64",
"product_id": "kernel-debug-0:4.18.0-147.0.2.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-147.0.2.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-147.0.2.el8_1.aarch64",
"product": {
"name": "kernel-debug-core-0:4.18.0-147.0.2.el8_1.aarch64",
"product_id": "kernel-debug-core-0:4.18.0-147.0.2.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-147.0.2.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"product_id": "kernel-debug-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-147.0.2.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"product_id": "kernel-debug-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-147.0.2.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-147.0.2.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"product": {
"name": "kernel-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"product_id": "kernel-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-147.0.2.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"product": {
"name": "kernel-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"product_id": "kernel-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-147.0.2.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"product": {
"name": "kernel-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"product_id": "kernel-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-147.0.2.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"product_id": "kernel-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-147.0.2.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-147.0.2.el8_1.aarch64",
"product": {
"name": "kernel-tools-0:4.18.0-147.0.2.el8_1.aarch64",
"product_id": "kernel-tools-0:4.18.0-147.0.2.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-147.0.2.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-147.0.2.el8_1.aarch64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-147.0.2.el8_1.aarch64",
"product_id": "kernel-tools-libs-0:4.18.0-147.0.2.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-147.0.2.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-147.0.2.el8_1.aarch64",
"product": {
"name": "perf-0:4.18.0-147.0.2.el8_1.aarch64",
"product_id": "perf-0:4.18.0-147.0.2.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-147.0.2.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-147.0.2.el8_1.aarch64",
"product": {
"name": "python3-perf-0:4.18.0-147.0.2.el8_1.aarch64",
"product_id": "python3-perf-0:4.18.0-147.0.2.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-147.0.2.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"product_id": "bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-147.0.2.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-147.0.2.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"product_id": "kernel-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-147.0.2.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-147.0.2.el8_1.aarch64",
"product": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-147.0.2.el8_1.aarch64",
"product_id": "kernel-debuginfo-common-aarch64-0:4.18.0-147.0.2.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-aarch64@4.18.0-147.0.2.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-147.0.2.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"product": {
"name": "perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"product_id": "perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-147.0.2.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"product_id": "python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-147.0.2.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-147.0.2.el8_1?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-147.0.2.el8_1.ppc64le",
"product": {
"name": "bpftool-0:4.18.0-147.0.2.el8_1.ppc64le",
"product_id": "bpftool-0:4.18.0-147.0.2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-147.0.2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-147.0.2.el8_1.ppc64le",
"product": {
"name": "kernel-0:4.18.0-147.0.2.el8_1.ppc64le",
"product_id": "kernel-0:4.18.0-147.0.2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-147.0.2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"product": {
"name": "kernel-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"product_id": "kernel-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-147.0.2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"product": {
"name": "kernel-cross-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"product_id": "kernel-cross-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-147.0.2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-147.0.2.el8_1.ppc64le",
"product": {
"name": "kernel-debug-0:4.18.0-147.0.2.el8_1.ppc64le",
"product_id": "kernel-debug-0:4.18.0-147.0.2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-147.0.2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"product": {
"name": "kernel-debug-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"product_id": "kernel-debug-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-147.0.2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"product": {
"name": "kernel-debug-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"product_id": "kernel-debug-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-147.0.2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"product": {
"name": "kernel-debug-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"product_id": "kernel-debug-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-147.0.2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"product_id": "kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-147.0.2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"product": {
"name": "kernel-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"product_id": "kernel-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-147.0.2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"product": {
"name": "kernel-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"product_id": "kernel-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-147.0.2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"product": {
"name": "kernel-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"product_id": "kernel-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-147.0.2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"product": {
"name": "kernel-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"product_id": "kernel-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-147.0.2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-147.0.2.el8_1.ppc64le",
"product": {
"name": "kernel-tools-0:4.18.0-147.0.2.el8_1.ppc64le",
"product_id": "kernel-tools-0:4.18.0-147.0.2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-147.0.2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-147.0.2.el8_1.ppc64le",
"product": {
"name": "kernel-tools-libs-0:4.18.0-147.0.2.el8_1.ppc64le",
"product_id": "kernel-tools-libs-0:4.18.0-147.0.2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-147.0.2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"product": {
"name": "perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"product_id": "perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-147.0.2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"product": {
"name": "python3-perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"product_id": "python3-perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-147.0.2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"product_id": "bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-147.0.2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"product_id": "kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-147.0.2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"product": {
"name": "kernel-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"product_id": "kernel-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-147.0.2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.0.2.el8_1.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.0.2.el8_1.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.0.2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.18.0-147.0.2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"product_id": "kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-147.0.2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"product": {
"name": "perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"product_id": "perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-147.0.2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"product_id": "python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-147.0.2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"product_id": "kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-147.0.2.el8_1?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-147.0.2.el8_1.x86_64",
"product": {
"name": "bpftool-0:4.18.0-147.0.2.el8_1.x86_64",
"product_id": "bpftool-0:4.18.0-147.0.2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-147.0.2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-147.0.2.el8_1.x86_64",
"product": {
"name": "kernel-0:4.18.0-147.0.2.el8_1.x86_64",
"product_id": "kernel-0:4.18.0-147.0.2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-147.0.2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-147.0.2.el8_1.x86_64",
"product": {
"name": "kernel-core-0:4.18.0-147.0.2.el8_1.x86_64",
"product_id": "kernel-core-0:4.18.0-147.0.2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-147.0.2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"product_id": "kernel-cross-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-147.0.2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-147.0.2.el8_1.x86_64",
"product": {
"name": "kernel-debug-0:4.18.0-147.0.2.el8_1.x86_64",
"product_id": "kernel-debug-0:4.18.0-147.0.2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-147.0.2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-147.0.2.el8_1.x86_64",
"product": {
"name": "kernel-debug-core-0:4.18.0-147.0.2.el8_1.x86_64",
"product_id": "kernel-debug-core-0:4.18.0-147.0.2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-147.0.2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"product_id": "kernel-debug-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-147.0.2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"product_id": "kernel-debug-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-147.0.2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-147.0.2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"product": {
"name": "kernel-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"product_id": "kernel-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-147.0.2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"product": {
"name": "kernel-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"product_id": "kernel-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-147.0.2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"product": {
"name": "kernel-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"product_id": "kernel-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-147.0.2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"product_id": "kernel-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-147.0.2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-147.0.2.el8_1.x86_64",
"product": {
"name": "kernel-tools-0:4.18.0-147.0.2.el8_1.x86_64",
"product_id": "kernel-tools-0:4.18.0-147.0.2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-147.0.2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-147.0.2.el8_1.x86_64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-147.0.2.el8_1.x86_64",
"product_id": "kernel-tools-libs-0:4.18.0-147.0.2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-147.0.2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-147.0.2.el8_1.x86_64",
"product": {
"name": "perf-0:4.18.0-147.0.2.el8_1.x86_64",
"product_id": "perf-0:4.18.0-147.0.2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-147.0.2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-147.0.2.el8_1.x86_64",
"product": {
"name": "python3-perf-0:4.18.0-147.0.2.el8_1.x86_64",
"product_id": "python3-perf-0:4.18.0-147.0.2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-147.0.2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"product_id": "bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-147.0.2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-147.0.2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"product_id": "kernel-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-147.0.2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-147.0.2.el8_1.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-147.0.2.el8_1.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:4.18.0-147.0.2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@4.18.0-147.0.2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-147.0.2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"product": {
"name": "perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"product_id": "perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-147.0.2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"product_id": "python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-147.0.2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-147.0.2.el8_1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:4.18.0-147.0.2.el8_1.src",
"product": {
"name": "kernel-0:4.18.0-147.0.2.el8_1.src",
"product_id": "kernel-0:4.18.0-147.0.2.el8_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-147.0.2.el8_1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:4.18.0-147.0.2.el8_1.noarch",
"product": {
"name": "kernel-abi-whitelists-0:4.18.0-147.0.2.el8_1.noarch",
"product_id": "kernel-abi-whitelists-0:4.18.0-147.0.2.el8_1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@4.18.0-147.0.2.el8_1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:4.18.0-147.0.2.el8_1.noarch",
"product": {
"name": "kernel-doc-0:4.18.0-147.0.2.el8_1.noarch",
"product_id": "kernel-doc-0:4.18.0-147.0.2.el8_1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@4.18.0-147.0.2.el8_1?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-147.0.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.aarch64"
},
"product_reference": "bpftool-0:4.18.0-147.0.2.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-147.0.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-147.0.2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "bpftool-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-147.0.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.x86_64"
},
"product_reference": "bpftool-0:4.18.0-147.0.2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-147.0.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.aarch64"
},
"product_reference": "kernel-0:4.18.0-147.0.2.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-147.0.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.ppc64le"
},
"product_reference": "kernel-0:4.18.0-147.0.2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "kernel-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-147.0.2.el8_1.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.src"
},
"product_reference": "kernel-0:4.18.0-147.0.2.el8_1.src",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-147.0.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.x86_64"
},
"product_reference": "kernel-0:4.18.0-147.0.2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:4.18.0-147.0.2.el8_1.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-147.0.2.el8_1.noarch"
},
"product_reference": "kernel-abi-whitelists-0:4.18.0-147.0.2.el8_1.noarch",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-147.0.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-147.0.2.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-147.0.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "kernel-core-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-147.0.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-147.0.2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-147.0.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-147.0.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-147.0.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-147.0.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-147.0.2.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-147.0.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-147.0.2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-147.0.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-147.0.2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-147.0.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-147.0.2.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-147.0.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-147.0.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-147.0.2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-147.0.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-147.0.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-147.0.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-147.0.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-147.0.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-147.0.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-147.0.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.0.2.el8_1.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-147.0.2.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.0.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.0.2.el8_1.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.0.2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-147.0.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.0.2.el8_1.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-147.0.2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-147.0.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-147.0.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-147.0.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-147.0.2.el8_1.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-147.0.2.el8_1.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-147.0.2.el8_1.noarch",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-147.0.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-147.0.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-147.0.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-147.0.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-147.0.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-147.0.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-147.0.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-147.0.2.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-147.0.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-147.0.2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-147.0.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-147.0.2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-147.0.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-147.0.2.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-147.0.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-147.0.2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-147.0.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-147.0.2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-147.0.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.aarch64"
},
"product_reference": "perf-0:4.18.0-147.0.2.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-147.0.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.ppc64le"
},
"product_reference": "perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "perf-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-147.0.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.x86_64"
},
"product_reference": "perf-0:4.18.0-147.0.2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-147.0.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-147.0.2.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-147.0.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "python3-perf-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-147.0.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-147.0.2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-147.0.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.aarch64"
},
"product_reference": "bpftool-0:4.18.0-147.0.2.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-147.0.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-147.0.2.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "bpftool-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-147.0.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.x86_64"
},
"product_reference": "bpftool-0:4.18.0-147.0.2.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-147.0.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.aarch64"
},
"product_reference": "kernel-0:4.18.0-147.0.2.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-147.0.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.ppc64le"
},
"product_reference": "kernel-0:4.18.0-147.0.2.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "kernel-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-147.0.2.el8_1.src as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.src"
},
"product_reference": "kernel-0:4.18.0-147.0.2.el8_1.src",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-147.0.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.x86_64"
},
"product_reference": "kernel-0:4.18.0-147.0.2.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:4.18.0-147.0.2.el8_1.noarch as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-147.0.2.el8_1.noarch"
},
"product_reference": "kernel-abi-whitelists-0:4.18.0-147.0.2.el8_1.noarch",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-147.0.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-147.0.2.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-147.0.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "kernel-core-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-147.0.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-147.0.2.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-147.0.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-147.0.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-147.0.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-147.0.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-147.0.2.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-147.0.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-147.0.2.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-147.0.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-147.0.2.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-147.0.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-147.0.2.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-147.0.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-147.0.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-147.0.2.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-147.0.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-147.0.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-147.0.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-147.0.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-147.0.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-147.0.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-147.0.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.0.2.el8_1.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-147.0.2.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.0.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.0.2.el8_1.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.0.2.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-147.0.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.0.2.el8_1.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-147.0.2.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-147.0.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-147.0.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-147.0.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-147.0.2.el8_1.noarch as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-147.0.2.el8_1.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-147.0.2.el8_1.noarch",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-147.0.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-147.0.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-147.0.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-147.0.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-147.0.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-147.0.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-147.0.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-147.0.2.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-147.0.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-147.0.2.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-147.0.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-147.0.2.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-147.0.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-147.0.2.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-147.0.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-147.0.2.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-147.0.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-147.0.2.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-147.0.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.aarch64"
},
"product_reference": "perf-0:4.18.0-147.0.2.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-147.0.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.ppc64le"
},
"product_reference": "perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "perf-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-147.0.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.x86_64"
},
"product_reference": "perf-0:4.18.0-147.0.2.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-147.0.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-147.0.2.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-147.0.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "python3-perf-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-147.0.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-147.0.2.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Intel"
]
},
{
"names": [
"Deepak Gupta"
],
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2018-12207",
"cwe": {
"id": "CWE-226",
"name": "Sensitive Information in Resource Not Removed Before Reuse"
},
"discovery_date": "2018-11-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1646768"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way Intel CPUs handle inconsistency between, virtual to physical memory address translations in CPU\u0027s local cache and system software\u0027s Paging structure entries. A privileged guest user may use this flaw to induce a hardware Machine Check Error on the host processor, resulting in a severe DoS scenario by halting the processor.\r\n\r\nSystem software like OS OR Virtual Machine Monitor (VMM) use virtual memory system for storing program instructions and data in memory. Virtual Memory system uses Paging structures like Page Tables and Page Directories to manage system memory. The processor\u0027s Memory Management Unit (MMU) uses Paging structure entries to translate program\u0027s virtual memory addresses to physical memory addresses. The processor stores these address translations into its local cache buffer called - Translation Lookaside Buffer (TLB). TLB has two parts, one for instructions and other for data addresses.\r\n\r\nSystem software can modify its Paging structure entries to change address mappings OR certain attributes like page size etc. Upon such Paging structure alterations in memory, system software must invalidate the corresponding address translations in the processor\u0027s TLB cache. But before this TLB invalidation takes place, a privileged guest user may trigger an instruction fetch operation, which could use an already cached, but now invalid, virtual to physical address translation from Instruction TLB (ITLB). Thus accessing an invalid physical memory address and resulting in halting the processor due to the Machine Check Error (MCE) on Page Size Change.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: Machine Check Error on Page Size Change (IFU)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.src",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-147.0.2.el8_1.noarch",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-147.0.2.el8_1.noarch",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.src",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-147.0.2.el8_1.noarch",
"CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-147.0.2.el8_1.noarch",
"CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-12207"
},
{
"category": "external",
"summary": "RHBZ#1646768",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646768"
},
{
"category": "external",
"summary": "RHSB-ifu-page-mce",
"url": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-12207",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12207"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-12207",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12207"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-11-12T20:48:43+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.src",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-147.0.2.el8_1.noarch",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-147.0.2.el8_1.noarch",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.src",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-147.0.2.el8_1.noarch",
"CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-147.0.2.el8_1.noarch",
"CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:3832"
},
{
"category": "workaround",
"details": "For mitigation related information, please refer to the Red Hat vulnerability article: https://access.redhat.com/security/vulnerabilities/ifu-page-mce .",
"product_ids": [
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.src",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-147.0.2.el8_1.noarch",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-147.0.2.el8_1.noarch",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.src",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-147.0.2.el8_1.noarch",
"CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-147.0.2.el8_1.noarch",
"CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.src",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-147.0.2.el8_1.noarch",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-147.0.2.el8_1.noarch",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.src",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-147.0.2.el8_1.noarch",
"CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-147.0.2.el8_1.noarch",
"CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: Machine Check Error on Page Size Change (IFU)"
},
{
"acknowledgments": [
{
"names": [
"Intel"
]
}
],
"cve": "CVE-2019-0154",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"discovery_date": "2019-06-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1724393"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Intel graphics hardware (GPU) where a local attacker with the ability to issue an ioctl could trigger a hardware level crash if MMIO registers were read while the graphics card was in a low-power state. This creates a denial of service situation and the GPU and connected displays will remain unusable until a reboot occurs.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: Intel GPU Denial Of Service while accessing MMIO in lower power state",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Intel plans to release BIOS firmware to correct this issue. Red Hat\u0027s kernel update should mitigate this vulnerability. Some older hardware will not have BIOS firmware update and will rely on operating system level protection to prevent access while the device is in low-power states. For more information see https://access.redhat.com/solutions/i915-graphics",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.src",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-147.0.2.el8_1.noarch",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-147.0.2.el8_1.noarch",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.src",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-147.0.2.el8_1.noarch",
"CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-147.0.2.el8_1.noarch",
"CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-0154"
},
{
"category": "external",
"summary": "RHBZ#1724393",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1724393"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-0154",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0154"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-0154",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0154"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/i915-graphics",
"url": "https://access.redhat.com/solutions/i915-graphics"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00260.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00260.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-11-12T20:48:43+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.src",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-147.0.2.el8_1.noarch",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-147.0.2.el8_1.noarch",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.src",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-147.0.2.el8_1.noarch",
"CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-147.0.2.el8_1.noarch",
"CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:3832"
},
{
"category": "workaround",
"details": "Preventing loading of the i915 kernel module will prevent attackers from using this exploit against the system however the power management functionality of the card will be disabled and the system may draw additional power. See this KCS article (https://access.redhat.com/solutions/41278) for instructions on how to disable a kernel module. Graphical displays may also be at low resolution or not work correctly. This mitigation may not be suitable if running graphical tools locally is required.",
"product_ids": [
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.src",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-147.0.2.el8_1.noarch",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-147.0.2.el8_1.noarch",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.src",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-147.0.2.el8_1.noarch",
"CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-147.0.2.el8_1.noarch",
"CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.src",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-147.0.2.el8_1.noarch",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-147.0.2.el8_1.noarch",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.src",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-147.0.2.el8_1.noarch",
"CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-147.0.2.el8_1.noarch",
"CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: Intel GPU Denial Of Service while accessing MMIO in lower power state"
},
{
"acknowledgments": [
{
"names": [
"Intel"
]
}
],
"cve": "CVE-2019-11135",
"cwe": {
"id": "CWE-203",
"name": "Observable Discrepancy"
},
"discovery_date": "2019-09-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1753062"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way Intel CPUs handle speculative execution of instructions when the TSX Asynchronous Abort (TAA) error occurs. A local authenticated attacker with the ability to monitor execution times could infer the TSX memory state by comparing abort execution times. This could allow information disclosure via this observed side-channel for any TSX transaction being executed while an attacker is able to observe abort timing.\r\n\r\nIntel\u0027s Transactional Synchronisation Extensions (TSX) are set of instructions which enable transactional memory support to improve performance of the multi-threaded applications, in the lock-protected critical sections. The CPU executes instructions in the critical-sections as transactions, while ensuring their atomic state. When such transaction execution is unsuccessful, the processor cannot ensure atomic updates to the transaction memory, so the processor rolls back or aborts such transaction execution.\r\n\r\nWhile TSX Asynchronous Abort (TAA) is pending, CPU may continue to read data from architectural buffers and pass it to the dependent speculative operations. This may cause information leakage via speculative side-channel means, which is quite similar to the Microarchitectural Data Sampling (MDS) issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: TSX Transaction Asynchronous Abort (TAA)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "libvirt and qemu-kvm on Red Hat Enterprise Linux 6 are not affected by this vulnerability as they do not support MSR-based CPU features.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.src",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-147.0.2.el8_1.noarch",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-147.0.2.el8_1.noarch",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.src",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-147.0.2.el8_1.noarch",
"CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-147.0.2.el8_1.noarch",
"CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11135"
},
{
"category": "external",
"summary": "RHBZ#1753062",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753062"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11135",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11135"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11135",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11135"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/tsx-asynchronousabort",
"url": "https://access.redhat.com/solutions/tsx-asynchronousabort"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00270.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00270.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-11-12T20:48:43+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.src",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-147.0.2.el8_1.noarch",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-147.0.2.el8_1.noarch",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.src",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-147.0.2.el8_1.noarch",
"CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-147.0.2.el8_1.noarch",
"CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:3832"
},
{
"category": "workaround",
"details": "For mitigation related information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/solutions/tsx-asynchronousabort",
"product_ids": [
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.src",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-147.0.2.el8_1.noarch",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-147.0.2.el8_1.noarch",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.src",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-147.0.2.el8_1.noarch",
"CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-147.0.2.el8_1.noarch",
"CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.src",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-147.0.2.el8_1.noarch",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-147.0.2.el8_1.noarch",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.src",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-147.0.2.el8_1.noarch",
"CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-147.0.2.el8_1.noarch",
"CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: TSX Transaction Asynchronous Abort (TAA)"
}
]
}
RHSA-2019:3842
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 6.6 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* hw: Machine Check Error on Page Size Change (IFU) (CVE-2018-12207)\n\n* hw: TSX Transaction Asynchronous Abort (TAA) (CVE-2019-11135)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2019:3842",
"url": "https://access.redhat.com/errata/RHSA-2019:3842"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce",
"url": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/tsx-asynchronousabort",
"url": "https://access.redhat.com/solutions/tsx-asynchronousabort"
},
{
"category": "external",
"summary": "1646768",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646768"
},
{
"category": "external",
"summary": "1753062",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753062"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_3842.json"
}
],
"title": "Red Hat Security Advisory: kernel security update",
"tracking": {
"current_release_date": "2025-10-09T18:15:56+00:00",
"generator": {
"date": "2025-10-09T18:15:56+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2019:3842",
"initial_release_date": "2019-11-12T21:11:25+00:00",
"revision_history": [
{
"date": "2019-11-12T21:11:25+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2019-11-12T21:11:25+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T18:15:56+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product": {
"name": "Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:6.6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:6.6::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "python-perf-0:2.6.32-504.81.3.el6.x86_64",
"product": {
"name": "python-perf-0:2.6.32-504.81.3.el6.x86_64",
"product_id": "python-perf-0:2.6.32-504.81.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@2.6.32-504.81.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"product_id": "kernel-debug-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-504.81.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"product": {
"name": "kernel-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"product_id": "kernel-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-504.81.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-504.81.3.el6.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-504.81.3.el6.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:2.6.32-504.81.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@2.6.32-504.81.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"product": {
"name": "perf-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"product_id": "perf-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-504.81.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"product": {
"name": "python-perf-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"product_id": "python-perf-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-504.81.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.32-504.81.3.el6.x86_64",
"product": {
"name": "kernel-0:2.6.32-504.81.3.el6.x86_64",
"product_id": "kernel-0:2.6.32-504.81.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-504.81.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-504.81.3.el6.x86_64",
"product": {
"name": "kernel-debug-0:2.6.32-504.81.3.el6.x86_64",
"product_id": "kernel-debug-0:2.6.32-504.81.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-504.81.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-504.81.3.el6.x86_64",
"product": {
"name": "kernel-debug-devel-0:2.6.32-504.81.3.el6.x86_64",
"product_id": "kernel-debug-devel-0:2.6.32-504.81.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-504.81.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-504.81.3.el6.x86_64",
"product": {
"name": "kernel-devel-0:2.6.32-504.81.3.el6.x86_64",
"product_id": "kernel-devel-0:2.6.32-504.81.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-504.81.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.32-504.81.3.el6.x86_64",
"product": {
"name": "kernel-headers-0:2.6.32-504.81.3.el6.x86_64",
"product_id": "kernel-headers-0:2.6.32-504.81.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.32-504.81.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:2.6.32-504.81.3.el6.x86_64",
"product": {
"name": "perf-0:2.6.32-504.81.3.el6.x86_64",
"product_id": "perf-0:2.6.32-504.81.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-504.81.3.el6?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.32-504.81.3.el6.src",
"product": {
"name": "kernel-0:2.6.32-504.81.3.el6.src",
"product_id": "kernel-0:2.6.32-504.81.3.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-504.81.3.el6?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:2.6.32-504.81.3.el6.noarch",
"product": {
"name": "kernel-abi-whitelists-0:2.6.32-504.81.3.el6.noarch",
"product_id": "kernel-abi-whitelists-0:2.6.32-504.81.3.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@2.6.32-504.81.3.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:2.6.32-504.81.3.el6.noarch",
"product": {
"name": "kernel-doc-0:2.6.32-504.81.3.el6.noarch",
"product_id": "kernel-doc-0:2.6.32-504.81.3.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@2.6.32-504.81.3.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-firmware-0:2.6.32-504.81.3.el6.noarch",
"product": {
"name": "kernel-firmware-0:2.6.32-504.81.3.el6.noarch",
"product_id": "kernel-firmware-0:2.6.32-504.81.3.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-firmware@2.6.32-504.81.3.el6?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-504.81.3.el6.src as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:kernel-0:2.6.32-504.81.3.el6.src"
},
"product_reference": "kernel-0:2.6.32-504.81.3.el6.src",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-504.81.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:kernel-0:2.6.32-504.81.3.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-504.81.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-504.81.3.el6.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.81.3.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-504.81.3.el6.noarch",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-504.81.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:kernel-debug-0:2.6.32-504.81.3.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-504.81.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-504.81.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.81.3.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-504.81.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.81.3.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-504.81.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-504.81.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.81.3.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-504.81.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.81.3.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-504.81.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-504.81.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:kernel-devel-0:2.6.32-504.81.3.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-504.81.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-504.81.3.el6.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:kernel-doc-0:2.6.32-504.81.3.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-504.81.3.el6.noarch",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-504.81.3.el6.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.81.3.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-504.81.3.el6.noarch",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-504.81.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:kernel-headers-0:2.6.32-504.81.3.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-504.81.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-504.81.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:perf-0:2.6.32-504.81.3.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-504.81.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-504.81.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.81.3.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-504.81.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:python-perf-0:2.6.32-504.81.3.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-504.81.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-504.81.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.81.3.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-504.81.3.el6.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:kernel-0:2.6.32-504.81.3.el6.src"
},
"product_reference": "kernel-0:2.6.32-504.81.3.el6.src",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-504.81.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:kernel-0:2.6.32-504.81.3.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-504.81.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-504.81.3.el6.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.81.3.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-504.81.3.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-504.81.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.81.3.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-504.81.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-504.81.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.81.3.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-504.81.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.81.3.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-504.81.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-504.81.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.81.3.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-504.81.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.81.3.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-504.81.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-504.81.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.81.3.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-504.81.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-504.81.3.el6.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.81.3.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-504.81.3.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-504.81.3.el6.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.81.3.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-504.81.3.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-504.81.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.81.3.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-504.81.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-504.81.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:perf-0:2.6.32-504.81.3.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-504.81.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-504.81.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.81.3.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-504.81.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.81.3.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-504.81.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-504.81.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.81.3.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Intel"
]
},
{
"names": [
"Deepak Gupta"
],
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2018-12207",
"cwe": {
"id": "CWE-226",
"name": "Sensitive Information in Resource Not Removed Before Reuse"
},
"discovery_date": "2018-11-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1646768"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way Intel CPUs handle inconsistency between, virtual to physical memory address translations in CPU\u0027s local cache and system software\u0027s Paging structure entries. A privileged guest user may use this flaw to induce a hardware Machine Check Error on the host processor, resulting in a severe DoS scenario by halting the processor.\r\n\r\nSystem software like OS OR Virtual Machine Monitor (VMM) use virtual memory system for storing program instructions and data in memory. Virtual Memory system uses Paging structures like Page Tables and Page Directories to manage system memory. The processor\u0027s Memory Management Unit (MMU) uses Paging structure entries to translate program\u0027s virtual memory addresses to physical memory addresses. The processor stores these address translations into its local cache buffer called - Translation Lookaside Buffer (TLB). TLB has two parts, one for instructions and other for data addresses.\r\n\r\nSystem software can modify its Paging structure entries to change address mappings OR certain attributes like page size etc. Upon such Paging structure alterations in memory, system software must invalidate the corresponding address translations in the processor\u0027s TLB cache. But before this TLB invalidation takes place, a privileged guest user may trigger an instruction fetch operation, which could use an already cached, but now invalid, virtual to physical address translation from Instruction TLB (ITLB). Thus accessing an invalid physical memory address and resulting in halting the processor due to the Machine Check Error (MCE) on Page Size Change.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: Machine Check Error on Page Size Change (IFU)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-6.6.AUS:kernel-0:2.6.32-504.81.3.el6.src",
"6Server-6.6.AUS:kernel-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.81.3.el6.noarch",
"6Server-6.6.AUS:kernel-debug-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-devel-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-doc-0:2.6.32-504.81.3.el6.noarch",
"6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.81.3.el6.noarch",
"6Server-6.6.AUS:kernel-headers-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:perf-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:python-perf-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.81.3.el6.src",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.81.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.81.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.81.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:perf-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.81.3.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-12207"
},
{
"category": "external",
"summary": "RHBZ#1646768",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646768"
},
{
"category": "external",
"summary": "RHSB-ifu-page-mce",
"url": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-12207",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12207"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-12207",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12207"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-11-12T21:11:25+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Server-6.6.AUS:kernel-0:2.6.32-504.81.3.el6.src",
"6Server-6.6.AUS:kernel-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.81.3.el6.noarch",
"6Server-6.6.AUS:kernel-debug-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-devel-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-doc-0:2.6.32-504.81.3.el6.noarch",
"6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.81.3.el6.noarch",
"6Server-6.6.AUS:kernel-headers-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:perf-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:python-perf-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.81.3.el6.src",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.81.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.81.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.81.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:perf-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.81.3.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:3842"
},
{
"category": "workaround",
"details": "For mitigation related information, please refer to the Red Hat vulnerability article: https://access.redhat.com/security/vulnerabilities/ifu-page-mce .",
"product_ids": [
"6Server-6.6.AUS:kernel-0:2.6.32-504.81.3.el6.src",
"6Server-6.6.AUS:kernel-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.81.3.el6.noarch",
"6Server-6.6.AUS:kernel-debug-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-devel-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-doc-0:2.6.32-504.81.3.el6.noarch",
"6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.81.3.el6.noarch",
"6Server-6.6.AUS:kernel-headers-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:perf-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:python-perf-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.81.3.el6.src",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.81.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.81.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.81.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:perf-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.81.3.el6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"6Server-6.6.AUS:kernel-0:2.6.32-504.81.3.el6.src",
"6Server-6.6.AUS:kernel-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.81.3.el6.noarch",
"6Server-6.6.AUS:kernel-debug-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-devel-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-doc-0:2.6.32-504.81.3.el6.noarch",
"6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.81.3.el6.noarch",
"6Server-6.6.AUS:kernel-headers-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:perf-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:python-perf-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.81.3.el6.src",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.81.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.81.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.81.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:perf-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.81.3.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: Machine Check Error on Page Size Change (IFU)"
},
{
"acknowledgments": [
{
"names": [
"Intel"
]
}
],
"cve": "CVE-2019-11135",
"cwe": {
"id": "CWE-203",
"name": "Observable Discrepancy"
},
"discovery_date": "2019-09-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1753062"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way Intel CPUs handle speculative execution of instructions when the TSX Asynchronous Abort (TAA) error occurs. A local authenticated attacker with the ability to monitor execution times could infer the TSX memory state by comparing abort execution times. This could allow information disclosure via this observed side-channel for any TSX transaction being executed while an attacker is able to observe abort timing.\r\n\r\nIntel\u0027s Transactional Synchronisation Extensions (TSX) are set of instructions which enable transactional memory support to improve performance of the multi-threaded applications, in the lock-protected critical sections. The CPU executes instructions in the critical-sections as transactions, while ensuring their atomic state. When such transaction execution is unsuccessful, the processor cannot ensure atomic updates to the transaction memory, so the processor rolls back or aborts such transaction execution.\r\n\r\nWhile TSX Asynchronous Abort (TAA) is pending, CPU may continue to read data from architectural buffers and pass it to the dependent speculative operations. This may cause information leakage via speculative side-channel means, which is quite similar to the Microarchitectural Data Sampling (MDS) issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: TSX Transaction Asynchronous Abort (TAA)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "libvirt and qemu-kvm on Red Hat Enterprise Linux 6 are not affected by this vulnerability as they do not support MSR-based CPU features.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-6.6.AUS:kernel-0:2.6.32-504.81.3.el6.src",
"6Server-6.6.AUS:kernel-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.81.3.el6.noarch",
"6Server-6.6.AUS:kernel-debug-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-devel-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-doc-0:2.6.32-504.81.3.el6.noarch",
"6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.81.3.el6.noarch",
"6Server-6.6.AUS:kernel-headers-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:perf-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:python-perf-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.81.3.el6.src",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.81.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.81.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.81.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:perf-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.81.3.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11135"
},
{
"category": "external",
"summary": "RHBZ#1753062",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753062"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11135",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11135"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11135",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11135"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/tsx-asynchronousabort",
"url": "https://access.redhat.com/solutions/tsx-asynchronousabort"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00270.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00270.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-11-12T21:11:25+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Server-6.6.AUS:kernel-0:2.6.32-504.81.3.el6.src",
"6Server-6.6.AUS:kernel-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.81.3.el6.noarch",
"6Server-6.6.AUS:kernel-debug-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-devel-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-doc-0:2.6.32-504.81.3.el6.noarch",
"6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.81.3.el6.noarch",
"6Server-6.6.AUS:kernel-headers-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:perf-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:python-perf-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.81.3.el6.src",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.81.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.81.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.81.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:perf-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.81.3.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:3842"
},
{
"category": "workaround",
"details": "For mitigation related information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/solutions/tsx-asynchronousabort",
"product_ids": [
"6Server-6.6.AUS:kernel-0:2.6.32-504.81.3.el6.src",
"6Server-6.6.AUS:kernel-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.81.3.el6.noarch",
"6Server-6.6.AUS:kernel-debug-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-devel-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-doc-0:2.6.32-504.81.3.el6.noarch",
"6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.81.3.el6.noarch",
"6Server-6.6.AUS:kernel-headers-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:perf-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:python-perf-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.81.3.el6.src",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.81.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.81.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.81.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:perf-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.81.3.el6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"6Server-6.6.AUS:kernel-0:2.6.32-504.81.3.el6.src",
"6Server-6.6.AUS:kernel-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.81.3.el6.noarch",
"6Server-6.6.AUS:kernel-debug-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-devel-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-doc-0:2.6.32-504.81.3.el6.noarch",
"6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.81.3.el6.noarch",
"6Server-6.6.AUS:kernel-headers-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:perf-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:python-perf-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.81.3.el6.src",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.81.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.81.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.81.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:perf-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.81.3.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: TSX Transaction Asynchronous Abort (TAA)"
}
]
}
rhsa-2019:3840
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 7.3 Advanced Update Support, Red Hat Enterprise Linux 7.3 Telco Extended Update Support, and Red Hat Enterprise Linux 7.3 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* hw: Machine Check Error on Page Size Change (IFU) (CVE-2018-12207)\n\n* hw: TSX Transaction Asynchronous Abort (TAA) (CVE-2019-11135)\n\n* hw: Intel GPU Denial Of Service while accessing MMIO in lower power state (CVE-2019-0154)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2019:3840",
"url": "https://access.redhat.com/errata/RHSA-2019:3840"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce",
"url": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/tsx-asynchronousabort",
"url": "https://access.redhat.com/solutions/tsx-asynchronousabort"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/i915-graphics",
"url": "https://access.redhat.com/solutions/i915-graphics"
},
{
"category": "external",
"summary": "1646768",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646768"
},
{
"category": "external",
"summary": "1724393",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1724393"
},
{
"category": "external",
"summary": "1753062",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753062"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_3840.json"
}
],
"title": "Red Hat Security Advisory: kernel security update",
"tracking": {
"current_release_date": "2025-10-09T18:15:55+00:00",
"generator": {
"date": "2025-10-09T18:15:55+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2019:3840",
"initial_release_date": "2019-11-12T21:22:53+00:00",
"revision_history": [
{
"date": "2019-11-12T21:22:53+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2019-11-12T21:22:54+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T18:15:55+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product": {
"name": "Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.3::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.3::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product": {
"name": "Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:7.3::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:7.3::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server TUS (v. 7.3)",
"product": {
"name": "Red Hat Enterprise Linux Server TUS (v. 7.3)",
"product_id": "7Server-7.3.TUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_tus:7.3::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.3)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.3)",
"product_id": "7Server-optional-7.3.TUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_tus:7.3::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-514.70.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-514.70.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"product_id": "kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-514.70.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-514.70.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-514.70.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"product": {
"name": "perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"product_id": "perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-514.70.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"product_id": "python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-514.70.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-514.70.2.el7.x86_64",
"product": {
"name": "kernel-0:3.10.0-514.70.2.el7.x86_64",
"product_id": "kernel-0:3.10.0-514.70.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-514.70.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"product": {
"name": "kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"product_id": "kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-514.70.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"product_id": "kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-514.70.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"product": {
"name": "kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"product_id": "kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-514.70.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"product": {
"name": "kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"product_id": "kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-514.70.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"product": {
"name": "kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"product_id": "kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-514.70.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"product_id": "kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-514.70.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-514.70.2.el7.x86_64",
"product": {
"name": "perf-0:3.10.0-514.70.2.el7.x86_64",
"product_id": "perf-0:3.10.0-514.70.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-514.70.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-514.70.2.el7.x86_64",
"product": {
"name": "python-perf-0:3.10.0-514.70.2.el7.x86_64",
"product_id": "python-perf-0:3.10.0-514.70.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-514.70.2.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-514.70.2.el7.src",
"product": {
"name": "kernel-0:3.10.0-514.70.2.el7.src",
"product_id": "kernel-0:3.10.0-514.70.2.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-514.70.2.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"product": {
"name": "kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"product_id": "kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-514.70.2.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"product": {
"name": "kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"product_id": "kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@3.10.0-514.70.2.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-514.70.2.el7.ppc64le",
"product": {
"name": "kernel-debug-devel-0:3.10.0-514.70.2.el7.ppc64le",
"product_id": "kernel-debug-devel-0:3.10.0-514.70.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-514.70.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.ppc64le",
"product_id": "kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-514.70.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"product_id": "kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-514.70.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"product_id": "kernel-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-514.70.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.70.2.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.70.2.el7.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.70.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@3.10.0-514.70.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"product_id": "kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-514.70.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"product": {
"name": "perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"product_id": "perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-514.70.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"product_id": "python-perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-514.70.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-514.70.2.el7.ppc64le",
"product": {
"name": "kernel-0:3.10.0-514.70.2.el7.ppc64le",
"product_id": "kernel-0:3.10.0-514.70.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-514.70.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:3.10.0-514.70.2.el7.ppc64le",
"product": {
"name": "kernel-bootwrapper-0:3.10.0-514.70.2.el7.ppc64le",
"product_id": "kernel-bootwrapper-0:3.10.0-514.70.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-514.70.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-514.70.2.el7.ppc64le",
"product": {
"name": "kernel-debug-0:3.10.0-514.70.2.el7.ppc64le",
"product_id": "kernel-debug-0:3.10.0-514.70.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-514.70.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-514.70.2.el7.ppc64le",
"product": {
"name": "kernel-devel-0:3.10.0-514.70.2.el7.ppc64le",
"product_id": "kernel-devel-0:3.10.0-514.70.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-514.70.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-514.70.2.el7.ppc64le",
"product": {
"name": "kernel-headers-0:3.10.0-514.70.2.el7.ppc64le",
"product_id": "kernel-headers-0:3.10.0-514.70.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-514.70.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-514.70.2.el7.ppc64le",
"product": {
"name": "kernel-tools-0:3.10.0-514.70.2.el7.ppc64le",
"product_id": "kernel-tools-0:3.10.0-514.70.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-514.70.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-514.70.2.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-0:3.10.0-514.70.2.el7.ppc64le",
"product_id": "kernel-tools-libs-0:3.10.0-514.70.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-514.70.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-514.70.2.el7.ppc64le",
"product": {
"name": "perf-0:3.10.0-514.70.2.el7.ppc64le",
"product_id": "perf-0:3.10.0-514.70.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-514.70.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-514.70.2.el7.ppc64le",
"product": {
"name": "python-perf-0:3.10.0-514.70.2.el7.ppc64le",
"product_id": "python-perf-0:3.10.0-514.70.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-514.70.2.el7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.70.2.el7.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-514.70.2.el7.src",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-514.70.2.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:perf-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:python-perf-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.70.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-514.70.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.70.2.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-514.70.2.el7.src",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-514.70.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.70.2.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-514.70.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-514.70.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-514.70.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-514.70.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-514.70.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-514.70.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.70.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.70.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.70.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-514.70.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-514.70.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-514.70.2.el7.noarch as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-doc-0:3.10.0-514.70.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-514.70.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-514.70.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-514.70.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-514.70.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-514.70.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-514.70.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-514.70.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:perf-0:3.10.0-514.70.2.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-514.70.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:perf-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-514.70.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-514.70.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.70.2.el7.src as a component of Red Hat Enterprise Linux Server TUS (v. 7.3)",
"product_id": "7Server-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-514.70.2.el7.src",
"relates_to_product_reference": "7Server-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.3)",
"product_id": "7Server-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 7.3)",
"product_id": "7Server-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"relates_to_product_reference": "7Server-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.3)",
"product_id": "7Server-7.3.TUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.3)",
"product_id": "7Server-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.3)",
"product_id": "7Server-7.3.TUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.3)",
"product_id": "7Server-7.3.TUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.3)",
"product_id": "7Server-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.3)",
"product_id": "7Server-7.3.TUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-514.70.2.el7.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 7.3)",
"product_id": "7Server-7.3.TUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"relates_to_product_reference": "7Server-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.3)",
"product_id": "7Server-7.3.TUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.3)",
"product_id": "7Server-7.3.TUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.3)",
"product_id": "7Server-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.3)",
"product_id": "7Server-7.3.TUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.3)",
"product_id": "7Server-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.3)",
"product_id": "7Server-7.3.TUS:perf-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.3)",
"product_id": "7Server-7.3.TUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.3)",
"product_id": "7Server-7.3.TUS:python-perf-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.3)",
"product_id": "7Server-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.70.2.el7.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-514.70.2.el7.src",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-514.70.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:perf-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.70.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-514.70.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.70.2.el7.src as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-514.70.2.el7.src",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-514.70.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.70.2.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-514.70.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-514.70.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-514.70.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-514.70.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-514.70.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-514.70.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.70.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.70.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.70.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-514.70.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-514.70.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-514.70.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-doc-0:3.10.0-514.70.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-514.70.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-514.70.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-514.70.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-514.70.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-514.70.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-514.70.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-514.70.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:perf-0:3.10.0-514.70.2.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-514.70.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:perf-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-514.70.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-514.70.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.70.2.el7.src as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.3)",
"product_id": "7Server-optional-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-514.70.2.el7.src",
"relates_to_product_reference": "7Server-optional-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.3)",
"product_id": "7Server-optional-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.3)",
"product_id": "7Server-optional-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.3)",
"product_id": "7Server-optional-7.3.TUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.3)",
"product_id": "7Server-optional-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.3)",
"product_id": "7Server-optional-7.3.TUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.3)",
"product_id": "7Server-optional-7.3.TUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.3)",
"product_id": "7Server-optional-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.3)",
"product_id": "7Server-optional-7.3.TUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-514.70.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.3)",
"product_id": "7Server-optional-7.3.TUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.3)",
"product_id": "7Server-optional-7.3.TUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.3)",
"product_id": "7Server-optional-7.3.TUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.3)",
"product_id": "7Server-optional-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.3)",
"product_id": "7Server-optional-7.3.TUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.3)",
"product_id": "7Server-optional-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.3)",
"product_id": "7Server-optional-7.3.TUS:perf-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.3)",
"product_id": "7Server-optional-7.3.TUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.3)",
"product_id": "7Server-optional-7.3.TUS:python-perf-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.3)",
"product_id": "7Server-optional-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.TUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Intel"
]
},
{
"names": [
"Deepak Gupta"
],
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2018-12207",
"cwe": {
"id": "CWE-226",
"name": "Sensitive Information in Resource Not Removed Before Reuse"
},
"discovery_date": "2018-11-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1646768"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way Intel CPUs handle inconsistency between, virtual to physical memory address translations in CPU\u0027s local cache and system software\u0027s Paging structure entries. A privileged guest user may use this flaw to induce a hardware Machine Check Error on the host processor, resulting in a severe DoS scenario by halting the processor.\r\n\r\nSystem software like OS OR Virtual Machine Monitor (VMM) use virtual memory system for storing program instructions and data in memory. Virtual Memory system uses Paging structures like Page Tables and Page Directories to manage system memory. The processor\u0027s Memory Management Unit (MMU) uses Paging structure entries to translate program\u0027s virtual memory addresses to physical memory addresses. The processor stores these address translations into its local cache buffer called - Translation Lookaside Buffer (TLB). TLB has two parts, one for instructions and other for data addresses.\r\n\r\nSystem software can modify its Paging structure entries to change address mappings OR certain attributes like page size etc. Upon such Paging structure alterations in memory, system software must invalidate the corresponding address translations in the processor\u0027s TLB cache. But before this TLB invalidation takes place, a privileged guest user may trigger an instruction fetch operation, which could use an already cached, but now invalid, virtual to physical address translation from Instruction TLB (ITLB). Thus accessing an invalid physical memory address and resulting in halting the processor due to the Machine Check Error (MCE) on Page Size Change.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: Machine Check Error on Page Size Change (IFU)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:perf-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.TUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.TUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:perf-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-optional-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.TUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.TUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-12207"
},
{
"category": "external",
"summary": "RHBZ#1646768",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646768"
},
{
"category": "external",
"summary": "RHSB-ifu-page-mce",
"url": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-12207",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12207"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-12207",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12207"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-11-12T21:22:53+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:perf-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.TUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.TUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:perf-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-optional-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.TUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.TUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:3840"
},
{
"category": "workaround",
"details": "For mitigation related information, please refer to the Red Hat vulnerability article: https://access.redhat.com/security/vulnerabilities/ifu-page-mce .",
"product_ids": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:perf-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.TUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.TUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:perf-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-optional-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.TUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.TUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:perf-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.TUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.TUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:perf-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-optional-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.TUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.TUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: Machine Check Error on Page Size Change (IFU)"
},
{
"acknowledgments": [
{
"names": [
"Intel"
]
}
],
"cve": "CVE-2019-0154",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"discovery_date": "2019-06-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1724393"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Intel graphics hardware (GPU) where a local attacker with the ability to issue an ioctl could trigger a hardware level crash if MMIO registers were read while the graphics card was in a low-power state. This creates a denial of service situation and the GPU and connected displays will remain unusable until a reboot occurs.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: Intel GPU Denial Of Service while accessing MMIO in lower power state",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Intel plans to release BIOS firmware to correct this issue. Red Hat\u0027s kernel update should mitigate this vulnerability. Some older hardware will not have BIOS firmware update and will rely on operating system level protection to prevent access while the device is in low-power states. For more information see https://access.redhat.com/solutions/i915-graphics",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:perf-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.TUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.TUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:perf-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-optional-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.TUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.TUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-0154"
},
{
"category": "external",
"summary": "RHBZ#1724393",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1724393"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-0154",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0154"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-0154",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0154"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/i915-graphics",
"url": "https://access.redhat.com/solutions/i915-graphics"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00260.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00260.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-11-12T21:22:53+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:perf-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.TUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.TUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:perf-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-optional-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.TUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.TUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:3840"
},
{
"category": "workaround",
"details": "Preventing loading of the i915 kernel module will prevent attackers from using this exploit against the system however the power management functionality of the card will be disabled and the system may draw additional power. See this KCS article (https://access.redhat.com/solutions/41278) for instructions on how to disable a kernel module. Graphical displays may also be at low resolution or not work correctly. This mitigation may not be suitable if running graphical tools locally is required.",
"product_ids": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:perf-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.TUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.TUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:perf-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-optional-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.TUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.TUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:perf-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.TUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.TUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:perf-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-optional-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.TUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.TUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: Intel GPU Denial Of Service while accessing MMIO in lower power state"
},
{
"acknowledgments": [
{
"names": [
"Intel"
]
}
],
"cve": "CVE-2019-11135",
"cwe": {
"id": "CWE-203",
"name": "Observable Discrepancy"
},
"discovery_date": "2019-09-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1753062"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way Intel CPUs handle speculative execution of instructions when the TSX Asynchronous Abort (TAA) error occurs. A local authenticated attacker with the ability to monitor execution times could infer the TSX memory state by comparing abort execution times. This could allow information disclosure via this observed side-channel for any TSX transaction being executed while an attacker is able to observe abort timing.\r\n\r\nIntel\u0027s Transactional Synchronisation Extensions (TSX) are set of instructions which enable transactional memory support to improve performance of the multi-threaded applications, in the lock-protected critical sections. The CPU executes instructions in the critical-sections as transactions, while ensuring their atomic state. When such transaction execution is unsuccessful, the processor cannot ensure atomic updates to the transaction memory, so the processor rolls back or aborts such transaction execution.\r\n\r\nWhile TSX Asynchronous Abort (TAA) is pending, CPU may continue to read data from architectural buffers and pass it to the dependent speculative operations. This may cause information leakage via speculative side-channel means, which is quite similar to the Microarchitectural Data Sampling (MDS) issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: TSX Transaction Asynchronous Abort (TAA)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "libvirt and qemu-kvm on Red Hat Enterprise Linux 6 are not affected by this vulnerability as they do not support MSR-based CPU features.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:perf-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.TUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.TUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:perf-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-optional-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.TUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.TUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11135"
},
{
"category": "external",
"summary": "RHBZ#1753062",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753062"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11135",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11135"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11135",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11135"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/tsx-asynchronousabort",
"url": "https://access.redhat.com/solutions/tsx-asynchronousabort"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00270.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00270.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-11-12T21:22:53+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:perf-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.TUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.TUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:perf-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-optional-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.TUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.TUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:3840"
},
{
"category": "workaround",
"details": "For mitigation related information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/solutions/tsx-asynchronousabort",
"product_ids": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:perf-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.TUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.TUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:perf-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-optional-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.TUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.TUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:perf-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.TUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.TUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:perf-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-optional-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.TUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.TUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: TSX Transaction Asynchronous Abort (TAA)"
}
]
}
RHSA-2019:3838
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 7.5 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* hw: Machine Check Error on Page Size Change (IFU) (CVE-2018-12207)\n\n* hw: TSX Transaction Asynchronous Abort (TAA) (CVE-2019-11135)\n\n* hw: Intel GPU Denial Of Service while accessing MMIO in lower power state (CVE-2019-0154)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2019:3838",
"url": "https://access.redhat.com/errata/RHSA-2019:3838"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce",
"url": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/tsx-asynchronousabort",
"url": "https://access.redhat.com/solutions/tsx-asynchronousabort"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/i915-graphics",
"url": "https://access.redhat.com/solutions/i915-graphics"
},
{
"category": "external",
"summary": "1646768",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646768"
},
{
"category": "external",
"summary": "1724393",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1724393"
},
{
"category": "external",
"summary": "1753062",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753062"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_3838.json"
}
],
"title": "Red Hat Security Advisory: kernel security update",
"tracking": {
"current_release_date": "2025-10-09T18:15:54+00:00",
"generator": {
"date": "2025-10-09T18:15:54+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2019:3838",
"initial_release_date": "2019-11-12T20:51:27+00:00",
"revision_history": [
{
"date": "2019-11-12T20:51:27+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2019-11-12T20:51:27+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T18:15:54+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.5::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.5::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product": {
"name": "Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.5::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.5::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-862.43.2.el7.x86_64",
"product": {
"name": "kernel-0:3.10.0-862.43.2.el7.x86_64",
"product_id": "kernel-0:3.10.0-862.43.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-862.43.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"product": {
"name": "kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"product_id": "kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-862.43.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"product_id": "kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-862.43.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"product": {
"name": "kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"product_id": "kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-862.43.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"product": {
"name": "kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"product_id": "kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-862.43.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"product": {
"name": "kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"product_id": "kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-862.43.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"product_id": "kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-862.43.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-862.43.2.el7.x86_64",
"product": {
"name": "perf-0:3.10.0-862.43.2.el7.x86_64",
"product_id": "perf-0:3.10.0-862.43.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-862.43.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-862.43.2.el7.x86_64",
"product": {
"name": "python-perf-0:3.10.0-862.43.2.el7.x86_64",
"product_id": "python-perf-0:3.10.0-862.43.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-862.43.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-862.43.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"product_id": "kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-862.43.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-862.43.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-862.43.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"product": {
"name": "perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"product_id": "perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-862.43.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"product_id": "python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-862.43.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-862.43.2.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-862.43.2.el7.src",
"product": {
"name": "kernel-0:3.10.0-862.43.2.el7.src",
"product_id": "kernel-0:3.10.0-862.43.2.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-862.43.2.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"product": {
"name": "kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"product_id": "kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-862.43.2.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"product": {
"name": "kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"product_id": "kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@3.10.0-862.43.2.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-862.43.2.el7.s390x",
"product": {
"name": "kernel-0:3.10.0-862.43.2.el7.s390x",
"product_id": "kernel-0:3.10.0-862.43.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-862.43.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"product": {
"name": "kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"product_id": "kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-862.43.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"product": {
"name": "kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"product_id": "kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-862.43.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"product": {
"name": "kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"product_id": "kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-862.43.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"product": {
"name": "kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"product_id": "kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-862.43.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"product": {
"name": "kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"product_id": "kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump@3.10.0-862.43.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"product": {
"name": "kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"product_id": "kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-devel@3.10.0-862.43.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-862.43.2.el7.s390x",
"product": {
"name": "perf-0:3.10.0-862.43.2.el7.s390x",
"product_id": "perf-0:3.10.0-862.43.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-862.43.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-862.43.2.el7.s390x",
"product": {
"name": "python-perf-0:3.10.0-862.43.2.el7.s390x",
"product_id": "python-perf-0:3.10.0-862.43.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-862.43.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"product_id": "kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-862.43.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"product": {
"name": "kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"product_id": "kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-862.43.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@3.10.0-862.43.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"product": {
"name": "kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"product_id": "kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@3.10.0-862.43.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"product": {
"name": "perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"product_id": "perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-862.43.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"product_id": "python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-862.43.2.el7?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-862.43.2.el7.ppc64",
"product": {
"name": "kernel-0:3.10.0-862.43.2.el7.ppc64",
"product_id": "kernel-0:3.10.0-862.43.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-862.43.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"product": {
"name": "kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"product_id": "kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-862.43.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"product": {
"name": "kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"product_id": "kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-862.43.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"product_id": "kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-862.43.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"product": {
"name": "kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"product_id": "kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-862.43.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"product": {
"name": "kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"product_id": "kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-862.43.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"product": {
"name": "kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"product_id": "kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-862.43.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"product_id": "kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-862.43.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-862.43.2.el7.ppc64",
"product": {
"name": "perf-0:3.10.0-862.43.2.el7.ppc64",
"product_id": "perf-0:3.10.0-862.43.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-862.43.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-862.43.2.el7.ppc64",
"product": {
"name": "python-perf-0:3.10.0-862.43.2.el7.ppc64",
"product_id": "python-perf-0:3.10.0-862.43.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-862.43.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-862.43.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"product_id": "kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-862.43.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"product": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"product_id": "kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64@3.10.0-862.43.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-862.43.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"product": {
"name": "perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"product_id": "perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-862.43.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"product_id": "python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-862.43.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-862.43.2.el7?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-862.43.2.el7.ppc64le",
"product": {
"name": "kernel-0:3.10.0-862.43.2.el7.ppc64le",
"product_id": "kernel-0:3.10.0-862.43.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-862.43.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"product": {
"name": "kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"product_id": "kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-862.43.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"product": {
"name": "kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"product_id": "kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-862.43.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"product": {
"name": "kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"product_id": "kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-862.43.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"product": {
"name": "kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"product_id": "kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-862.43.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"product": {
"name": "kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"product_id": "kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-862.43.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"product_id": "kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-862.43.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-862.43.2.el7.ppc64le",
"product": {
"name": "perf-0:3.10.0-862.43.2.el7.ppc64le",
"product_id": "perf-0:3.10.0-862.43.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-862.43.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"product": {
"name": "python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"product_id": "python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-862.43.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"product_id": "kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-862.43.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"product_id": "kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-862.43.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@3.10.0-862.43.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"product_id": "kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-862.43.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"product": {
"name": "perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"product_id": "perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-862.43.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"product_id": "python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-862.43.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"product": {
"name": "kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"product_id": "kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-862.43.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"product_id": "kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-862.43.2.el7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.43.2.el7.src as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-862.43.2.el7.src",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-862.43.2.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "perf-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.43.2.el7.src as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-862.43.2.el7.src",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-862.43.2.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "perf-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.43.2.el7.src as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-862.43.2.el7.src",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-862.43.2.el7.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "perf-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.43.2.el7.src as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-862.43.2.el7.src",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-862.43.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "perf-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Intel"
]
},
{
"names": [
"Deepak Gupta"
],
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2018-12207",
"cwe": {
"id": "CWE-226",
"name": "Sensitive Information in Resource Not Removed Before Reuse"
},
"discovery_date": "2018-11-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1646768"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way Intel CPUs handle inconsistency between, virtual to physical memory address translations in CPU\u0027s local cache and system software\u0027s Paging structure entries. A privileged guest user may use this flaw to induce a hardware Machine Check Error on the host processor, resulting in a severe DoS scenario by halting the processor.\r\n\r\nSystem software like OS OR Virtual Machine Monitor (VMM) use virtual memory system for storing program instructions and data in memory. Virtual Memory system uses Paging structures like Page Tables and Page Directories to manage system memory. The processor\u0027s Memory Management Unit (MMU) uses Paging structure entries to translate program\u0027s virtual memory addresses to physical memory addresses. The processor stores these address translations into its local cache buffer called - Translation Lookaside Buffer (TLB). TLB has two parts, one for instructions and other for data addresses.\r\n\r\nSystem software can modify its Paging structure entries to change address mappings OR certain attributes like page size etc. Upon such Paging structure alterations in memory, system software must invalidate the corresponding address translations in the processor\u0027s TLB cache. But before this TLB invalidation takes place, a privileged guest user may trigger an instruction fetch operation, which could use an already cached, but now invalid, virtual to physical address translation from Instruction TLB (ITLB). Thus accessing an invalid physical memory address and resulting in halting the processor due to the Machine Check Error (MCE) on Page Size Change.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: Machine Check Error on Page Size Change (IFU)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-12207"
},
{
"category": "external",
"summary": "RHBZ#1646768",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646768"
},
{
"category": "external",
"summary": "RHSB-ifu-page-mce",
"url": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-12207",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12207"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-12207",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12207"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-11-12T20:51:27+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:3838"
},
{
"category": "workaround",
"details": "For mitigation related information, please refer to the Red Hat vulnerability article: https://access.redhat.com/security/vulnerabilities/ifu-page-mce .",
"product_ids": [
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: Machine Check Error on Page Size Change (IFU)"
},
{
"acknowledgments": [
{
"names": [
"Intel"
]
}
],
"cve": "CVE-2019-0154",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"discovery_date": "2019-06-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1724393"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Intel graphics hardware (GPU) where a local attacker with the ability to issue an ioctl could trigger a hardware level crash if MMIO registers were read while the graphics card was in a low-power state. This creates a denial of service situation and the GPU and connected displays will remain unusable until a reboot occurs.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: Intel GPU Denial Of Service while accessing MMIO in lower power state",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Intel plans to release BIOS firmware to correct this issue. Red Hat\u0027s kernel update should mitigate this vulnerability. Some older hardware will not have BIOS firmware update and will rely on operating system level protection to prevent access while the device is in low-power states. For more information see https://access.redhat.com/solutions/i915-graphics",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-0154"
},
{
"category": "external",
"summary": "RHBZ#1724393",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1724393"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-0154",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0154"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-0154",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0154"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/i915-graphics",
"url": "https://access.redhat.com/solutions/i915-graphics"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00260.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00260.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-11-12T20:51:27+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:3838"
},
{
"category": "workaround",
"details": "Preventing loading of the i915 kernel module will prevent attackers from using this exploit against the system however the power management functionality of the card will be disabled and the system may draw additional power. See this KCS article (https://access.redhat.com/solutions/41278) for instructions on how to disable a kernel module. Graphical displays may also be at low resolution or not work correctly. This mitigation may not be suitable if running graphical tools locally is required.",
"product_ids": [
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: Intel GPU Denial Of Service while accessing MMIO in lower power state"
},
{
"acknowledgments": [
{
"names": [
"Intel"
]
}
],
"cve": "CVE-2019-11135",
"cwe": {
"id": "CWE-203",
"name": "Observable Discrepancy"
},
"discovery_date": "2019-09-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1753062"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way Intel CPUs handle speculative execution of instructions when the TSX Asynchronous Abort (TAA) error occurs. A local authenticated attacker with the ability to monitor execution times could infer the TSX memory state by comparing abort execution times. This could allow information disclosure via this observed side-channel for any TSX transaction being executed while an attacker is able to observe abort timing.\r\n\r\nIntel\u0027s Transactional Synchronisation Extensions (TSX) are set of instructions which enable transactional memory support to improve performance of the multi-threaded applications, in the lock-protected critical sections. The CPU executes instructions in the critical-sections as transactions, while ensuring their atomic state. When such transaction execution is unsuccessful, the processor cannot ensure atomic updates to the transaction memory, so the processor rolls back or aborts such transaction execution.\r\n\r\nWhile TSX Asynchronous Abort (TAA) is pending, CPU may continue to read data from architectural buffers and pass it to the dependent speculative operations. This may cause information leakage via speculative side-channel means, which is quite similar to the Microarchitectural Data Sampling (MDS) issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: TSX Transaction Asynchronous Abort (TAA)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "libvirt and qemu-kvm on Red Hat Enterprise Linux 6 are not affected by this vulnerability as they do not support MSR-based CPU features.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11135"
},
{
"category": "external",
"summary": "RHBZ#1753062",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753062"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11135",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11135"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11135",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11135"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/tsx-asynchronousabort",
"url": "https://access.redhat.com/solutions/tsx-asynchronousabort"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00270.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00270.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-11-12T20:51:27+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:3838"
},
{
"category": "workaround",
"details": "For mitigation related information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/solutions/tsx-asynchronousabort",
"product_ids": [
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: TSX Transaction Asynchronous Abort (TAA)"
}
]
}
rhsa-2019:3839
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 7.4 Advanced Update Support, Red Hat Enterprise Linux 7.4 Telco Extended Update Support, and Red Hat Enterprise Linux 7.4 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* hw: Machine Check Error on Page Size Change (IFU) (CVE-2018-12207)\n\n* hw: TSX Transaction Asynchronous Abort (TAA) (CVE-2019-11135)\n\n* hw: Intel GPU Denial Of Service while accessing MMIO in lower power state (CVE-2019-0154)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2019:3839",
"url": "https://access.redhat.com/errata/RHSA-2019:3839"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce",
"url": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/tsx-asynchronousabort",
"url": "https://access.redhat.com/solutions/tsx-asynchronousabort"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/i915-graphics",
"url": "https://access.redhat.com/solutions/i915-graphics"
},
{
"category": "external",
"summary": "1646768",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646768"
},
{
"category": "external",
"summary": "1724393",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1724393"
},
{
"category": "external",
"summary": "1753062",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753062"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_3839.json"
}
],
"title": "Red Hat Security Advisory: kernel security update",
"tracking": {
"current_release_date": "2025-10-09T18:16:00+00:00",
"generator": {
"date": "2025-10-09T18:16:00+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2019:3839",
"initial_release_date": "2019-11-12T21:37:14+00:00",
"revision_history": [
{
"date": "2019-11-12T21:37:14+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2019-11-12T21:37:14+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T18:16:00+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product": {
"name": "Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.4::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.4::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product": {
"name": "Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:7.4::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:7.4::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server TUS (v. 7.4)",
"product": {
"name": "Red Hat Enterprise Linux Server TUS (v. 7.4)",
"product_id": "7Server-7.4.TUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_tus:7.4::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.4)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.4)",
"product_id": "7Server-optional-7.4.TUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_tus:7.4::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-693.60.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-693.60.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"product_id": "kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-693.60.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-693.60.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-693.60.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"product": {
"name": "perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"product_id": "perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-693.60.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"product_id": "python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-693.60.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-693.60.2.el7.x86_64",
"product": {
"name": "kernel-0:3.10.0-693.60.2.el7.x86_64",
"product_id": "kernel-0:3.10.0-693.60.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-693.60.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"product": {
"name": "kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"product_id": "kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-693.60.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"product_id": "kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-693.60.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"product": {
"name": "kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"product_id": "kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-693.60.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"product": {
"name": "kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"product_id": "kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-693.60.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"product": {
"name": "kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"product_id": "kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-693.60.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"product_id": "kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-693.60.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-693.60.2.el7.x86_64",
"product": {
"name": "perf-0:3.10.0-693.60.2.el7.x86_64",
"product_id": "perf-0:3.10.0-693.60.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-693.60.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-693.60.2.el7.x86_64",
"product": {
"name": "python-perf-0:3.10.0-693.60.2.el7.x86_64",
"product_id": "python-perf-0:3.10.0-693.60.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-693.60.2.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-693.60.2.el7.src",
"product": {
"name": "kernel-0:3.10.0-693.60.2.el7.src",
"product_id": "kernel-0:3.10.0-693.60.2.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-693.60.2.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"product": {
"name": "kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"product_id": "kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-693.60.2.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"product": {
"name": "kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"product_id": "kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@3.10.0-693.60.2.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-693.60.2.el7.ppc64le",
"product": {
"name": "kernel-debug-devel-0:3.10.0-693.60.2.el7.ppc64le",
"product_id": "kernel-debug-devel-0:3.10.0-693.60.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-693.60.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.ppc64le",
"product_id": "kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-693.60.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"product_id": "kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-693.60.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"product_id": "kernel-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-693.60.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.60.2.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.60.2.el7.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.60.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@3.10.0-693.60.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"product_id": "kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-693.60.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"product": {
"name": "perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"product_id": "perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-693.60.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"product_id": "python-perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-693.60.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-693.60.2.el7.ppc64le",
"product": {
"name": "kernel-0:3.10.0-693.60.2.el7.ppc64le",
"product_id": "kernel-0:3.10.0-693.60.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-693.60.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:3.10.0-693.60.2.el7.ppc64le",
"product": {
"name": "kernel-bootwrapper-0:3.10.0-693.60.2.el7.ppc64le",
"product_id": "kernel-bootwrapper-0:3.10.0-693.60.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-693.60.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-693.60.2.el7.ppc64le",
"product": {
"name": "kernel-debug-0:3.10.0-693.60.2.el7.ppc64le",
"product_id": "kernel-debug-0:3.10.0-693.60.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-693.60.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-693.60.2.el7.ppc64le",
"product": {
"name": "kernel-devel-0:3.10.0-693.60.2.el7.ppc64le",
"product_id": "kernel-devel-0:3.10.0-693.60.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-693.60.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-693.60.2.el7.ppc64le",
"product": {
"name": "kernel-headers-0:3.10.0-693.60.2.el7.ppc64le",
"product_id": "kernel-headers-0:3.10.0-693.60.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-693.60.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-693.60.2.el7.ppc64le",
"product": {
"name": "kernel-tools-0:3.10.0-693.60.2.el7.ppc64le",
"product_id": "kernel-tools-0:3.10.0-693.60.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-693.60.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-693.60.2.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-0:3.10.0-693.60.2.el7.ppc64le",
"product_id": "kernel-tools-libs-0:3.10.0-693.60.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-693.60.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-693.60.2.el7.ppc64le",
"product": {
"name": "perf-0:3.10.0-693.60.2.el7.ppc64le",
"product_id": "perf-0:3.10.0-693.60.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-693.60.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-693.60.2.el7.ppc64le",
"product": {
"name": "python-perf-0:3.10.0-693.60.2.el7.ppc64le",
"product_id": "python-perf-0:3.10.0-693.60.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-693.60.2.el7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.60.2.el7.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-693.60.2.el7.src",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-693.60.2.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:perf-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:python-perf-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.60.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-693.60.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.60.2.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-693.60.2.el7.src",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-693.60.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.60.2.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-693.60.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.60.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-693.60.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.60.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.60.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.60.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.60.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.60.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.60.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.60.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-693.60.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-693.60.2.el7.noarch as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-doc-0:3.10.0-693.60.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.60.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-693.60.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.60.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-693.60.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.60.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.60.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.60.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:perf-0:3.10.0-693.60.2.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-693.60.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:perf-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.60.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-693.60.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.60.2.el7.src as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)",
"product_id": "7Server-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-693.60.2.el7.src",
"relates_to_product_reference": "7Server-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)",
"product_id": "7Server-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)",
"product_id": "7Server-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"relates_to_product_reference": "7Server-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)",
"product_id": "7Server-7.4.TUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)",
"product_id": "7Server-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)",
"product_id": "7Server-7.4.TUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)",
"product_id": "7Server-7.4.TUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)",
"product_id": "7Server-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)",
"product_id": "7Server-7.4.TUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-693.60.2.el7.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)",
"product_id": "7Server-7.4.TUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"relates_to_product_reference": "7Server-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)",
"product_id": "7Server-7.4.TUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)",
"product_id": "7Server-7.4.TUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)",
"product_id": "7Server-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)",
"product_id": "7Server-7.4.TUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)",
"product_id": "7Server-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)",
"product_id": "7Server-7.4.TUS:perf-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)",
"product_id": "7Server-7.4.TUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)",
"product_id": "7Server-7.4.TUS:python-perf-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)",
"product_id": "7Server-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.60.2.el7.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-693.60.2.el7.src",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-693.60.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:perf-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.60.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-693.60.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.60.2.el7.src as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-693.60.2.el7.src",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-693.60.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.60.2.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-693.60.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.60.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-693.60.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.60.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.60.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.60.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.60.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.60.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.60.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.60.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-693.60.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-693.60.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-doc-0:3.10.0-693.60.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.60.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-693.60.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.60.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-693.60.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.60.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.60.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.60.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:perf-0:3.10.0-693.60.2.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-693.60.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:perf-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.60.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-693.60.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.60.2.el7.src as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)",
"product_id": "7Server-optional-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-693.60.2.el7.src",
"relates_to_product_reference": "7Server-optional-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)",
"product_id": "7Server-optional-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)",
"product_id": "7Server-optional-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)",
"product_id": "7Server-optional-7.4.TUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)",
"product_id": "7Server-optional-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)",
"product_id": "7Server-optional-7.4.TUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)",
"product_id": "7Server-optional-7.4.TUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)",
"product_id": "7Server-optional-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)",
"product_id": "7Server-optional-7.4.TUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-693.60.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)",
"product_id": "7Server-optional-7.4.TUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)",
"product_id": "7Server-optional-7.4.TUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)",
"product_id": "7Server-optional-7.4.TUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)",
"product_id": "7Server-optional-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)",
"product_id": "7Server-optional-7.4.TUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)",
"product_id": "7Server-optional-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)",
"product_id": "7Server-optional-7.4.TUS:perf-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)",
"product_id": "7Server-optional-7.4.TUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)",
"product_id": "7Server-optional-7.4.TUS:python-perf-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)",
"product_id": "7Server-optional-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.TUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Intel"
]
},
{
"names": [
"Deepak Gupta"
],
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2018-12207",
"cwe": {
"id": "CWE-226",
"name": "Sensitive Information in Resource Not Removed Before Reuse"
},
"discovery_date": "2018-11-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1646768"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way Intel CPUs handle inconsistency between, virtual to physical memory address translations in CPU\u0027s local cache and system software\u0027s Paging structure entries. A privileged guest user may use this flaw to induce a hardware Machine Check Error on the host processor, resulting in a severe DoS scenario by halting the processor.\r\n\r\nSystem software like OS OR Virtual Machine Monitor (VMM) use virtual memory system for storing program instructions and data in memory. Virtual Memory system uses Paging structures like Page Tables and Page Directories to manage system memory. The processor\u0027s Memory Management Unit (MMU) uses Paging structure entries to translate program\u0027s virtual memory addresses to physical memory addresses. The processor stores these address translations into its local cache buffer called - Translation Lookaside Buffer (TLB). TLB has two parts, one for instructions and other for data addresses.\r\n\r\nSystem software can modify its Paging structure entries to change address mappings OR certain attributes like page size etc. Upon such Paging structure alterations in memory, system software must invalidate the corresponding address translations in the processor\u0027s TLB cache. But before this TLB invalidation takes place, a privileged guest user may trigger an instruction fetch operation, which could use an already cached, but now invalid, virtual to physical address translation from Instruction TLB (ITLB). Thus accessing an invalid physical memory address and resulting in halting the processor due to the Machine Check Error (MCE) on Page Size Change.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: Machine Check Error on Page Size Change (IFU)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:perf-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.TUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.TUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-12207"
},
{
"category": "external",
"summary": "RHBZ#1646768",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646768"
},
{
"category": "external",
"summary": "RHSB-ifu-page-mce",
"url": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-12207",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12207"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-12207",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12207"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-11-12T21:37:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:perf-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.TUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.TUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:3839"
},
{
"category": "workaround",
"details": "For mitigation related information, please refer to the Red Hat vulnerability article: https://access.redhat.com/security/vulnerabilities/ifu-page-mce .",
"product_ids": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:perf-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.TUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.TUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:perf-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.TUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.TUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: Machine Check Error on Page Size Change (IFU)"
},
{
"acknowledgments": [
{
"names": [
"Intel"
]
}
],
"cve": "CVE-2019-0154",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"discovery_date": "2019-06-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1724393"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Intel graphics hardware (GPU) where a local attacker with the ability to issue an ioctl could trigger a hardware level crash if MMIO registers were read while the graphics card was in a low-power state. This creates a denial of service situation and the GPU and connected displays will remain unusable until a reboot occurs.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: Intel GPU Denial Of Service while accessing MMIO in lower power state",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Intel plans to release BIOS firmware to correct this issue. Red Hat\u0027s kernel update should mitigate this vulnerability. Some older hardware will not have BIOS firmware update and will rely on operating system level protection to prevent access while the device is in low-power states. For more information see https://access.redhat.com/solutions/i915-graphics",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:perf-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.TUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.TUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-0154"
},
{
"category": "external",
"summary": "RHBZ#1724393",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1724393"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-0154",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0154"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-0154",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0154"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/i915-graphics",
"url": "https://access.redhat.com/solutions/i915-graphics"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00260.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00260.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-11-12T21:37:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:perf-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.TUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.TUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:3839"
},
{
"category": "workaround",
"details": "Preventing loading of the i915 kernel module will prevent attackers from using this exploit against the system however the power management functionality of the card will be disabled and the system may draw additional power. See this KCS article (https://access.redhat.com/solutions/41278) for instructions on how to disable a kernel module. Graphical displays may also be at low resolution or not work correctly. This mitigation may not be suitable if running graphical tools locally is required.",
"product_ids": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:perf-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.TUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.TUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:perf-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.TUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.TUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: Intel GPU Denial Of Service while accessing MMIO in lower power state"
},
{
"acknowledgments": [
{
"names": [
"Intel"
]
}
],
"cve": "CVE-2019-11135",
"cwe": {
"id": "CWE-203",
"name": "Observable Discrepancy"
},
"discovery_date": "2019-09-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1753062"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way Intel CPUs handle speculative execution of instructions when the TSX Asynchronous Abort (TAA) error occurs. A local authenticated attacker with the ability to monitor execution times could infer the TSX memory state by comparing abort execution times. This could allow information disclosure via this observed side-channel for any TSX transaction being executed while an attacker is able to observe abort timing.\r\n\r\nIntel\u0027s Transactional Synchronisation Extensions (TSX) are set of instructions which enable transactional memory support to improve performance of the multi-threaded applications, in the lock-protected critical sections. The CPU executes instructions in the critical-sections as transactions, while ensuring their atomic state. When such transaction execution is unsuccessful, the processor cannot ensure atomic updates to the transaction memory, so the processor rolls back or aborts such transaction execution.\r\n\r\nWhile TSX Asynchronous Abort (TAA) is pending, CPU may continue to read data from architectural buffers and pass it to the dependent speculative operations. This may cause information leakage via speculative side-channel means, which is quite similar to the Microarchitectural Data Sampling (MDS) issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: TSX Transaction Asynchronous Abort (TAA)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "libvirt and qemu-kvm on Red Hat Enterprise Linux 6 are not affected by this vulnerability as they do not support MSR-based CPU features.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:perf-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.TUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.TUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11135"
},
{
"category": "external",
"summary": "RHBZ#1753062",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753062"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11135",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11135"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11135",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11135"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/tsx-asynchronousabort",
"url": "https://access.redhat.com/solutions/tsx-asynchronousabort"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00270.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00270.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-11-12T21:37:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:perf-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.TUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.TUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:3839"
},
{
"category": "workaround",
"details": "For mitigation related information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/solutions/tsx-asynchronousabort",
"product_ids": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:perf-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.TUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.TUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:perf-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.TUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.TUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: TSX Transaction Asynchronous Abort (TAA)"
}
]
}
rhsa-2019_3832
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* hw: Machine Check Error on Page Size Change (IFU) (CVE-2018-12207)\n\n* hw: TSX Transaction Asynchronous Abort (TAA) (CVE-2019-11135)\n\n* hw: Intel GPU Denial Of Service while accessing MMIO in lower power state (CVE-2019-0154)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2019:3832",
"url": "https://access.redhat.com/errata/RHSA-2019:3832"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce",
"url": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/tsx-asynchronousabort",
"url": "https://access.redhat.com/solutions/tsx-asynchronousabort"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/i915-graphics",
"url": "https://access.redhat.com/solutions/i915-graphics"
},
{
"category": "external",
"summary": "1646768",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646768"
},
{
"category": "external",
"summary": "1724393",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1724393"
},
{
"category": "external",
"summary": "1753062",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753062"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_3832.json"
}
],
"title": "Red Hat Security Advisory: kernel security update",
"tracking": {
"current_release_date": "2024-11-15T03:17:05+00:00",
"generator": {
"date": "2024-11-15T03:17:05+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2019:3832",
"initial_release_date": "2019-11-12T20:48:43+00:00",
"revision_history": [
{
"date": "2019-11-12T20:48:43+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2019-11-12T20:48:43+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-15T03:17:05+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat CodeReady Linux Builder (v. 8)",
"product": {
"name": "Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::crb"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:8::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-147.0.2.el8_1.s390x",
"product": {
"name": "bpftool-0:4.18.0-147.0.2.el8_1.s390x",
"product_id": "bpftool-0:4.18.0-147.0.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-147.0.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-147.0.2.el8_1.s390x",
"product": {
"name": "kernel-0:4.18.0-147.0.2.el8_1.s390x",
"product_id": "kernel-0:4.18.0-147.0.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-147.0.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-147.0.2.el8_1.s390x",
"product": {
"name": "kernel-core-0:4.18.0-147.0.2.el8_1.s390x",
"product_id": "kernel-core-0:4.18.0-147.0.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-147.0.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-147.0.2.el8_1.s390x",
"product": {
"name": "kernel-cross-headers-0:4.18.0-147.0.2.el8_1.s390x",
"product_id": "kernel-cross-headers-0:4.18.0-147.0.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-147.0.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-147.0.2.el8_1.s390x",
"product": {
"name": "kernel-debug-0:4.18.0-147.0.2.el8_1.s390x",
"product_id": "kernel-debug-0:4.18.0-147.0.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-147.0.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-147.0.2.el8_1.s390x",
"product": {
"name": "kernel-debug-core-0:4.18.0-147.0.2.el8_1.s390x",
"product_id": "kernel-debug-core-0:4.18.0-147.0.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-147.0.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-147.0.2.el8_1.s390x",
"product": {
"name": "kernel-debug-devel-0:4.18.0-147.0.2.el8_1.s390x",
"product_id": "kernel-debug-devel-0:4.18.0-147.0.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-147.0.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-147.0.2.el8_1.s390x",
"product": {
"name": "kernel-debug-modules-0:4.18.0-147.0.2.el8_1.s390x",
"product_id": "kernel-debug-modules-0:4.18.0-147.0.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-147.0.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"product_id": "kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-147.0.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-147.0.2.el8_1.s390x",
"product": {
"name": "kernel-devel-0:4.18.0-147.0.2.el8_1.s390x",
"product_id": "kernel-devel-0:4.18.0-147.0.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-147.0.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-147.0.2.el8_1.s390x",
"product": {
"name": "kernel-headers-0:4.18.0-147.0.2.el8_1.s390x",
"product_id": "kernel-headers-0:4.18.0-147.0.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-147.0.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-147.0.2.el8_1.s390x",
"product": {
"name": "kernel-modules-0:4.18.0-147.0.2.el8_1.s390x",
"product_id": "kernel-modules-0:4.18.0-147.0.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-147.0.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"product": {
"name": "kernel-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"product_id": "kernel-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-147.0.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-147.0.2.el8_1.s390x",
"product": {
"name": "kernel-tools-0:4.18.0-147.0.2.el8_1.s390x",
"product_id": "kernel-tools-0:4.18.0-147.0.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-147.0.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-0:4.18.0-147.0.2.el8_1.s390x",
"product": {
"name": "kernel-zfcpdump-0:4.18.0-147.0.2.el8_1.s390x",
"product_id": "kernel-zfcpdump-0:4.18.0-147.0.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump@4.18.0-147.0.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-core-0:4.18.0-147.0.2.el8_1.s390x",
"product": {
"name": "kernel-zfcpdump-core-0:4.18.0-147.0.2.el8_1.s390x",
"product_id": "kernel-zfcpdump-core-0:4.18.0-147.0.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-core@4.18.0-147.0.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-devel-0:4.18.0-147.0.2.el8_1.s390x",
"product": {
"name": "kernel-zfcpdump-devel-0:4.18.0-147.0.2.el8_1.s390x",
"product_id": "kernel-zfcpdump-devel-0:4.18.0-147.0.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-devel@4.18.0-147.0.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-0:4.18.0-147.0.2.el8_1.s390x",
"product": {
"name": "kernel-zfcpdump-modules-0:4.18.0-147.0.2.el8_1.s390x",
"product_id": "kernel-zfcpdump-modules-0:4.18.0-147.0.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules@4.18.0-147.0.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"product": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"product_id": "kernel-zfcpdump-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-extra@4.18.0-147.0.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-147.0.2.el8_1.s390x",
"product": {
"name": "perf-0:4.18.0-147.0.2.el8_1.s390x",
"product_id": "perf-0:4.18.0-147.0.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-147.0.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-147.0.2.el8_1.s390x",
"product": {
"name": "python3-perf-0:4.18.0-147.0.2.el8_1.s390x",
"product_id": "python3-perf-0:4.18.0-147.0.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-147.0.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"product_id": "bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-147.0.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"product_id": "kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-147.0.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"product": {
"name": "kernel-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"product_id": "kernel-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-147.0.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:4.18.0-147.0.2.el8_1.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-147.0.2.el8_1.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:4.18.0-147.0.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@4.18.0-147.0.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"product_id": "kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-147.0.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"product": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"product_id": "kernel-zfcpdump-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-debuginfo@4.18.0-147.0.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"product": {
"name": "perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"product_id": "perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-147.0.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"product_id": "python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-147.0.2.el8_1?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-147.0.2.el8_1.aarch64",
"product": {
"name": "bpftool-0:4.18.0-147.0.2.el8_1.aarch64",
"product_id": "bpftool-0:4.18.0-147.0.2.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-147.0.2.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-147.0.2.el8_1.aarch64",
"product": {
"name": "kernel-0:4.18.0-147.0.2.el8_1.aarch64",
"product_id": "kernel-0:4.18.0-147.0.2.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-147.0.2.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-147.0.2.el8_1.aarch64",
"product": {
"name": "kernel-core-0:4.18.0-147.0.2.el8_1.aarch64",
"product_id": "kernel-core-0:4.18.0-147.0.2.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-147.0.2.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"product_id": "kernel-cross-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-147.0.2.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-147.0.2.el8_1.aarch64",
"product": {
"name": "kernel-debug-0:4.18.0-147.0.2.el8_1.aarch64",
"product_id": "kernel-debug-0:4.18.0-147.0.2.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-147.0.2.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-147.0.2.el8_1.aarch64",
"product": {
"name": "kernel-debug-core-0:4.18.0-147.0.2.el8_1.aarch64",
"product_id": "kernel-debug-core-0:4.18.0-147.0.2.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-147.0.2.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"product_id": "kernel-debug-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-147.0.2.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"product_id": "kernel-debug-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-147.0.2.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-147.0.2.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"product": {
"name": "kernel-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"product_id": "kernel-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-147.0.2.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"product": {
"name": "kernel-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"product_id": "kernel-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-147.0.2.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"product": {
"name": "kernel-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"product_id": "kernel-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-147.0.2.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"product_id": "kernel-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-147.0.2.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-147.0.2.el8_1.aarch64",
"product": {
"name": "kernel-tools-0:4.18.0-147.0.2.el8_1.aarch64",
"product_id": "kernel-tools-0:4.18.0-147.0.2.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-147.0.2.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-147.0.2.el8_1.aarch64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-147.0.2.el8_1.aarch64",
"product_id": "kernel-tools-libs-0:4.18.0-147.0.2.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-147.0.2.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-147.0.2.el8_1.aarch64",
"product": {
"name": "perf-0:4.18.0-147.0.2.el8_1.aarch64",
"product_id": "perf-0:4.18.0-147.0.2.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-147.0.2.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-147.0.2.el8_1.aarch64",
"product": {
"name": "python3-perf-0:4.18.0-147.0.2.el8_1.aarch64",
"product_id": "python3-perf-0:4.18.0-147.0.2.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-147.0.2.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"product_id": "bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-147.0.2.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-147.0.2.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"product_id": "kernel-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-147.0.2.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-147.0.2.el8_1.aarch64",
"product": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-147.0.2.el8_1.aarch64",
"product_id": "kernel-debuginfo-common-aarch64-0:4.18.0-147.0.2.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-aarch64@4.18.0-147.0.2.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-147.0.2.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"product": {
"name": "perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"product_id": "perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-147.0.2.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"product_id": "python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-147.0.2.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-147.0.2.el8_1?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-147.0.2.el8_1.ppc64le",
"product": {
"name": "bpftool-0:4.18.0-147.0.2.el8_1.ppc64le",
"product_id": "bpftool-0:4.18.0-147.0.2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-147.0.2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-147.0.2.el8_1.ppc64le",
"product": {
"name": "kernel-0:4.18.0-147.0.2.el8_1.ppc64le",
"product_id": "kernel-0:4.18.0-147.0.2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-147.0.2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"product": {
"name": "kernel-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"product_id": "kernel-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-147.0.2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"product": {
"name": "kernel-cross-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"product_id": "kernel-cross-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-147.0.2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-147.0.2.el8_1.ppc64le",
"product": {
"name": "kernel-debug-0:4.18.0-147.0.2.el8_1.ppc64le",
"product_id": "kernel-debug-0:4.18.0-147.0.2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-147.0.2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"product": {
"name": "kernel-debug-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"product_id": "kernel-debug-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-147.0.2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"product": {
"name": "kernel-debug-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"product_id": "kernel-debug-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-147.0.2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"product": {
"name": "kernel-debug-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"product_id": "kernel-debug-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-147.0.2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"product_id": "kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-147.0.2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"product": {
"name": "kernel-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"product_id": "kernel-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-147.0.2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"product": {
"name": "kernel-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"product_id": "kernel-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-147.0.2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"product": {
"name": "kernel-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"product_id": "kernel-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-147.0.2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"product": {
"name": "kernel-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"product_id": "kernel-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-147.0.2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-147.0.2.el8_1.ppc64le",
"product": {
"name": "kernel-tools-0:4.18.0-147.0.2.el8_1.ppc64le",
"product_id": "kernel-tools-0:4.18.0-147.0.2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-147.0.2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-147.0.2.el8_1.ppc64le",
"product": {
"name": "kernel-tools-libs-0:4.18.0-147.0.2.el8_1.ppc64le",
"product_id": "kernel-tools-libs-0:4.18.0-147.0.2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-147.0.2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"product": {
"name": "perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"product_id": "perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-147.0.2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"product": {
"name": "python3-perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"product_id": "python3-perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-147.0.2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"product_id": "bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-147.0.2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"product_id": "kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-147.0.2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"product": {
"name": "kernel-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"product_id": "kernel-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-147.0.2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.0.2.el8_1.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.0.2.el8_1.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.0.2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.18.0-147.0.2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"product_id": "kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-147.0.2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"product": {
"name": "perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"product_id": "perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-147.0.2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"product_id": "python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-147.0.2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"product_id": "kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-147.0.2.el8_1?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-147.0.2.el8_1.x86_64",
"product": {
"name": "bpftool-0:4.18.0-147.0.2.el8_1.x86_64",
"product_id": "bpftool-0:4.18.0-147.0.2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-147.0.2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-147.0.2.el8_1.x86_64",
"product": {
"name": "kernel-0:4.18.0-147.0.2.el8_1.x86_64",
"product_id": "kernel-0:4.18.0-147.0.2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-147.0.2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-147.0.2.el8_1.x86_64",
"product": {
"name": "kernel-core-0:4.18.0-147.0.2.el8_1.x86_64",
"product_id": "kernel-core-0:4.18.0-147.0.2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-147.0.2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"product_id": "kernel-cross-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-147.0.2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-147.0.2.el8_1.x86_64",
"product": {
"name": "kernel-debug-0:4.18.0-147.0.2.el8_1.x86_64",
"product_id": "kernel-debug-0:4.18.0-147.0.2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-147.0.2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-147.0.2.el8_1.x86_64",
"product": {
"name": "kernel-debug-core-0:4.18.0-147.0.2.el8_1.x86_64",
"product_id": "kernel-debug-core-0:4.18.0-147.0.2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-147.0.2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"product_id": "kernel-debug-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-147.0.2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"product_id": "kernel-debug-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-147.0.2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-147.0.2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"product": {
"name": "kernel-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"product_id": "kernel-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-147.0.2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"product": {
"name": "kernel-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"product_id": "kernel-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-147.0.2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"product": {
"name": "kernel-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"product_id": "kernel-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-147.0.2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"product_id": "kernel-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-147.0.2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-147.0.2.el8_1.x86_64",
"product": {
"name": "kernel-tools-0:4.18.0-147.0.2.el8_1.x86_64",
"product_id": "kernel-tools-0:4.18.0-147.0.2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-147.0.2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-147.0.2.el8_1.x86_64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-147.0.2.el8_1.x86_64",
"product_id": "kernel-tools-libs-0:4.18.0-147.0.2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-147.0.2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-147.0.2.el8_1.x86_64",
"product": {
"name": "perf-0:4.18.0-147.0.2.el8_1.x86_64",
"product_id": "perf-0:4.18.0-147.0.2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-147.0.2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-147.0.2.el8_1.x86_64",
"product": {
"name": "python3-perf-0:4.18.0-147.0.2.el8_1.x86_64",
"product_id": "python3-perf-0:4.18.0-147.0.2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-147.0.2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"product_id": "bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-147.0.2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-147.0.2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"product_id": "kernel-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-147.0.2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-147.0.2.el8_1.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-147.0.2.el8_1.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:4.18.0-147.0.2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@4.18.0-147.0.2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-147.0.2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"product": {
"name": "perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"product_id": "perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-147.0.2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"product_id": "python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-147.0.2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-147.0.2.el8_1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:4.18.0-147.0.2.el8_1.src",
"product": {
"name": "kernel-0:4.18.0-147.0.2.el8_1.src",
"product_id": "kernel-0:4.18.0-147.0.2.el8_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-147.0.2.el8_1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:4.18.0-147.0.2.el8_1.noarch",
"product": {
"name": "kernel-abi-whitelists-0:4.18.0-147.0.2.el8_1.noarch",
"product_id": "kernel-abi-whitelists-0:4.18.0-147.0.2.el8_1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@4.18.0-147.0.2.el8_1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:4.18.0-147.0.2.el8_1.noarch",
"product": {
"name": "kernel-doc-0:4.18.0-147.0.2.el8_1.noarch",
"product_id": "kernel-doc-0:4.18.0-147.0.2.el8_1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@4.18.0-147.0.2.el8_1?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-147.0.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.aarch64"
},
"product_reference": "bpftool-0:4.18.0-147.0.2.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-147.0.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-147.0.2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "bpftool-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-147.0.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.x86_64"
},
"product_reference": "bpftool-0:4.18.0-147.0.2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-147.0.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.aarch64"
},
"product_reference": "kernel-0:4.18.0-147.0.2.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-147.0.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.ppc64le"
},
"product_reference": "kernel-0:4.18.0-147.0.2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "kernel-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-147.0.2.el8_1.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.src"
},
"product_reference": "kernel-0:4.18.0-147.0.2.el8_1.src",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-147.0.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.x86_64"
},
"product_reference": "kernel-0:4.18.0-147.0.2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:4.18.0-147.0.2.el8_1.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-147.0.2.el8_1.noarch"
},
"product_reference": "kernel-abi-whitelists-0:4.18.0-147.0.2.el8_1.noarch",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-147.0.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-147.0.2.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-147.0.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "kernel-core-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-147.0.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-147.0.2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-147.0.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-147.0.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-147.0.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-147.0.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-147.0.2.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-147.0.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-147.0.2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-147.0.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-147.0.2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-147.0.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-147.0.2.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-147.0.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-147.0.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-147.0.2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-147.0.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-147.0.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-147.0.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-147.0.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-147.0.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-147.0.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-147.0.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.0.2.el8_1.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-147.0.2.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.0.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.0.2.el8_1.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.0.2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-147.0.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.0.2.el8_1.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-147.0.2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-147.0.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-147.0.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-147.0.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-147.0.2.el8_1.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-147.0.2.el8_1.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-147.0.2.el8_1.noarch",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-147.0.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-147.0.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-147.0.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-147.0.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-147.0.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-147.0.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-147.0.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-147.0.2.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-147.0.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-147.0.2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-147.0.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-147.0.2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-147.0.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-147.0.2.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-147.0.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-147.0.2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-147.0.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-147.0.2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-147.0.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.aarch64"
},
"product_reference": "perf-0:4.18.0-147.0.2.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-147.0.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.ppc64le"
},
"product_reference": "perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "perf-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-147.0.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.x86_64"
},
"product_reference": "perf-0:4.18.0-147.0.2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-147.0.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-147.0.2.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-147.0.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "python3-perf-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-147.0.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-147.0.2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-147.0.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.aarch64"
},
"product_reference": "bpftool-0:4.18.0-147.0.2.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-147.0.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-147.0.2.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "bpftool-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-147.0.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.x86_64"
},
"product_reference": "bpftool-0:4.18.0-147.0.2.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-147.0.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.aarch64"
},
"product_reference": "kernel-0:4.18.0-147.0.2.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-147.0.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.ppc64le"
},
"product_reference": "kernel-0:4.18.0-147.0.2.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "kernel-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-147.0.2.el8_1.src as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.src"
},
"product_reference": "kernel-0:4.18.0-147.0.2.el8_1.src",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-147.0.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.x86_64"
},
"product_reference": "kernel-0:4.18.0-147.0.2.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:4.18.0-147.0.2.el8_1.noarch as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-147.0.2.el8_1.noarch"
},
"product_reference": "kernel-abi-whitelists-0:4.18.0-147.0.2.el8_1.noarch",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-147.0.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-147.0.2.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-147.0.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "kernel-core-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-147.0.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-147.0.2.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-147.0.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-147.0.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-147.0.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-147.0.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-147.0.2.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-147.0.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-147.0.2.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-147.0.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-147.0.2.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-147.0.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-147.0.2.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-147.0.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-147.0.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-147.0.2.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-147.0.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-147.0.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-147.0.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-147.0.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-147.0.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-147.0.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-147.0.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.0.2.el8_1.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-147.0.2.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.0.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.0.2.el8_1.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.0.2.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-147.0.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.0.2.el8_1.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-147.0.2.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-147.0.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-147.0.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-147.0.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-147.0.2.el8_1.noarch as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-147.0.2.el8_1.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-147.0.2.el8_1.noarch",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-147.0.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-147.0.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-147.0.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-147.0.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-147.0.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-147.0.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-147.0.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-147.0.2.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-147.0.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-147.0.2.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-147.0.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-147.0.2.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-147.0.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-147.0.2.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-147.0.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-147.0.2.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-147.0.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-147.0.2.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-147.0.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.aarch64"
},
"product_reference": "perf-0:4.18.0-147.0.2.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-147.0.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.ppc64le"
},
"product_reference": "perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "perf-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-147.0.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.x86_64"
},
"product_reference": "perf-0:4.18.0-147.0.2.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-147.0.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-147.0.2.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-147.0.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "python3-perf-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-147.0.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-147.0.2.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Intel"
]
},
{
"names": [
"Deepak Gupta"
],
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2018-12207",
"cwe": {
"id": "CWE-226",
"name": "Sensitive Information in Resource Not Removed Before Reuse"
},
"discovery_date": "2018-11-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1646768"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way Intel CPUs handle inconsistency between, virtual to physical memory address translations in CPU\u0027s local cache and system software\u0027s Paging structure entries. A privileged guest user may use this flaw to induce a hardware Machine Check Error on the host processor, resulting in a severe DoS scenario by halting the processor.\r\n\r\nSystem software like OS OR Virtual Machine Monitor (VMM) use virtual memory system for storing program instructions and data in memory. Virtual Memory system uses Paging structures like Page Tables and Page Directories to manage system memory. The processor\u0027s Memory Management Unit (MMU) uses Paging structure entries to translate program\u0027s virtual memory addresses to physical memory addresses. The processor stores these address translations into its local cache buffer called - Translation Lookaside Buffer (TLB). TLB has two parts, one for instructions and other for data addresses.\r\n\r\nSystem software can modify its Paging structure entries to change address mappings OR certain attributes like page size etc. Upon such Paging structure alterations in memory, system software must invalidate the corresponding address translations in the processor\u0027s TLB cache. But before this TLB invalidation takes place, a privileged guest user may trigger an instruction fetch operation, which could use an already cached, but now invalid, virtual to physical address translation from Instruction TLB (ITLB). Thus accessing an invalid physical memory address and resulting in halting the processor due to the Machine Check Error (MCE) on Page Size Change.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: Machine Check Error on Page Size Change (IFU)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.src",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-147.0.2.el8_1.noarch",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-147.0.2.el8_1.noarch",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.src",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-147.0.2.el8_1.noarch",
"CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-147.0.2.el8_1.noarch",
"CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-12207"
},
{
"category": "external",
"summary": "RHBZ#1646768",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646768"
},
{
"category": "external",
"summary": "RHSB-ifu-page-mce",
"url": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-12207",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12207"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-12207",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12207"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-11-12T20:48:43+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.src",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-147.0.2.el8_1.noarch",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-147.0.2.el8_1.noarch",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.src",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-147.0.2.el8_1.noarch",
"CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-147.0.2.el8_1.noarch",
"CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:3832"
},
{
"category": "workaround",
"details": "For mitigation related information, please refer to the Red Hat vulnerability article: https://access.redhat.com/security/vulnerabilities/ifu-page-mce .",
"product_ids": [
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.src",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-147.0.2.el8_1.noarch",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-147.0.2.el8_1.noarch",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.src",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-147.0.2.el8_1.noarch",
"CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-147.0.2.el8_1.noarch",
"CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.src",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-147.0.2.el8_1.noarch",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-147.0.2.el8_1.noarch",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.src",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-147.0.2.el8_1.noarch",
"CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-147.0.2.el8_1.noarch",
"CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: Machine Check Error on Page Size Change (IFU)"
},
{
"acknowledgments": [
{
"names": [
"Intel"
]
}
],
"cve": "CVE-2019-0154",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"discovery_date": "2019-06-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1724393"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Intel graphics hardware (GPU) where a local attacker with the ability to issue an ioctl could trigger a hardware level crash if MMIO registers were read while the graphics card was in a low-power state. This creates a denial of service situation and the GPU and connected displays will remain unusable until a reboot occurs.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: Intel GPU Denial Of Service while accessing MMIO in lower power state",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Intel plans to release BIOS firmware to correct this issue. Red Hat\u0027s kernel update should mitigate this vulnerability. Some older hardware will not have BIOS firmware update and will rely on operating system level protection to prevent access while the device is in low-power states. For more information see https://access.redhat.com/solutions/i915-graphics",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.src",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-147.0.2.el8_1.noarch",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-147.0.2.el8_1.noarch",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.src",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-147.0.2.el8_1.noarch",
"CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-147.0.2.el8_1.noarch",
"CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-0154"
},
{
"category": "external",
"summary": "RHBZ#1724393",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1724393"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-0154",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0154"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-0154",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0154"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/i915-graphics",
"url": "https://access.redhat.com/solutions/i915-graphics"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00260.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00260.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-11-12T20:48:43+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.src",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-147.0.2.el8_1.noarch",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-147.0.2.el8_1.noarch",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.src",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-147.0.2.el8_1.noarch",
"CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-147.0.2.el8_1.noarch",
"CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:3832"
},
{
"category": "workaround",
"details": "Preventing loading of the i915 kernel module will prevent attackers from using this exploit against the system however the power management functionality of the card will be disabled and the system may draw additional power. See this KCS article (https://access.redhat.com/solutions/41278) for instructions on how to disable a kernel module. Graphical displays may also be at low resolution or not work correctly. This mitigation may not be suitable if running graphical tools locally is required.",
"product_ids": [
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.src",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-147.0.2.el8_1.noarch",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-147.0.2.el8_1.noarch",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.src",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-147.0.2.el8_1.noarch",
"CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-147.0.2.el8_1.noarch",
"CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.src",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-147.0.2.el8_1.noarch",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-147.0.2.el8_1.noarch",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.src",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-147.0.2.el8_1.noarch",
"CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-147.0.2.el8_1.noarch",
"CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: Intel GPU Denial Of Service while accessing MMIO in lower power state"
},
{
"acknowledgments": [
{
"names": [
"Intel"
]
}
],
"cve": "CVE-2019-11135",
"cwe": {
"id": "CWE-203",
"name": "Observable Discrepancy"
},
"discovery_date": "2019-09-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1753062"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way Intel CPUs handle speculative execution of instructions when the TSX Asynchronous Abort (TAA) error occurs. A local authenticated attacker with the ability to monitor execution times could infer the TSX memory state by comparing abort execution times. This could allow information disclosure via this observed side-channel for any TSX transaction being executed while an attacker is able to observe abort timing.\r\n\r\nIntel\u0027s Transactional Synchronisation Extensions (TSX) are set of instructions which enable transactional memory support to improve performance of the multi-threaded applications, in the lock-protected critical sections. The CPU executes instructions in the critical-sections as transactions, while ensuring their atomic state. When such transaction execution is unsuccessful, the processor cannot ensure atomic updates to the transaction memory, so the processor rolls back or aborts such transaction execution.\r\n\r\nWhile TSX Asynchronous Abort (TAA) is pending, CPU may continue to read data from architectural buffers and pass it to the dependent speculative operations. This may cause information leakage via speculative side-channel means, which is quite similar to the Microarchitectural Data Sampling (MDS) issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: TSX Transaction Asynchronous Abort (TAA)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "libvirt and qemu-kvm on Red Hat Enterprise Linux 6 are not affected by this vulnerability as they do not support MSR-based CPU features.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.src",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-147.0.2.el8_1.noarch",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-147.0.2.el8_1.noarch",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.src",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-147.0.2.el8_1.noarch",
"CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-147.0.2.el8_1.noarch",
"CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11135"
},
{
"category": "external",
"summary": "RHBZ#1753062",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753062"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11135",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11135"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11135",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11135"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/tsx-asynchronousabort",
"url": "https://access.redhat.com/solutions/tsx-asynchronousabort"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00270.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00270.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-11-12T20:48:43+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.src",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-147.0.2.el8_1.noarch",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-147.0.2.el8_1.noarch",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.src",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-147.0.2.el8_1.noarch",
"CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-147.0.2.el8_1.noarch",
"CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:3832"
},
{
"category": "workaround",
"details": "For mitigation related information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/solutions/tsx-asynchronousabort",
"product_ids": [
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.src",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-147.0.2.el8_1.noarch",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-147.0.2.el8_1.noarch",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.src",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-147.0.2.el8_1.noarch",
"CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-147.0.2.el8_1.noarch",
"CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.src",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-147.0.2.el8_1.noarch",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-147.0.2.el8_1.noarch",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.src",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-147.0.2.el8_1.noarch",
"CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-147.0.2.el8_1.noarch",
"CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: TSX Transaction Asynchronous Abort (TAA)"
}
]
}
rhsa-2020:0028
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kpatch-patch is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.\n\nSecurity Fix(es):\n\n* hw: Machine Check Error on Page Size Change (IFU) (CVE-2018-12207)\n\n* hw: TSX Transaction Asynchronous Abort (TAA) (CVE-2019-11135)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2020:0028",
"url": "https://access.redhat.com/errata/RHSA-2020:0028"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce",
"url": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/tsx-asynchronousabort",
"url": "https://access.redhat.com/solutions/tsx-asynchronousabort"
},
{
"category": "external",
"summary": "1646768",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646768"
},
{
"category": "external",
"summary": "1753062",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753062"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_0028.json"
}
],
"title": "Red Hat Security Advisory: kpatch-patch security update",
"tracking": {
"current_release_date": "2025-10-09T18:16:00+00:00",
"generator": {
"date": "2025-10-09T18:16:00+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2020:0028",
"initial_release_date": "2020-01-06T14:46:13+00:00",
"revision_history": [
{
"date": "2020-01-06T14:46:13+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2020-01-06T14:46:13+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T18:16:00+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_4_1-0:1-4.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_4_1-0:1-4.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_4_1-0:1-4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_4_1@1-4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_4_1-debuginfo-0:1-4.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_4_1-debuginfo-0:1-4.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_4_1-debuginfo-0:1-4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_4_1-debuginfo@1-4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_1_2-0:1-7.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_1_2-0:1-7.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_1_2-0:1-7.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_1_2@1-7.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_1_2-debuginfo-0:1-7.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_1_2-debuginfo-0:1-7.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_1_2-debuginfo-0:1-7.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_1_2-debuginfo@1-7.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_1_1-0:1-8.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_1_1-0:1-8.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_1_1-0:1-8.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_1_1@1-8.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_1_1-debuginfo-0:1-8.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_1_1-debuginfo-0:1-8.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_1_1-debuginfo-0:1-8.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_1_1-debuginfo@1-8.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062-0:1-9.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062-0:1-9.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062-0:1-9.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062@1-9.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062-debuginfo-0:1-9.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062-debuginfo-0:1-9.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062-debuginfo-0:1-9.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062-debuginfo@1-9.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_4_1-0:1-4.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1062_4_1-0:1-4.el7.src",
"product_id": "kpatch-patch-3_10_0-1062_4_1-0:1-4.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_4_1@1-4.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_1_2-0:1-7.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1062_1_2-0:1-7.el7.src",
"product_id": "kpatch-patch-3_10_0-1062_1_2-0:1-7.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_1_2@1-7.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_1_1-0:1-8.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1062_1_1-0:1-8.el7.src",
"product_id": "kpatch-patch-3_10_0-1062_1_1-0:1-8.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_1_1@1-8.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062-0:1-9.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1062-0:1-9.el7.src",
"product_id": "kpatch-patch-3_10_0-1062-0:1-9.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062@1-9.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062-0:1-9.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kpatch-patch-3_10_0-1062-0:1-9.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1062-0:1-9.el7.src",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062-0:1-9.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kpatch-patch-3_10_0-1062-0:1-9.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062-0:1-9.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062-debuginfo-0:1-9.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kpatch-patch-3_10_0-1062-debuginfo-0:1-9.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062-debuginfo-0:1-9.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_1_1-0:1-8.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_1-0:1-8.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1062_1_1-0:1-8.el7.src",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_1_1-0:1-8.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_1-0:1-8.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_1_1-0:1-8.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_1_1-debuginfo-0:1-8.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_1-debuginfo-0:1-8.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_1_1-debuginfo-0:1-8.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_1_2-0:1-7.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_2-0:1-7.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1062_1_2-0:1-7.el7.src",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_1_2-0:1-7.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_2-0:1-7.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_1_2-0:1-7.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_1_2-debuginfo-0:1-7.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_2-debuginfo-0:1-7.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_1_2-debuginfo-0:1-7.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_4_1-0:1-4.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kpatch-patch-3_10_0-1062_4_1-0:1-4.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1062_4_1-0:1-4.el7.src",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_4_1-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kpatch-patch-3_10_0-1062_4_1-0:1-4.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_4_1-0:1-4.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_4_1-debuginfo-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kpatch-patch-3_10_0-1062_4_1-debuginfo-0:1-4.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_4_1-debuginfo-0:1-4.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.Z"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Intel"
]
},
{
"names": [
"Deepak Gupta"
],
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2018-12207",
"cwe": {
"id": "CWE-226",
"name": "Sensitive Information in Resource Not Removed Before Reuse"
},
"discovery_date": "2018-11-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1646768"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way Intel CPUs handle inconsistency between, virtual to physical memory address translations in CPU\u0027s local cache and system software\u0027s Paging structure entries. A privileged guest user may use this flaw to induce a hardware Machine Check Error on the host processor, resulting in a severe DoS scenario by halting the processor.\r\n\r\nSystem software like OS OR Virtual Machine Monitor (VMM) use virtual memory system for storing program instructions and data in memory. Virtual Memory system uses Paging structures like Page Tables and Page Directories to manage system memory. The processor\u0027s Memory Management Unit (MMU) uses Paging structure entries to translate program\u0027s virtual memory addresses to physical memory addresses. The processor stores these address translations into its local cache buffer called - Translation Lookaside Buffer (TLB). TLB has two parts, one for instructions and other for data addresses.\r\n\r\nSystem software can modify its Paging structure entries to change address mappings OR certain attributes like page size etc. Upon such Paging structure alterations in memory, system software must invalidate the corresponding address translations in the processor\u0027s TLB cache. But before this TLB invalidation takes place, a privileged guest user may trigger an instruction fetch operation, which could use an already cached, but now invalid, virtual to physical address translation from Instruction TLB (ITLB). Thus accessing an invalid physical memory address and resulting in halting the processor due to the Machine Check Error (MCE) on Page Size Change.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: Machine Check Error on Page Size Change (IFU)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.7.Z:kpatch-patch-3_10_0-1062-0:1-9.el7.src",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062-0:1-9.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062-debuginfo-0:1-9.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_1-0:1-8.el7.src",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_1-0:1-8.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_1-debuginfo-0:1-8.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_2-0:1-7.el7.src",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_2-0:1-7.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_2-debuginfo-0:1-7.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_4_1-0:1-4.el7.src",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_4_1-0:1-4.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_4_1-debuginfo-0:1-4.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-12207"
},
{
"category": "external",
"summary": "RHBZ#1646768",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646768"
},
{
"category": "external",
"summary": "RHSB-ifu-page-mce",
"url": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-12207",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12207"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-12207",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12207"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-01-06T14:46:13+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-7.7.Z:kpatch-patch-3_10_0-1062-0:1-9.el7.src",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062-0:1-9.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062-debuginfo-0:1-9.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_1-0:1-8.el7.src",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_1-0:1-8.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_1-debuginfo-0:1-8.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_2-0:1-7.el7.src",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_2-0:1-7.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_2-debuginfo-0:1-7.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_4_1-0:1-4.el7.src",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_4_1-0:1-4.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_4_1-debuginfo-0:1-4.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2020:0028"
},
{
"category": "workaround",
"details": "For mitigation related information, please refer to the Red Hat vulnerability article: https://access.redhat.com/security/vulnerabilities/ifu-page-mce .",
"product_ids": [
"7Server-7.7.Z:kpatch-patch-3_10_0-1062-0:1-9.el7.src",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062-0:1-9.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062-debuginfo-0:1-9.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_1-0:1-8.el7.src",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_1-0:1-8.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_1-debuginfo-0:1-8.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_2-0:1-7.el7.src",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_2-0:1-7.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_2-debuginfo-0:1-7.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_4_1-0:1-4.el7.src",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_4_1-0:1-4.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_4_1-debuginfo-0:1-4.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7Server-7.7.Z:kpatch-patch-3_10_0-1062-0:1-9.el7.src",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062-0:1-9.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062-debuginfo-0:1-9.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_1-0:1-8.el7.src",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_1-0:1-8.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_1-debuginfo-0:1-8.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_2-0:1-7.el7.src",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_2-0:1-7.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_2-debuginfo-0:1-7.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_4_1-0:1-4.el7.src",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_4_1-0:1-4.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_4_1-debuginfo-0:1-4.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: Machine Check Error on Page Size Change (IFU)"
},
{
"acknowledgments": [
{
"names": [
"Intel"
]
}
],
"cve": "CVE-2019-11135",
"cwe": {
"id": "CWE-203",
"name": "Observable Discrepancy"
},
"discovery_date": "2019-09-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1753062"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way Intel CPUs handle speculative execution of instructions when the TSX Asynchronous Abort (TAA) error occurs. A local authenticated attacker with the ability to monitor execution times could infer the TSX memory state by comparing abort execution times. This could allow information disclosure via this observed side-channel for any TSX transaction being executed while an attacker is able to observe abort timing.\r\n\r\nIntel\u0027s Transactional Synchronisation Extensions (TSX) are set of instructions which enable transactional memory support to improve performance of the multi-threaded applications, in the lock-protected critical sections. The CPU executes instructions in the critical-sections as transactions, while ensuring their atomic state. When such transaction execution is unsuccessful, the processor cannot ensure atomic updates to the transaction memory, so the processor rolls back or aborts such transaction execution.\r\n\r\nWhile TSX Asynchronous Abort (TAA) is pending, CPU may continue to read data from architectural buffers and pass it to the dependent speculative operations. This may cause information leakage via speculative side-channel means, which is quite similar to the Microarchitectural Data Sampling (MDS) issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: TSX Transaction Asynchronous Abort (TAA)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "libvirt and qemu-kvm on Red Hat Enterprise Linux 6 are not affected by this vulnerability as they do not support MSR-based CPU features.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.7.Z:kpatch-patch-3_10_0-1062-0:1-9.el7.src",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062-0:1-9.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062-debuginfo-0:1-9.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_1-0:1-8.el7.src",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_1-0:1-8.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_1-debuginfo-0:1-8.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_2-0:1-7.el7.src",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_2-0:1-7.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_2-debuginfo-0:1-7.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_4_1-0:1-4.el7.src",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_4_1-0:1-4.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_4_1-debuginfo-0:1-4.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11135"
},
{
"category": "external",
"summary": "RHBZ#1753062",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753062"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11135",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11135"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11135",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11135"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/tsx-asynchronousabort",
"url": "https://access.redhat.com/solutions/tsx-asynchronousabort"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00270.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00270.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-01-06T14:46:13+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-7.7.Z:kpatch-patch-3_10_0-1062-0:1-9.el7.src",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062-0:1-9.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062-debuginfo-0:1-9.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_1-0:1-8.el7.src",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_1-0:1-8.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_1-debuginfo-0:1-8.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_2-0:1-7.el7.src",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_2-0:1-7.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_2-debuginfo-0:1-7.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_4_1-0:1-4.el7.src",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_4_1-0:1-4.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_4_1-debuginfo-0:1-4.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2020:0028"
},
{
"category": "workaround",
"details": "For mitigation related information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/solutions/tsx-asynchronousabort",
"product_ids": [
"7Server-7.7.Z:kpatch-patch-3_10_0-1062-0:1-9.el7.src",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062-0:1-9.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062-debuginfo-0:1-9.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_1-0:1-8.el7.src",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_1-0:1-8.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_1-debuginfo-0:1-8.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_2-0:1-7.el7.src",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_2-0:1-7.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_2-debuginfo-0:1-7.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_4_1-0:1-4.el7.src",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_4_1-0:1-4.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_4_1-debuginfo-0:1-4.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"7Server-7.7.Z:kpatch-patch-3_10_0-1062-0:1-9.el7.src",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062-0:1-9.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062-debuginfo-0:1-9.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_1-0:1-8.el7.src",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_1-0:1-8.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_1-debuginfo-0:1-8.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_2-0:1-7.el7.src",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_2-0:1-7.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_2-debuginfo-0:1-7.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_4_1-0:1-4.el7.src",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_4_1-0:1-4.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_4_1-debuginfo-0:1-4.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: TSX Transaction Asynchronous Abort (TAA)"
}
]
}
rhsa-2019_3839
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 7.4 Advanced Update Support, Red Hat Enterprise Linux 7.4 Telco Extended Update Support, and Red Hat Enterprise Linux 7.4 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* hw: Machine Check Error on Page Size Change (IFU) (CVE-2018-12207)\n\n* hw: TSX Transaction Asynchronous Abort (TAA) (CVE-2019-11135)\n\n* hw: Intel GPU Denial Of Service while accessing MMIO in lower power state (CVE-2019-0154)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2019:3839",
"url": "https://access.redhat.com/errata/RHSA-2019:3839"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce",
"url": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/tsx-asynchronousabort",
"url": "https://access.redhat.com/solutions/tsx-asynchronousabort"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/i915-graphics",
"url": "https://access.redhat.com/solutions/i915-graphics"
},
{
"category": "external",
"summary": "1646768",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646768"
},
{
"category": "external",
"summary": "1724393",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1724393"
},
{
"category": "external",
"summary": "1753062",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753062"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_3839.json"
}
],
"title": "Red Hat Security Advisory: kernel security update",
"tracking": {
"current_release_date": "2024-11-15T03:17:21+00:00",
"generator": {
"date": "2024-11-15T03:17:21+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2019:3839",
"initial_release_date": "2019-11-12T21:37:14+00:00",
"revision_history": [
{
"date": "2019-11-12T21:37:14+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2019-11-12T21:37:14+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-15T03:17:21+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product": {
"name": "Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.4::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.4::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product": {
"name": "Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:7.4::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:7.4::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server TUS (v. 7.4)",
"product": {
"name": "Red Hat Enterprise Linux Server TUS (v. 7.4)",
"product_id": "7Server-7.4.TUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_tus:7.4::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.4)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.4)",
"product_id": "7Server-optional-7.4.TUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_tus:7.4::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-693.60.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-693.60.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"product_id": "kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-693.60.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-693.60.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-693.60.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"product": {
"name": "perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"product_id": "perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-693.60.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"product_id": "python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-693.60.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-693.60.2.el7.x86_64",
"product": {
"name": "kernel-0:3.10.0-693.60.2.el7.x86_64",
"product_id": "kernel-0:3.10.0-693.60.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-693.60.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"product": {
"name": "kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"product_id": "kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-693.60.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"product_id": "kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-693.60.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"product": {
"name": "kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"product_id": "kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-693.60.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"product": {
"name": "kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"product_id": "kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-693.60.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"product": {
"name": "kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"product_id": "kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-693.60.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"product_id": "kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-693.60.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-693.60.2.el7.x86_64",
"product": {
"name": "perf-0:3.10.0-693.60.2.el7.x86_64",
"product_id": "perf-0:3.10.0-693.60.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-693.60.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-693.60.2.el7.x86_64",
"product": {
"name": "python-perf-0:3.10.0-693.60.2.el7.x86_64",
"product_id": "python-perf-0:3.10.0-693.60.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-693.60.2.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-693.60.2.el7.src",
"product": {
"name": "kernel-0:3.10.0-693.60.2.el7.src",
"product_id": "kernel-0:3.10.0-693.60.2.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-693.60.2.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"product": {
"name": "kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"product_id": "kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-693.60.2.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"product": {
"name": "kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"product_id": "kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@3.10.0-693.60.2.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-693.60.2.el7.ppc64le",
"product": {
"name": "kernel-debug-devel-0:3.10.0-693.60.2.el7.ppc64le",
"product_id": "kernel-debug-devel-0:3.10.0-693.60.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-693.60.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.ppc64le",
"product_id": "kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-693.60.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"product_id": "kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-693.60.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"product_id": "kernel-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-693.60.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.60.2.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.60.2.el7.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.60.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@3.10.0-693.60.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"product_id": "kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-693.60.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"product": {
"name": "perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"product_id": "perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-693.60.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"product_id": "python-perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-693.60.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-693.60.2.el7.ppc64le",
"product": {
"name": "kernel-0:3.10.0-693.60.2.el7.ppc64le",
"product_id": "kernel-0:3.10.0-693.60.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-693.60.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:3.10.0-693.60.2.el7.ppc64le",
"product": {
"name": "kernel-bootwrapper-0:3.10.0-693.60.2.el7.ppc64le",
"product_id": "kernel-bootwrapper-0:3.10.0-693.60.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-693.60.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-693.60.2.el7.ppc64le",
"product": {
"name": "kernel-debug-0:3.10.0-693.60.2.el7.ppc64le",
"product_id": "kernel-debug-0:3.10.0-693.60.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-693.60.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-693.60.2.el7.ppc64le",
"product": {
"name": "kernel-devel-0:3.10.0-693.60.2.el7.ppc64le",
"product_id": "kernel-devel-0:3.10.0-693.60.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-693.60.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-693.60.2.el7.ppc64le",
"product": {
"name": "kernel-headers-0:3.10.0-693.60.2.el7.ppc64le",
"product_id": "kernel-headers-0:3.10.0-693.60.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-693.60.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-693.60.2.el7.ppc64le",
"product": {
"name": "kernel-tools-0:3.10.0-693.60.2.el7.ppc64le",
"product_id": "kernel-tools-0:3.10.0-693.60.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-693.60.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-693.60.2.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-0:3.10.0-693.60.2.el7.ppc64le",
"product_id": "kernel-tools-libs-0:3.10.0-693.60.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-693.60.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-693.60.2.el7.ppc64le",
"product": {
"name": "perf-0:3.10.0-693.60.2.el7.ppc64le",
"product_id": "perf-0:3.10.0-693.60.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-693.60.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-693.60.2.el7.ppc64le",
"product": {
"name": "python-perf-0:3.10.0-693.60.2.el7.ppc64le",
"product_id": "python-perf-0:3.10.0-693.60.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-693.60.2.el7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.60.2.el7.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-693.60.2.el7.src",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-693.60.2.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:perf-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:python-perf-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.4)",
"product_id": "7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.60.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-693.60.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.60.2.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-693.60.2.el7.src",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-693.60.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.60.2.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-693.60.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.60.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-693.60.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.60.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.60.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.60.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.60.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.60.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.60.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.60.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-693.60.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-693.60.2.el7.noarch as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-doc-0:3.10.0-693.60.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.60.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-693.60.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.60.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-693.60.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.60.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.60.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.60.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:perf-0:3.10.0-693.60.2.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-693.60.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:perf-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.60.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-693.60.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.4)",
"product_id": "7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.60.2.el7.src as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)",
"product_id": "7Server-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-693.60.2.el7.src",
"relates_to_product_reference": "7Server-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)",
"product_id": "7Server-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)",
"product_id": "7Server-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"relates_to_product_reference": "7Server-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)",
"product_id": "7Server-7.4.TUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)",
"product_id": "7Server-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)",
"product_id": "7Server-7.4.TUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)",
"product_id": "7Server-7.4.TUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)",
"product_id": "7Server-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)",
"product_id": "7Server-7.4.TUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-693.60.2.el7.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)",
"product_id": "7Server-7.4.TUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"relates_to_product_reference": "7Server-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)",
"product_id": "7Server-7.4.TUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)",
"product_id": "7Server-7.4.TUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)",
"product_id": "7Server-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)",
"product_id": "7Server-7.4.TUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)",
"product_id": "7Server-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)",
"product_id": "7Server-7.4.TUS:perf-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)",
"product_id": "7Server-7.4.TUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)",
"product_id": "7Server-7.4.TUS:python-perf-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.4)",
"product_id": "7Server-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.60.2.el7.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-693.60.2.el7.src",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-693.60.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:perf-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.4)",
"product_id": "7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.60.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-693.60.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.60.2.el7.src as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-693.60.2.el7.src",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-693.60.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.60.2.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-693.60.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.60.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-693.60.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.60.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.60.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.60.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.60.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.60.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.60.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.60.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-693.60.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-693.60.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-doc-0:3.10.0-693.60.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.60.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-693.60.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.60.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-693.60.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.60.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.60.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.60.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:perf-0:3.10.0-693.60.2.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-693.60.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:perf-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.60.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-693.60.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.4)",
"product_id": "7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.60.2.el7.src as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)",
"product_id": "7Server-optional-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-693.60.2.el7.src",
"relates_to_product_reference": "7Server-optional-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)",
"product_id": "7Server-optional-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)",
"product_id": "7Server-optional-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)",
"product_id": "7Server-optional-7.4.TUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)",
"product_id": "7Server-optional-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)",
"product_id": "7Server-optional-7.4.TUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)",
"product_id": "7Server-optional-7.4.TUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)",
"product_id": "7Server-optional-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)",
"product_id": "7Server-optional-7.4.TUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-693.60.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)",
"product_id": "7Server-optional-7.4.TUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)",
"product_id": "7Server-optional-7.4.TUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)",
"product_id": "7Server-optional-7.4.TUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)",
"product_id": "7Server-optional-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)",
"product_id": "7Server-optional-7.4.TUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)",
"product_id": "7Server-optional-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)",
"product_id": "7Server-optional-7.4.TUS:perf-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)",
"product_id": "7Server-optional-7.4.TUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)",
"product_id": "7Server-optional-7.4.TUS:python-perf-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.4)",
"product_id": "7Server-optional-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.4.TUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Intel"
]
},
{
"names": [
"Deepak Gupta"
],
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2018-12207",
"cwe": {
"id": "CWE-226",
"name": "Sensitive Information in Resource Not Removed Before Reuse"
},
"discovery_date": "2018-11-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1646768"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way Intel CPUs handle inconsistency between, virtual to physical memory address translations in CPU\u0027s local cache and system software\u0027s Paging structure entries. A privileged guest user may use this flaw to induce a hardware Machine Check Error on the host processor, resulting in a severe DoS scenario by halting the processor.\r\n\r\nSystem software like OS OR Virtual Machine Monitor (VMM) use virtual memory system for storing program instructions and data in memory. Virtual Memory system uses Paging structures like Page Tables and Page Directories to manage system memory. The processor\u0027s Memory Management Unit (MMU) uses Paging structure entries to translate program\u0027s virtual memory addresses to physical memory addresses. The processor stores these address translations into its local cache buffer called - Translation Lookaside Buffer (TLB). TLB has two parts, one for instructions and other for data addresses.\r\n\r\nSystem software can modify its Paging structure entries to change address mappings OR certain attributes like page size etc. Upon such Paging structure alterations in memory, system software must invalidate the corresponding address translations in the processor\u0027s TLB cache. But before this TLB invalidation takes place, a privileged guest user may trigger an instruction fetch operation, which could use an already cached, but now invalid, virtual to physical address translation from Instruction TLB (ITLB). Thus accessing an invalid physical memory address and resulting in halting the processor due to the Machine Check Error (MCE) on Page Size Change.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: Machine Check Error on Page Size Change (IFU)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:perf-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.TUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.TUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-12207"
},
{
"category": "external",
"summary": "RHBZ#1646768",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646768"
},
{
"category": "external",
"summary": "RHSB-ifu-page-mce",
"url": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-12207",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12207"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-12207",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12207"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-11-12T21:37:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:perf-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.TUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.TUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:3839"
},
{
"category": "workaround",
"details": "For mitigation related information, please refer to the Red Hat vulnerability article: https://access.redhat.com/security/vulnerabilities/ifu-page-mce .",
"product_ids": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:perf-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.TUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.TUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:perf-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.TUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.TUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: Machine Check Error on Page Size Change (IFU)"
},
{
"acknowledgments": [
{
"names": [
"Intel"
]
}
],
"cve": "CVE-2019-0154",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"discovery_date": "2019-06-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1724393"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Intel graphics hardware (GPU) where a local attacker with the ability to issue an ioctl could trigger a hardware level crash if MMIO registers were read while the graphics card was in a low-power state. This creates a denial of service situation and the GPU and connected displays will remain unusable until a reboot occurs.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: Intel GPU Denial Of Service while accessing MMIO in lower power state",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Intel plans to release BIOS firmware to correct this issue. Red Hat\u0027s kernel update should mitigate this vulnerability. Some older hardware will not have BIOS firmware update and will rely on operating system level protection to prevent access while the device is in low-power states. For more information see https://access.redhat.com/solutions/i915-graphics",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:perf-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.TUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.TUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-0154"
},
{
"category": "external",
"summary": "RHBZ#1724393",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1724393"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-0154",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0154"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-0154",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0154"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/i915-graphics",
"url": "https://access.redhat.com/solutions/i915-graphics"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00260.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00260.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-11-12T21:37:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:perf-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.TUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.TUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:3839"
},
{
"category": "workaround",
"details": "Preventing loading of the i915 kernel module will prevent attackers from using this exploit against the system however the power management functionality of the card will be disabled and the system may draw additional power. See this KCS article (https://access.redhat.com/solutions/41278) for instructions on how to disable a kernel module. Graphical displays may also be at low resolution or not work correctly. This mitigation may not be suitable if running graphical tools locally is required.",
"product_ids": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:perf-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.TUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.TUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:perf-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.TUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.TUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: Intel GPU Denial Of Service while accessing MMIO in lower power state"
},
{
"acknowledgments": [
{
"names": [
"Intel"
]
}
],
"cve": "CVE-2019-11135",
"cwe": {
"id": "CWE-203",
"name": "Observable Discrepancy"
},
"discovery_date": "2019-09-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1753062"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way Intel CPUs handle speculative execution of instructions when the TSX Asynchronous Abort (TAA) error occurs. A local authenticated attacker with the ability to monitor execution times could infer the TSX memory state by comparing abort execution times. This could allow information disclosure via this observed side-channel for any TSX transaction being executed while an attacker is able to observe abort timing.\r\n\r\nIntel\u0027s Transactional Synchronisation Extensions (TSX) are set of instructions which enable transactional memory support to improve performance of the multi-threaded applications, in the lock-protected critical sections. The CPU executes instructions in the critical-sections as transactions, while ensuring their atomic state. When such transaction execution is unsuccessful, the processor cannot ensure atomic updates to the transaction memory, so the processor rolls back or aborts such transaction execution.\r\n\r\nWhile TSX Asynchronous Abort (TAA) is pending, CPU may continue to read data from architectural buffers and pass it to the dependent speculative operations. This may cause information leakage via speculative side-channel means, which is quite similar to the Microarchitectural Data Sampling (MDS) issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: TSX Transaction Asynchronous Abort (TAA)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "libvirt and qemu-kvm on Red Hat Enterprise Linux 6 are not affected by this vulnerability as they do not support MSR-based CPU features.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:perf-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.TUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.TUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11135"
},
{
"category": "external",
"summary": "RHBZ#1753062",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753062"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11135",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11135"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11135",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11135"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/tsx-asynchronousabort",
"url": "https://access.redhat.com/solutions/tsx-asynchronousabort"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00270.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00270.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-11-12T21:37:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:perf-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.TUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.TUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:3839"
},
{
"category": "workaround",
"details": "For mitigation related information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/solutions/tsx-asynchronousabort",
"product_ids": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:perf-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.TUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.TUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"7Server-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.AUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.AUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:perf-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.TUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-7.4.TUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-optional-7.4.AUS:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.AUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.AUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-optional-7.4.E4S:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-bootwrapper-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.ppc64le",
"7Server-optional-7.4.E4S:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.src",
"7Server-optional-7.4.TUS:kernel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-abi-whitelists-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-debug-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debug-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-doc-0:3.10.0-693.60.2.el7.noarch",
"7Server-optional-7.4.TUS:kernel-headers-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:kernel-tools-libs-devel-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-0:3.10.0-693.60.2.el7.x86_64",
"7Server-optional-7.4.TUS:python-perf-debuginfo-0:3.10.0-693.60.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: TSX Transaction Asynchronous Abort (TAA)"
}
]
}
RHSA-2019:3840
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 7.3 Advanced Update Support, Red Hat Enterprise Linux 7.3 Telco Extended Update Support, and Red Hat Enterprise Linux 7.3 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* hw: Machine Check Error on Page Size Change (IFU) (CVE-2018-12207)\n\n* hw: TSX Transaction Asynchronous Abort (TAA) (CVE-2019-11135)\n\n* hw: Intel GPU Denial Of Service while accessing MMIO in lower power state (CVE-2019-0154)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2019:3840",
"url": "https://access.redhat.com/errata/RHSA-2019:3840"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce",
"url": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/tsx-asynchronousabort",
"url": "https://access.redhat.com/solutions/tsx-asynchronousabort"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/i915-graphics",
"url": "https://access.redhat.com/solutions/i915-graphics"
},
{
"category": "external",
"summary": "1646768",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646768"
},
{
"category": "external",
"summary": "1724393",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1724393"
},
{
"category": "external",
"summary": "1753062",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753062"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_3840.json"
}
],
"title": "Red Hat Security Advisory: kernel security update",
"tracking": {
"current_release_date": "2025-10-09T18:15:55+00:00",
"generator": {
"date": "2025-10-09T18:15:55+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2019:3840",
"initial_release_date": "2019-11-12T21:22:53+00:00",
"revision_history": [
{
"date": "2019-11-12T21:22:53+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2019-11-12T21:22:54+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T18:15:55+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product": {
"name": "Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.3::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.3::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product": {
"name": "Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:7.3::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:7.3::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server TUS (v. 7.3)",
"product": {
"name": "Red Hat Enterprise Linux Server TUS (v. 7.3)",
"product_id": "7Server-7.3.TUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_tus:7.3::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.3)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.3)",
"product_id": "7Server-optional-7.3.TUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_tus:7.3::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-514.70.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-514.70.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"product_id": "kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-514.70.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-514.70.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-514.70.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"product": {
"name": "perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"product_id": "perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-514.70.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"product_id": "python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-514.70.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-514.70.2.el7.x86_64",
"product": {
"name": "kernel-0:3.10.0-514.70.2.el7.x86_64",
"product_id": "kernel-0:3.10.0-514.70.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-514.70.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"product": {
"name": "kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"product_id": "kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-514.70.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"product_id": "kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-514.70.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"product": {
"name": "kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"product_id": "kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-514.70.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"product": {
"name": "kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"product_id": "kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-514.70.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"product": {
"name": "kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"product_id": "kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-514.70.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"product_id": "kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-514.70.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-514.70.2.el7.x86_64",
"product": {
"name": "perf-0:3.10.0-514.70.2.el7.x86_64",
"product_id": "perf-0:3.10.0-514.70.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-514.70.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-514.70.2.el7.x86_64",
"product": {
"name": "python-perf-0:3.10.0-514.70.2.el7.x86_64",
"product_id": "python-perf-0:3.10.0-514.70.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-514.70.2.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-514.70.2.el7.src",
"product": {
"name": "kernel-0:3.10.0-514.70.2.el7.src",
"product_id": "kernel-0:3.10.0-514.70.2.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-514.70.2.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"product": {
"name": "kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"product_id": "kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-514.70.2.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"product": {
"name": "kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"product_id": "kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@3.10.0-514.70.2.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-514.70.2.el7.ppc64le",
"product": {
"name": "kernel-debug-devel-0:3.10.0-514.70.2.el7.ppc64le",
"product_id": "kernel-debug-devel-0:3.10.0-514.70.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-514.70.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.ppc64le",
"product_id": "kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-514.70.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"product_id": "kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-514.70.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"product_id": "kernel-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-514.70.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.70.2.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.70.2.el7.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.70.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@3.10.0-514.70.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"product_id": "kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-514.70.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"product": {
"name": "perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"product_id": "perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-514.70.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"product_id": "python-perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-514.70.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-514.70.2.el7.ppc64le",
"product": {
"name": "kernel-0:3.10.0-514.70.2.el7.ppc64le",
"product_id": "kernel-0:3.10.0-514.70.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-514.70.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:3.10.0-514.70.2.el7.ppc64le",
"product": {
"name": "kernel-bootwrapper-0:3.10.0-514.70.2.el7.ppc64le",
"product_id": "kernel-bootwrapper-0:3.10.0-514.70.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-514.70.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-514.70.2.el7.ppc64le",
"product": {
"name": "kernel-debug-0:3.10.0-514.70.2.el7.ppc64le",
"product_id": "kernel-debug-0:3.10.0-514.70.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-514.70.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-514.70.2.el7.ppc64le",
"product": {
"name": "kernel-devel-0:3.10.0-514.70.2.el7.ppc64le",
"product_id": "kernel-devel-0:3.10.0-514.70.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-514.70.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-514.70.2.el7.ppc64le",
"product": {
"name": "kernel-headers-0:3.10.0-514.70.2.el7.ppc64le",
"product_id": "kernel-headers-0:3.10.0-514.70.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-514.70.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-514.70.2.el7.ppc64le",
"product": {
"name": "kernel-tools-0:3.10.0-514.70.2.el7.ppc64le",
"product_id": "kernel-tools-0:3.10.0-514.70.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-514.70.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-514.70.2.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-0:3.10.0-514.70.2.el7.ppc64le",
"product_id": "kernel-tools-libs-0:3.10.0-514.70.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-514.70.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-514.70.2.el7.ppc64le",
"product": {
"name": "perf-0:3.10.0-514.70.2.el7.ppc64le",
"product_id": "perf-0:3.10.0-514.70.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-514.70.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-514.70.2.el7.ppc64le",
"product": {
"name": "python-perf-0:3.10.0-514.70.2.el7.ppc64le",
"product_id": "python-perf-0:3.10.0-514.70.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-514.70.2.el7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.70.2.el7.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-514.70.2.el7.src",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-514.70.2.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:perf-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:python-perf-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.70.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-514.70.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.70.2.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-514.70.2.el7.src",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-514.70.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.70.2.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-514.70.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-514.70.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-514.70.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-514.70.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-514.70.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-514.70.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.70.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.70.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.70.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-514.70.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-514.70.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-514.70.2.el7.noarch as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-doc-0:3.10.0-514.70.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-514.70.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-514.70.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-514.70.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-514.70.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-514.70.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-514.70.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-514.70.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:perf-0:3.10.0-514.70.2.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-514.70.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:perf-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-514.70.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-514.70.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.70.2.el7.src as a component of Red Hat Enterprise Linux Server TUS (v. 7.3)",
"product_id": "7Server-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-514.70.2.el7.src",
"relates_to_product_reference": "7Server-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.3)",
"product_id": "7Server-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 7.3)",
"product_id": "7Server-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"relates_to_product_reference": "7Server-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.3)",
"product_id": "7Server-7.3.TUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.3)",
"product_id": "7Server-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.3)",
"product_id": "7Server-7.3.TUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.3)",
"product_id": "7Server-7.3.TUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.3)",
"product_id": "7Server-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.3)",
"product_id": "7Server-7.3.TUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-514.70.2.el7.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 7.3)",
"product_id": "7Server-7.3.TUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"relates_to_product_reference": "7Server-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.3)",
"product_id": "7Server-7.3.TUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.3)",
"product_id": "7Server-7.3.TUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.3)",
"product_id": "7Server-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.3)",
"product_id": "7Server-7.3.TUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.3)",
"product_id": "7Server-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.3)",
"product_id": "7Server-7.3.TUS:perf-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.3)",
"product_id": "7Server-7.3.TUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.3)",
"product_id": "7Server-7.3.TUS:python-perf-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.3)",
"product_id": "7Server-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.70.2.el7.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-514.70.2.el7.src",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-514.70.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:perf-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.70.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-514.70.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.70.2.el7.src as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-514.70.2.el7.src",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-514.70.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.70.2.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-514.70.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-514.70.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-514.70.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-514.70.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-514.70.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-514.70.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.70.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.70.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.70.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-514.70.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-514.70.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-514.70.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-doc-0:3.10.0-514.70.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-514.70.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-514.70.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-514.70.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-514.70.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-514.70.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-514.70.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-514.70.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:perf-0:3.10.0-514.70.2.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-514.70.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:perf-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-514.70.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-514.70.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.70.2.el7.src as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.3)",
"product_id": "7Server-optional-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-514.70.2.el7.src",
"relates_to_product_reference": "7Server-optional-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.3)",
"product_id": "7Server-optional-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.3)",
"product_id": "7Server-optional-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.3)",
"product_id": "7Server-optional-7.3.TUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.3)",
"product_id": "7Server-optional-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.3)",
"product_id": "7Server-optional-7.3.TUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.3)",
"product_id": "7Server-optional-7.3.TUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.3)",
"product_id": "7Server-optional-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.3)",
"product_id": "7Server-optional-7.3.TUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-514.70.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.3)",
"product_id": "7Server-optional-7.3.TUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.3)",
"product_id": "7Server-optional-7.3.TUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.3)",
"product_id": "7Server-optional-7.3.TUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.3)",
"product_id": "7Server-optional-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.3)",
"product_id": "7Server-optional-7.3.TUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.3)",
"product_id": "7Server-optional-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.3)",
"product_id": "7Server-optional-7.3.TUS:perf-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.3)",
"product_id": "7Server-optional-7.3.TUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.3)",
"product_id": "7Server-optional-7.3.TUS:python-perf-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.3)",
"product_id": "7Server-optional-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.TUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Intel"
]
},
{
"names": [
"Deepak Gupta"
],
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2018-12207",
"cwe": {
"id": "CWE-226",
"name": "Sensitive Information in Resource Not Removed Before Reuse"
},
"discovery_date": "2018-11-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1646768"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way Intel CPUs handle inconsistency between, virtual to physical memory address translations in CPU\u0027s local cache and system software\u0027s Paging structure entries. A privileged guest user may use this flaw to induce a hardware Machine Check Error on the host processor, resulting in a severe DoS scenario by halting the processor.\r\n\r\nSystem software like OS OR Virtual Machine Monitor (VMM) use virtual memory system for storing program instructions and data in memory. Virtual Memory system uses Paging structures like Page Tables and Page Directories to manage system memory. The processor\u0027s Memory Management Unit (MMU) uses Paging structure entries to translate program\u0027s virtual memory addresses to physical memory addresses. The processor stores these address translations into its local cache buffer called - Translation Lookaside Buffer (TLB). TLB has two parts, one for instructions and other for data addresses.\r\n\r\nSystem software can modify its Paging structure entries to change address mappings OR certain attributes like page size etc. Upon such Paging structure alterations in memory, system software must invalidate the corresponding address translations in the processor\u0027s TLB cache. But before this TLB invalidation takes place, a privileged guest user may trigger an instruction fetch operation, which could use an already cached, but now invalid, virtual to physical address translation from Instruction TLB (ITLB). Thus accessing an invalid physical memory address and resulting in halting the processor due to the Machine Check Error (MCE) on Page Size Change.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: Machine Check Error on Page Size Change (IFU)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:perf-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.TUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.TUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:perf-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-optional-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.TUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.TUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-12207"
},
{
"category": "external",
"summary": "RHBZ#1646768",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646768"
},
{
"category": "external",
"summary": "RHSB-ifu-page-mce",
"url": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-12207",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12207"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-12207",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12207"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-11-12T21:22:53+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:perf-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.TUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.TUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:perf-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-optional-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.TUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.TUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:3840"
},
{
"category": "workaround",
"details": "For mitigation related information, please refer to the Red Hat vulnerability article: https://access.redhat.com/security/vulnerabilities/ifu-page-mce .",
"product_ids": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:perf-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.TUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.TUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:perf-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-optional-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.TUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.TUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:perf-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.TUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.TUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:perf-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-optional-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.TUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.TUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: Machine Check Error on Page Size Change (IFU)"
},
{
"acknowledgments": [
{
"names": [
"Intel"
]
}
],
"cve": "CVE-2019-0154",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"discovery_date": "2019-06-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1724393"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Intel graphics hardware (GPU) where a local attacker with the ability to issue an ioctl could trigger a hardware level crash if MMIO registers were read while the graphics card was in a low-power state. This creates a denial of service situation and the GPU and connected displays will remain unusable until a reboot occurs.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: Intel GPU Denial Of Service while accessing MMIO in lower power state",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Intel plans to release BIOS firmware to correct this issue. Red Hat\u0027s kernel update should mitigate this vulnerability. Some older hardware will not have BIOS firmware update and will rely on operating system level protection to prevent access while the device is in low-power states. For more information see https://access.redhat.com/solutions/i915-graphics",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:perf-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.TUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.TUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:perf-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-optional-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.TUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.TUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-0154"
},
{
"category": "external",
"summary": "RHBZ#1724393",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1724393"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-0154",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0154"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-0154",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0154"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/i915-graphics",
"url": "https://access.redhat.com/solutions/i915-graphics"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00260.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00260.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-11-12T21:22:53+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:perf-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.TUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.TUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:perf-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-optional-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.TUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.TUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:3840"
},
{
"category": "workaround",
"details": "Preventing loading of the i915 kernel module will prevent attackers from using this exploit against the system however the power management functionality of the card will be disabled and the system may draw additional power. See this KCS article (https://access.redhat.com/solutions/41278) for instructions on how to disable a kernel module. Graphical displays may also be at low resolution or not work correctly. This mitigation may not be suitable if running graphical tools locally is required.",
"product_ids": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:perf-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.TUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.TUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:perf-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-optional-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.TUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.TUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:perf-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.TUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.TUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:perf-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-optional-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.TUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.TUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: Intel GPU Denial Of Service while accessing MMIO in lower power state"
},
{
"acknowledgments": [
{
"names": [
"Intel"
]
}
],
"cve": "CVE-2019-11135",
"cwe": {
"id": "CWE-203",
"name": "Observable Discrepancy"
},
"discovery_date": "2019-09-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1753062"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way Intel CPUs handle speculative execution of instructions when the TSX Asynchronous Abort (TAA) error occurs. A local authenticated attacker with the ability to monitor execution times could infer the TSX memory state by comparing abort execution times. This could allow information disclosure via this observed side-channel for any TSX transaction being executed while an attacker is able to observe abort timing.\r\n\r\nIntel\u0027s Transactional Synchronisation Extensions (TSX) are set of instructions which enable transactional memory support to improve performance of the multi-threaded applications, in the lock-protected critical sections. The CPU executes instructions in the critical-sections as transactions, while ensuring their atomic state. When such transaction execution is unsuccessful, the processor cannot ensure atomic updates to the transaction memory, so the processor rolls back or aborts such transaction execution.\r\n\r\nWhile TSX Asynchronous Abort (TAA) is pending, CPU may continue to read data from architectural buffers and pass it to the dependent speculative operations. This may cause information leakage via speculative side-channel means, which is quite similar to the Microarchitectural Data Sampling (MDS) issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: TSX Transaction Asynchronous Abort (TAA)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "libvirt and qemu-kvm on Red Hat Enterprise Linux 6 are not affected by this vulnerability as they do not support MSR-based CPU features.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:perf-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.TUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.TUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:perf-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-optional-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.TUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.TUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11135"
},
{
"category": "external",
"summary": "RHBZ#1753062",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753062"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11135",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11135"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11135",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11135"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/tsx-asynchronousabort",
"url": "https://access.redhat.com/solutions/tsx-asynchronousabort"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00270.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00270.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-11-12T21:22:53+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:perf-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.TUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.TUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:perf-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-optional-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.TUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.TUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:3840"
},
{
"category": "workaround",
"details": "For mitigation related information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/solutions/tsx-asynchronousabort",
"product_ids": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:perf-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.TUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.TUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:perf-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-optional-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.TUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.TUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:perf-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.TUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.TUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:perf-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-optional-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.TUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.TUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: TSX Transaction Asynchronous Abort (TAA)"
}
]
}
rhsa-2019:3833
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* hw: Machine Check Error on Page Size Change (IFU) (CVE-2018-12207)\n\n* hw: TSX Transaction Asynchronous Abort (TAA) (CVE-2019-11135)\n\n* hw: Intel GPU Denial Of Service while accessing MMIO in lower power state (CVE-2019-0154)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2019:3833",
"url": "https://access.redhat.com/errata/RHSA-2019:3833"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce",
"url": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/tsx-asynchronousabort",
"url": "https://access.redhat.com/solutions/tsx-asynchronousabort"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/i915-graphics",
"url": "https://access.redhat.com/solutions/i915-graphics"
},
{
"category": "external",
"summary": "1646768",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646768"
},
{
"category": "external",
"summary": "1724393",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1724393"
},
{
"category": "external",
"summary": "1753062",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753062"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_3833.json"
}
],
"title": "Red Hat Security Advisory: kernel-rt security update",
"tracking": {
"current_release_date": "2025-10-09T18:15:53+00:00",
"generator": {
"date": "2025-10-09T18:15:53+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2019:3833",
"initial_release_date": "2019-11-12T20:49:30+00:00",
"revision_history": [
{
"date": "2019-11-12T20:49:30+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2019-11-12T20:49:30+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T18:15:53+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.1.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::nfv"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Real Time (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.1.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::realtime"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"product": {
"name": "kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"product_id": "kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@4.18.0-147.0.2.rt24.94.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"product": {
"name": "kernel-rt-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"product_id": "kernel-rt-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-core@4.18.0-147.0.2.rt24.94.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"product": {
"name": "kernel-rt-debug-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"product_id": "kernel-rt-debug-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug@4.18.0-147.0.2.rt24.94.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"product": {
"name": "kernel-rt-debug-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"product_id": "kernel-rt-debug-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-core@4.18.0-147.0.2.rt24.94.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"product": {
"name": "kernel-rt-debug-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"product_id": "kernel-rt-debug-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-devel@4.18.0-147.0.2.rt24.94.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"product": {
"name": "kernel-rt-debug-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"product_id": "kernel-rt-debug-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@4.18.0-147.0.2.rt24.94.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"product": {
"name": "kernel-rt-debug-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"product_id": "kernel-rt-debug-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules@4.18.0-147.0.2.rt24.94.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"product": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"product_id": "kernel-rt-debug-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules-extra@4.18.0-147.0.2.rt24.94.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"product": {
"name": "kernel-rt-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"product_id": "kernel-rt-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-devel@4.18.0-147.0.2.rt24.94.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"product": {
"name": "kernel-rt-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"product_id": "kernel-rt-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-kvm@4.18.0-147.0.2.rt24.94.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"product": {
"name": "kernel-rt-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"product_id": "kernel-rt-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules@4.18.0-147.0.2.rt24.94.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"product": {
"name": "kernel-rt-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"product_id": "kernel-rt-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules-extra@4.18.0-147.0.2.rt24.94.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"product": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"product_id": "kernel-rt-debug-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@4.18.0-147.0.2.rt24.94.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"product": {
"name": "kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"product_id": "kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-kvm-debuginfo@4.18.0-147.0.2.rt24.94.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"product": {
"name": "kernel-rt-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"product_id": "kernel-rt-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo@4.18.0-147.0.2.rt24.94.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"product": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"product_id": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@4.18.0-147.0.2.rt24.94.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"product": {
"name": "kernel-rt-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"product_id": "kernel-rt-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-kvm-debuginfo@4.18.0-147.0.2.rt24.94.el8_1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.src",
"product": {
"name": "kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.src",
"product_id": "kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@4.18.0-147.0.2.rt24.94.el8_1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.src as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.src"
},
"product_reference": "kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.src",
"relates_to_product_reference": "NFV-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64"
},
"product_reference": "kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"relates_to_product_reference": "NFV-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.1.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64"
},
"product_reference": "kernel-rt-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"relates_to_product_reference": "NFV-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64"
},
"product_reference": "kernel-rt-debug-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"relates_to_product_reference": "NFV-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"relates_to_product_reference": "NFV-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"relates_to_product_reference": "NFV-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"relates_to_product_reference": "NFV-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"relates_to_product_reference": "NFV-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"relates_to_product_reference": "NFV-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"relates_to_product_reference": "NFV-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"relates_to_product_reference": "NFV-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"relates_to_product_reference": "NFV-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"relates_to_product_reference": "NFV-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.1.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64"
},
"product_reference": "kernel-rt-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"relates_to_product_reference": "NFV-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64"
},
"product_reference": "kernel-rt-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"relates_to_product_reference": "NFV-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64"
},
"product_reference": "kernel-rt-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"relates_to_product_reference": "NFV-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.1.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64"
},
"product_reference": "kernel-rt-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"relates_to_product_reference": "NFV-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.1.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"relates_to_product_reference": "NFV-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.src as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.src"
},
"product_reference": "kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.src",
"relates_to_product_reference": "RT-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64"
},
"product_reference": "kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"relates_to_product_reference": "RT-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.1.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64"
},
"product_reference": "kernel-rt-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"relates_to_product_reference": "RT-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64"
},
"product_reference": "kernel-rt-debug-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"relates_to_product_reference": "RT-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"relates_to_product_reference": "RT-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"relates_to_product_reference": "RT-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"relates_to_product_reference": "RT-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"relates_to_product_reference": "RT-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"relates_to_product_reference": "RT-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"relates_to_product_reference": "RT-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"relates_to_product_reference": "RT-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"relates_to_product_reference": "RT-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"relates_to_product_reference": "RT-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.1.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64"
},
"product_reference": "kernel-rt-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"relates_to_product_reference": "RT-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64"
},
"product_reference": "kernel-rt-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"relates_to_product_reference": "RT-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64"
},
"product_reference": "kernel-rt-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"relates_to_product_reference": "RT-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.1.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64"
},
"product_reference": "kernel-rt-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"relates_to_product_reference": "RT-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.1.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"relates_to_product_reference": "RT-8.1.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Intel"
]
},
{
"names": [
"Deepak Gupta"
],
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2018-12207",
"cwe": {
"id": "CWE-226",
"name": "Sensitive Information in Resource Not Removed Before Reuse"
},
"discovery_date": "2018-11-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1646768"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way Intel CPUs handle inconsistency between, virtual to physical memory address translations in CPU\u0027s local cache and system software\u0027s Paging structure entries. A privileged guest user may use this flaw to induce a hardware Machine Check Error on the host processor, resulting in a severe DoS scenario by halting the processor.\r\n\r\nSystem software like OS OR Virtual Machine Monitor (VMM) use virtual memory system for storing program instructions and data in memory. Virtual Memory system uses Paging structures like Page Tables and Page Directories to manage system memory. The processor\u0027s Memory Management Unit (MMU) uses Paging structure entries to translate program\u0027s virtual memory addresses to physical memory addresses. The processor stores these address translations into its local cache buffer called - Translation Lookaside Buffer (TLB). TLB has two parts, one for instructions and other for data addresses.\r\n\r\nSystem software can modify its Paging structure entries to change address mappings OR certain attributes like page size etc. Upon such Paging structure alterations in memory, system software must invalidate the corresponding address translations in the processor\u0027s TLB cache. But before this TLB invalidation takes place, a privileged guest user may trigger an instruction fetch operation, which could use an already cached, but now invalid, virtual to physical address translation from Instruction TLB (ITLB). Thus accessing an invalid physical memory address and resulting in halting the processor due to the Machine Check Error (MCE) on Page Size Change.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: Machine Check Error on Page Size Change (IFU)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.src",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.src",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-12207"
},
{
"category": "external",
"summary": "RHBZ#1646768",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646768"
},
{
"category": "external",
"summary": "RHSB-ifu-page-mce",
"url": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-12207",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12207"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-12207",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12207"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-11-12T20:49:30+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.src",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.src",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:3833"
},
{
"category": "workaround",
"details": "For mitigation related information, please refer to the Red Hat vulnerability article: https://access.redhat.com/security/vulnerabilities/ifu-page-mce .",
"product_ids": [
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.src",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.src",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.src",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.src",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: Machine Check Error on Page Size Change (IFU)"
},
{
"acknowledgments": [
{
"names": [
"Intel"
]
}
],
"cve": "CVE-2019-0154",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"discovery_date": "2019-06-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1724393"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Intel graphics hardware (GPU) where a local attacker with the ability to issue an ioctl could trigger a hardware level crash if MMIO registers were read while the graphics card was in a low-power state. This creates a denial of service situation and the GPU and connected displays will remain unusable until a reboot occurs.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: Intel GPU Denial Of Service while accessing MMIO in lower power state",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Intel plans to release BIOS firmware to correct this issue. Red Hat\u0027s kernel update should mitigate this vulnerability. Some older hardware will not have BIOS firmware update and will rely on operating system level protection to prevent access while the device is in low-power states. For more information see https://access.redhat.com/solutions/i915-graphics",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.src",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.src",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-0154"
},
{
"category": "external",
"summary": "RHBZ#1724393",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1724393"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-0154",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0154"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-0154",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0154"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/i915-graphics",
"url": "https://access.redhat.com/solutions/i915-graphics"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00260.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00260.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-11-12T20:49:30+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.src",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.src",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:3833"
},
{
"category": "workaround",
"details": "Preventing loading of the i915 kernel module will prevent attackers from using this exploit against the system however the power management functionality of the card will be disabled and the system may draw additional power. See this KCS article (https://access.redhat.com/solutions/41278) for instructions on how to disable a kernel module. Graphical displays may also be at low resolution or not work correctly. This mitigation may not be suitable if running graphical tools locally is required.",
"product_ids": [
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.src",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.src",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.src",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.src",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: Intel GPU Denial Of Service while accessing MMIO in lower power state"
},
{
"acknowledgments": [
{
"names": [
"Intel"
]
}
],
"cve": "CVE-2019-11135",
"cwe": {
"id": "CWE-203",
"name": "Observable Discrepancy"
},
"discovery_date": "2019-09-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1753062"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way Intel CPUs handle speculative execution of instructions when the TSX Asynchronous Abort (TAA) error occurs. A local authenticated attacker with the ability to monitor execution times could infer the TSX memory state by comparing abort execution times. This could allow information disclosure via this observed side-channel for any TSX transaction being executed while an attacker is able to observe abort timing.\r\n\r\nIntel\u0027s Transactional Synchronisation Extensions (TSX) are set of instructions which enable transactional memory support to improve performance of the multi-threaded applications, in the lock-protected critical sections. The CPU executes instructions in the critical-sections as transactions, while ensuring their atomic state. When such transaction execution is unsuccessful, the processor cannot ensure atomic updates to the transaction memory, so the processor rolls back or aborts such transaction execution.\r\n\r\nWhile TSX Asynchronous Abort (TAA) is pending, CPU may continue to read data from architectural buffers and pass it to the dependent speculative operations. This may cause information leakage via speculative side-channel means, which is quite similar to the Microarchitectural Data Sampling (MDS) issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: TSX Transaction Asynchronous Abort (TAA)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "libvirt and qemu-kvm on Red Hat Enterprise Linux 6 are not affected by this vulnerability as they do not support MSR-based CPU features.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.src",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.src",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11135"
},
{
"category": "external",
"summary": "RHBZ#1753062",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753062"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11135",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11135"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11135",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11135"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/tsx-asynchronousabort",
"url": "https://access.redhat.com/solutions/tsx-asynchronousabort"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00270.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00270.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-11-12T20:49:30+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.src",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.src",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:3833"
},
{
"category": "workaround",
"details": "For mitigation related information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/solutions/tsx-asynchronousabort",
"product_ids": [
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.src",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.src",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.src",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.src",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: TSX Transaction Asynchronous Abort (TAA)"
}
]
}
rhsa-2019:3841
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 7.2 Advanced Update Support, Red Hat Enterprise Linux 7.2 Telco Extended Update Support, and Red Hat Enterprise Linux 7.2 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* hw: Machine Check Error on Page Size Change (IFU) (CVE-2018-12207)\n\n* hw: TSX Transaction Asynchronous Abort (TAA) (CVE-2019-11135)\n\n* hw: Intel GPU Denial Of Service while accessing MMIO in lower power state (CVE-2019-0154)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2019:3841",
"url": "https://access.redhat.com/errata/RHSA-2019:3841"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce",
"url": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/tsx-asynchronousabort",
"url": "https://access.redhat.com/solutions/tsx-asynchronousabort"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/i915-graphics",
"url": "https://access.redhat.com/solutions/i915-graphics"
},
{
"category": "external",
"summary": "1646768",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646768"
},
{
"category": "external",
"summary": "1724393",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1724393"
},
{
"category": "external",
"summary": "1753062",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753062"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_3841.json"
}
],
"title": "Red Hat Security Advisory: kernel security update",
"tracking": {
"current_release_date": "2025-10-09T18:15:56+00:00",
"generator": {
"date": "2025-10-09T18:15:56+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2019:3841",
"initial_release_date": "2019-11-12T21:02:11+00:00",
"revision_history": [
{
"date": "2019-11-12T21:02:11+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2019-11-12T21:02:11+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T18:15:56+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product": {
"name": "Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.2::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.2::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product": {
"name": "Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:7.2::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:7.2::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product": {
"name": "Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_tus:7.2::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_tus:7.2::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-327.82.2.el7.x86_64",
"product": {
"name": "kernel-0:3.10.0-327.82.2.el7.x86_64",
"product_id": "kernel-0:3.10.0-327.82.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-327.82.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"product": {
"name": "kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"product_id": "kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-327.82.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"product_id": "kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-327.82.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"product": {
"name": "kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"product_id": "kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-327.82.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"product": {
"name": "kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"product_id": "kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-327.82.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"product": {
"name": "kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"product_id": "kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-327.82.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"product_id": "kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-327.82.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-327.82.2.el7.x86_64",
"product": {
"name": "perf-0:3.10.0-327.82.2.el7.x86_64",
"product_id": "perf-0:3.10.0-327.82.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-327.82.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-327.82.2.el7.x86_64",
"product": {
"name": "python-perf-0:3.10.0-327.82.2.el7.x86_64",
"product_id": "python-perf-0:3.10.0-327.82.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-327.82.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-327.82.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"product_id": "kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-327.82.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-327.82.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-327.82.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"product": {
"name": "perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"product_id": "perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-327.82.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"product_id": "python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-327.82.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-327.82.2.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-327.82.2.el7.src",
"product": {
"name": "kernel-0:3.10.0-327.82.2.el7.src",
"product_id": "kernel-0:3.10.0-327.82.2.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-327.82.2.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"product": {
"name": "kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"product_id": "kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-327.82.2.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"product": {
"name": "kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"product_id": "kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@3.10.0-327.82.2.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.82.2.el7.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-327.82.2.el7.src",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-327.82.2.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:perf-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:python-perf-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.82.2.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-327.82.2.el7.src",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:kernel-debug-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:kernel-devel-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-327.82.2.el7.noarch as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:kernel-doc-0:3.10.0-327.82.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:kernel-headers-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:kernel-tools-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:perf-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:python-perf-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.82.2.el7.src as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-327.82.2.el7.src",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-327.82.2.el7.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:perf-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:python-perf-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.82.2.el7.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-327.82.2.el7.src",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-327.82.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:perf-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.82.2.el7.src as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-327.82.2.el7.src",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-327.82.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.82.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:perf-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.82.2.el7.src as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-327.82.2.el7.src",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-327.82.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:perf-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Intel"
]
},
{
"names": [
"Deepak Gupta"
],
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2018-12207",
"cwe": {
"id": "CWE-226",
"name": "Sensitive Information in Resource Not Removed Before Reuse"
},
"discovery_date": "2018-11-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1646768"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way Intel CPUs handle inconsistency between, virtual to physical memory address translations in CPU\u0027s local cache and system software\u0027s Paging structure entries. A privileged guest user may use this flaw to induce a hardware Machine Check Error on the host processor, resulting in a severe DoS scenario by halting the processor.\r\n\r\nSystem software like OS OR Virtual Machine Monitor (VMM) use virtual memory system for storing program instructions and data in memory. Virtual Memory system uses Paging structures like Page Tables and Page Directories to manage system memory. The processor\u0027s Memory Management Unit (MMU) uses Paging structure entries to translate program\u0027s virtual memory addresses to physical memory addresses. The processor stores these address translations into its local cache buffer called - Translation Lookaside Buffer (TLB). TLB has two parts, one for instructions and other for data addresses.\r\n\r\nSystem software can modify its Paging structure entries to change address mappings OR certain attributes like page size etc. Upon such Paging structure alterations in memory, system software must invalidate the corresponding address translations in the processor\u0027s TLB cache. But before this TLB invalidation takes place, a privileged guest user may trigger an instruction fetch operation, which could use an already cached, but now invalid, virtual to physical address translation from Instruction TLB (ITLB). Thus accessing an invalid physical memory address and resulting in halting the processor due to the Machine Check Error (MCE) on Page Size Change.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: Machine Check Error on Page Size Change (IFU)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.E4S:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.E4S:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.TUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.TUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-12207"
},
{
"category": "external",
"summary": "RHBZ#1646768",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646768"
},
{
"category": "external",
"summary": "RHSB-ifu-page-mce",
"url": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-12207",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12207"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-12207",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12207"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-11-12T21:02:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.E4S:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.E4S:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.TUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.TUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:3841"
},
{
"category": "workaround",
"details": "For mitigation related information, please refer to the Red Hat vulnerability article: https://access.redhat.com/security/vulnerabilities/ifu-page-mce .",
"product_ids": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.E4S:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.E4S:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.TUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.TUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.E4S:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.E4S:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.TUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.TUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: Machine Check Error on Page Size Change (IFU)"
},
{
"acknowledgments": [
{
"names": [
"Intel"
]
}
],
"cve": "CVE-2019-0154",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"discovery_date": "2019-06-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1724393"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Intel graphics hardware (GPU) where a local attacker with the ability to issue an ioctl could trigger a hardware level crash if MMIO registers were read while the graphics card was in a low-power state. This creates a denial of service situation and the GPU and connected displays will remain unusable until a reboot occurs.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: Intel GPU Denial Of Service while accessing MMIO in lower power state",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Intel plans to release BIOS firmware to correct this issue. Red Hat\u0027s kernel update should mitigate this vulnerability. Some older hardware will not have BIOS firmware update and will rely on operating system level protection to prevent access while the device is in low-power states. For more information see https://access.redhat.com/solutions/i915-graphics",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.E4S:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.E4S:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.TUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.TUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-0154"
},
{
"category": "external",
"summary": "RHBZ#1724393",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1724393"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-0154",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0154"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-0154",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0154"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/i915-graphics",
"url": "https://access.redhat.com/solutions/i915-graphics"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00260.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00260.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-11-12T21:02:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.E4S:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.E4S:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.TUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.TUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:3841"
},
{
"category": "workaround",
"details": "Preventing loading of the i915 kernel module will prevent attackers from using this exploit against the system however the power management functionality of the card will be disabled and the system may draw additional power. See this KCS article (https://access.redhat.com/solutions/41278) for instructions on how to disable a kernel module. Graphical displays may also be at low resolution or not work correctly. This mitigation may not be suitable if running graphical tools locally is required.",
"product_ids": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.E4S:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.E4S:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.TUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.TUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.E4S:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.E4S:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.TUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.TUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: Intel GPU Denial Of Service while accessing MMIO in lower power state"
},
{
"acknowledgments": [
{
"names": [
"Intel"
]
}
],
"cve": "CVE-2019-0155",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"discovery_date": "2019-06-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1724398"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Intel graphics hardware (GPU), where a local attacker with the ability to issue commands to the GPU could inadvertently lead to memory corruption and possible privilege escalation. The attacker could use the GPU blitter to perform privilege MMIO operations, not limited to the address space required to function correctly.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: Intel GPU blitter manipulation can allow for arbitrary kernel memory write",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/solutions/i915-graphics",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.E4S:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.E4S:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.TUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.TUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-0155"
},
{
"category": "external",
"summary": "RHBZ#1724398",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1724398"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-0155",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0155"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-0155",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0155"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/i915-graphics",
"url": "https://access.redhat.com/solutions/i915-graphics"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00242.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00242.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-11-12T21:02:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.E4S:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.E4S:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.TUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.TUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:3841"
},
{
"category": "workaround",
"details": "Preventing loading of the i915 kernel module will prevent attackers from using this exploit against the system however the power management functionality of the card will be disabled and the system may draw additional power. See this KCS article( https://access.redhat.com/solutions/41278 ) for instructions on how to disable a kernel module. Graphical displays may also be at low resolution or not work correctly. This mitigation may not be suitable if running graphical tools locally is required.",
"product_ids": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.E4S:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.E4S:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.TUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.TUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.E4S:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.E4S:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.TUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.TUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: Intel GPU blitter manipulation can allow for arbitrary kernel memory write"
},
{
"acknowledgments": [
{
"names": [
"Intel"
]
}
],
"cve": "CVE-2019-11135",
"cwe": {
"id": "CWE-203",
"name": "Observable Discrepancy"
},
"discovery_date": "2019-09-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1753062"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way Intel CPUs handle speculative execution of instructions when the TSX Asynchronous Abort (TAA) error occurs. A local authenticated attacker with the ability to monitor execution times could infer the TSX memory state by comparing abort execution times. This could allow information disclosure via this observed side-channel for any TSX transaction being executed while an attacker is able to observe abort timing.\r\n\r\nIntel\u0027s Transactional Synchronisation Extensions (TSX) are set of instructions which enable transactional memory support to improve performance of the multi-threaded applications, in the lock-protected critical sections. The CPU executes instructions in the critical-sections as transactions, while ensuring their atomic state. When such transaction execution is unsuccessful, the processor cannot ensure atomic updates to the transaction memory, so the processor rolls back or aborts such transaction execution.\r\n\r\nWhile TSX Asynchronous Abort (TAA) is pending, CPU may continue to read data from architectural buffers and pass it to the dependent speculative operations. This may cause information leakage via speculative side-channel means, which is quite similar to the Microarchitectural Data Sampling (MDS) issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: TSX Transaction Asynchronous Abort (TAA)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "libvirt and qemu-kvm on Red Hat Enterprise Linux 6 are not affected by this vulnerability as they do not support MSR-based CPU features.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.E4S:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.E4S:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.TUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.TUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11135"
},
{
"category": "external",
"summary": "RHBZ#1753062",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753062"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11135",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11135"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11135",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11135"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/tsx-asynchronousabort",
"url": "https://access.redhat.com/solutions/tsx-asynchronousabort"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00270.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00270.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-11-12T21:02:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.E4S:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.E4S:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.TUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.TUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:3841"
},
{
"category": "workaround",
"details": "For mitigation related information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/solutions/tsx-asynchronousabort",
"product_ids": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.E4S:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.E4S:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.TUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.TUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.E4S:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.E4S:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.TUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.TUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: TSX Transaction Asynchronous Abort (TAA)"
}
]
}
rhsa-2019_3835
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* hw: Machine Check Error on Page Size Change (IFU) (CVE-2018-12207)\n\n* hw: TSX Transaction Asynchronous Abort (TAA) (CVE-2019-11135)\n\n* hw: Intel GPU Denial Of Service while accessing MMIO in lower power state (CVE-2019-0154)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2019:3835",
"url": "https://access.redhat.com/errata/RHSA-2019:3835"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce",
"url": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/tsx-asynchronousabort",
"url": "https://access.redhat.com/solutions/tsx-asynchronousabort"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/i915-graphics",
"url": "https://access.redhat.com/solutions/i915-graphics"
},
{
"category": "external",
"summary": "1646768",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646768"
},
{
"category": "external",
"summary": "1724393",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1724393"
},
{
"category": "external",
"summary": "1753062",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753062"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_3835.json"
}
],
"title": "Red Hat Security Advisory: kernel-rt security update",
"tracking": {
"current_release_date": "2024-11-15T03:16:53+00:00",
"generator": {
"date": "2024-11-15T03:16:53+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2019:3835",
"initial_release_date": "2019-11-12T19:26:53+00:00",
"revision_history": [
{
"date": "2019-11-12T19:26:53+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2019-11-12T19:26:53+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-15T03:16:53+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.7.Z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras_rt:7"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Realtime (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.7.Z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras_rt:7"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"product": {
"name": "kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"product_id": "kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@3.10.0-1062.4.2.rt56.1028.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"product": {
"name": "kernel-rt-debug-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"product_id": "kernel-rt-debug-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug@3.10.0-1062.4.2.rt56.1028.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"product": {
"name": "kernel-rt-debug-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"product_id": "kernel-rt-debug-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-devel@3.10.0-1062.4.2.rt56.1028.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"product": {
"name": "kernel-rt-debug-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"product_id": "kernel-rt-debug-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@3.10.0-1062.4.2.rt56.1028.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"product": {
"name": "kernel-rt-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"product_id": "kernel-rt-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-devel@3.10.0-1062.4.2.rt56.1028.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"product": {
"name": "kernel-rt-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"product_id": "kernel-rt-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-kvm@3.10.0-1062.4.2.rt56.1028.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"product": {
"name": "kernel-rt-trace-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"product_id": "kernel-rt-trace-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace@3.10.0-1062.4.2.rt56.1028.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"product": {
"name": "kernel-rt-trace-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"product_id": "kernel-rt-trace-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace-devel@3.10.0-1062.4.2.rt56.1028.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"product": {
"name": "kernel-rt-trace-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"product_id": "kernel-rt-trace-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace-kvm@3.10.0-1062.4.2.rt56.1028.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"product": {
"name": "kernel-rt-debug-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"product_id": "kernel-rt-debug-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@3.10.0-1062.4.2.rt56.1028.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"product": {
"name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"product_id": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-kvm-debuginfo@3.10.0-1062.4.2.rt56.1028.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"product": {
"name": "kernel-rt-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"product_id": "kernel-rt-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo@3.10.0-1062.4.2.rt56.1028.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"product": {
"name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"product_id": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@3.10.0-1062.4.2.rt56.1028.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"product": {
"name": "kernel-rt-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"product_id": "kernel-rt-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-kvm-debuginfo@3.10.0-1062.4.2.rt56.1028.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"product": {
"name": "kernel-rt-trace-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"product_id": "kernel-rt-trace-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace-debuginfo@3.10.0-1062.4.2.rt56.1028.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"product": {
"name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"product_id": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace-kvm-debuginfo@3.10.0-1062.4.2.rt56.1028.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.src",
"product": {
"name": "kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.src",
"product_id": "kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@3.10.0-1062.4.2.rt56.1028.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-doc-0:3.10.0-1062.4.2.rt56.1028.el7.noarch",
"product": {
"name": "kernel-rt-doc-0:3.10.0-1062.4.2.rt56.1028.el7.noarch",
"product_id": "kernel-rt-doc-0:3.10.0-1062.4.2.rt56.1028.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-doc@3.10.0-1062.4.2.rt56.1028.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.src as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.src"
},
"product_reference": "kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.src",
"relates_to_product_reference": "7Server-NFV-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64"
},
"product_reference": "kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.7.Z:kernel-rt-debug-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64"
},
"product_reference": "kernel-rt-debug-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.7.Z:kernel-rt-debug-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.7.Z:kernel-rt-debug-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.7.Z:kernel-rt-debug-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.7.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.7.Z:kernel-rt-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.7.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.7.Z:kernel-rt-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64"
},
"product_reference": "kernel-rt-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-doc-0:3.10.0-1062.4.2.rt56.1028.el7.noarch as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.7.Z:kernel-rt-doc-0:3.10.0-1062.4.2.rt56.1028.el7.noarch"
},
"product_reference": "kernel-rt-doc-0:3.10.0-1062.4.2.rt56.1028.el7.noarch",
"relates_to_product_reference": "7Server-NFV-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.7.Z:kernel-rt-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64"
},
"product_reference": "kernel-rt-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.7.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64"
},
"product_reference": "kernel-rt-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.7.Z:kernel-rt-trace-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64"
},
"product_reference": "kernel-rt-trace-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.7.Z:kernel-rt-trace-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64"
},
"product_reference": "kernel-rt-trace-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.7.Z:kernel-rt-trace-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64"
},
"product_reference": "kernel-rt-trace-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.7.Z:kernel-rt-trace-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64"
},
"product_reference": "kernel-rt-trace-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.7.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64"
},
"product_reference": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.src as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.src"
},
"product_reference": "kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.src",
"relates_to_product_reference": "7Server-RT-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64"
},
"product_reference": "kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.7.Z:kernel-rt-debug-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64"
},
"product_reference": "kernel-rt-debug-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.7.Z:kernel-rt-debug-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.7.Z:kernel-rt-debug-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.7.Z:kernel-rt-debug-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.7.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.7.Z:kernel-rt-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.7.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.7.Z:kernel-rt-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64"
},
"product_reference": "kernel-rt-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-doc-0:3.10.0-1062.4.2.rt56.1028.el7.noarch as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.7.Z:kernel-rt-doc-0:3.10.0-1062.4.2.rt56.1028.el7.noarch"
},
"product_reference": "kernel-rt-doc-0:3.10.0-1062.4.2.rt56.1028.el7.noarch",
"relates_to_product_reference": "7Server-RT-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.7.Z:kernel-rt-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64"
},
"product_reference": "kernel-rt-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.7.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64"
},
"product_reference": "kernel-rt-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.7.Z:kernel-rt-trace-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64"
},
"product_reference": "kernel-rt-trace-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.7.Z:kernel-rt-trace-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64"
},
"product_reference": "kernel-rt-trace-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.7.Z:kernel-rt-trace-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64"
},
"product_reference": "kernel-rt-trace-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.7.Z:kernel-rt-trace-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64"
},
"product_reference": "kernel-rt-trace-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.7.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64"
},
"product_reference": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.7.Z"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Intel"
]
},
{
"names": [
"Deepak Gupta"
],
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2018-12207",
"cwe": {
"id": "CWE-226",
"name": "Sensitive Information in Resource Not Removed Before Reuse"
},
"discovery_date": "2018-11-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1646768"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way Intel CPUs handle inconsistency between, virtual to physical memory address translations in CPU\u0027s local cache and system software\u0027s Paging structure entries. A privileged guest user may use this flaw to induce a hardware Machine Check Error on the host processor, resulting in a severe DoS scenario by halting the processor.\r\n\r\nSystem software like OS OR Virtual Machine Monitor (VMM) use virtual memory system for storing program instructions and data in memory. Virtual Memory system uses Paging structures like Page Tables and Page Directories to manage system memory. The processor\u0027s Memory Management Unit (MMU) uses Paging structure entries to translate program\u0027s virtual memory addresses to physical memory addresses. The processor stores these address translations into its local cache buffer called - Translation Lookaside Buffer (TLB). TLB has two parts, one for instructions and other for data addresses.\r\n\r\nSystem software can modify its Paging structure entries to change address mappings OR certain attributes like page size etc. Upon such Paging structure alterations in memory, system software must invalidate the corresponding address translations in the processor\u0027s TLB cache. But before this TLB invalidation takes place, a privileged guest user may trigger an instruction fetch operation, which could use an already cached, but now invalid, virtual to physical address translation from Instruction TLB (ITLB). Thus accessing an invalid physical memory address and resulting in halting the processor due to the Machine Check Error (MCE) on Page Size Change.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: Machine Check Error on Page Size Change (IFU)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-NFV-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.src",
"7Server-NFV-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-doc-0:3.10.0-1062.4.2.rt56.1028.el7.noarch",
"7Server-NFV-7.7.Z:kernel-rt-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.src",
"7Server-RT-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-doc-0:3.10.0-1062.4.2.rt56.1028.el7.noarch",
"7Server-RT-7.7.Z:kernel-rt-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-12207"
},
{
"category": "external",
"summary": "RHBZ#1646768",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646768"
},
{
"category": "external",
"summary": "RHSB-ifu-page-mce",
"url": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-12207",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12207"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-12207",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12207"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-11-12T19:26:53+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-NFV-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.src",
"7Server-NFV-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-doc-0:3.10.0-1062.4.2.rt56.1028.el7.noarch",
"7Server-NFV-7.7.Z:kernel-rt-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.src",
"7Server-RT-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-doc-0:3.10.0-1062.4.2.rt56.1028.el7.noarch",
"7Server-RT-7.7.Z:kernel-rt-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:3835"
},
{
"category": "workaround",
"details": "For mitigation related information, please refer to the Red Hat vulnerability article: https://access.redhat.com/security/vulnerabilities/ifu-page-mce .",
"product_ids": [
"7Server-NFV-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.src",
"7Server-NFV-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-doc-0:3.10.0-1062.4.2.rt56.1028.el7.noarch",
"7Server-NFV-7.7.Z:kernel-rt-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.src",
"7Server-RT-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-doc-0:3.10.0-1062.4.2.rt56.1028.el7.noarch",
"7Server-RT-7.7.Z:kernel-rt-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7Server-NFV-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.src",
"7Server-NFV-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-doc-0:3.10.0-1062.4.2.rt56.1028.el7.noarch",
"7Server-NFV-7.7.Z:kernel-rt-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.src",
"7Server-RT-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-doc-0:3.10.0-1062.4.2.rt56.1028.el7.noarch",
"7Server-RT-7.7.Z:kernel-rt-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: Machine Check Error on Page Size Change (IFU)"
},
{
"acknowledgments": [
{
"names": [
"Intel"
]
}
],
"cve": "CVE-2019-0154",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"discovery_date": "2019-06-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1724393"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Intel graphics hardware (GPU) where a local attacker with the ability to issue an ioctl could trigger a hardware level crash if MMIO registers were read while the graphics card was in a low-power state. This creates a denial of service situation and the GPU and connected displays will remain unusable until a reboot occurs.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: Intel GPU Denial Of Service while accessing MMIO in lower power state",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Intel plans to release BIOS firmware to correct this issue. Red Hat\u0027s kernel update should mitigate this vulnerability. Some older hardware will not have BIOS firmware update and will rely on operating system level protection to prevent access while the device is in low-power states. For more information see https://access.redhat.com/solutions/i915-graphics",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-NFV-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.src",
"7Server-NFV-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-doc-0:3.10.0-1062.4.2.rt56.1028.el7.noarch",
"7Server-NFV-7.7.Z:kernel-rt-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.src",
"7Server-RT-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-doc-0:3.10.0-1062.4.2.rt56.1028.el7.noarch",
"7Server-RT-7.7.Z:kernel-rt-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-0154"
},
{
"category": "external",
"summary": "RHBZ#1724393",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1724393"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-0154",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0154"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-0154",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0154"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/i915-graphics",
"url": "https://access.redhat.com/solutions/i915-graphics"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00260.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00260.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-11-12T19:26:53+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-NFV-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.src",
"7Server-NFV-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-doc-0:3.10.0-1062.4.2.rt56.1028.el7.noarch",
"7Server-NFV-7.7.Z:kernel-rt-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.src",
"7Server-RT-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-doc-0:3.10.0-1062.4.2.rt56.1028.el7.noarch",
"7Server-RT-7.7.Z:kernel-rt-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:3835"
},
{
"category": "workaround",
"details": "Preventing loading of the i915 kernel module will prevent attackers from using this exploit against the system however the power management functionality of the card will be disabled and the system may draw additional power. See this KCS article (https://access.redhat.com/solutions/41278) for instructions on how to disable a kernel module. Graphical displays may also be at low resolution or not work correctly. This mitigation may not be suitable if running graphical tools locally is required.",
"product_ids": [
"7Server-NFV-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.src",
"7Server-NFV-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-doc-0:3.10.0-1062.4.2.rt56.1028.el7.noarch",
"7Server-NFV-7.7.Z:kernel-rt-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.src",
"7Server-RT-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-doc-0:3.10.0-1062.4.2.rt56.1028.el7.noarch",
"7Server-RT-7.7.Z:kernel-rt-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7Server-NFV-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.src",
"7Server-NFV-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-doc-0:3.10.0-1062.4.2.rt56.1028.el7.noarch",
"7Server-NFV-7.7.Z:kernel-rt-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.src",
"7Server-RT-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-doc-0:3.10.0-1062.4.2.rt56.1028.el7.noarch",
"7Server-RT-7.7.Z:kernel-rt-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: Intel GPU Denial Of Service while accessing MMIO in lower power state"
},
{
"acknowledgments": [
{
"names": [
"Intel"
]
}
],
"cve": "CVE-2019-11135",
"cwe": {
"id": "CWE-203",
"name": "Observable Discrepancy"
},
"discovery_date": "2019-09-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1753062"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way Intel CPUs handle speculative execution of instructions when the TSX Asynchronous Abort (TAA) error occurs. A local authenticated attacker with the ability to monitor execution times could infer the TSX memory state by comparing abort execution times. This could allow information disclosure via this observed side-channel for any TSX transaction being executed while an attacker is able to observe abort timing.\r\n\r\nIntel\u0027s Transactional Synchronisation Extensions (TSX) are set of instructions which enable transactional memory support to improve performance of the multi-threaded applications, in the lock-protected critical sections. The CPU executes instructions in the critical-sections as transactions, while ensuring their atomic state. When such transaction execution is unsuccessful, the processor cannot ensure atomic updates to the transaction memory, so the processor rolls back or aborts such transaction execution.\r\n\r\nWhile TSX Asynchronous Abort (TAA) is pending, CPU may continue to read data from architectural buffers and pass it to the dependent speculative operations. This may cause information leakage via speculative side-channel means, which is quite similar to the Microarchitectural Data Sampling (MDS) issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: TSX Transaction Asynchronous Abort (TAA)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "libvirt and qemu-kvm on Red Hat Enterprise Linux 6 are not affected by this vulnerability as they do not support MSR-based CPU features.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-NFV-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.src",
"7Server-NFV-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-doc-0:3.10.0-1062.4.2.rt56.1028.el7.noarch",
"7Server-NFV-7.7.Z:kernel-rt-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.src",
"7Server-RT-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-doc-0:3.10.0-1062.4.2.rt56.1028.el7.noarch",
"7Server-RT-7.7.Z:kernel-rt-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11135"
},
{
"category": "external",
"summary": "RHBZ#1753062",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753062"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11135",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11135"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11135",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11135"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/tsx-asynchronousabort",
"url": "https://access.redhat.com/solutions/tsx-asynchronousabort"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00270.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00270.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-11-12T19:26:53+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-NFV-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.src",
"7Server-NFV-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-doc-0:3.10.0-1062.4.2.rt56.1028.el7.noarch",
"7Server-NFV-7.7.Z:kernel-rt-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.src",
"7Server-RT-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-doc-0:3.10.0-1062.4.2.rt56.1028.el7.noarch",
"7Server-RT-7.7.Z:kernel-rt-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:3835"
},
{
"category": "workaround",
"details": "For mitigation related information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/solutions/tsx-asynchronousabort",
"product_ids": [
"7Server-NFV-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.src",
"7Server-NFV-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-doc-0:3.10.0-1062.4.2.rt56.1028.el7.noarch",
"7Server-NFV-7.7.Z:kernel-rt-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.src",
"7Server-RT-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-doc-0:3.10.0-1062.4.2.rt56.1028.el7.noarch",
"7Server-RT-7.7.Z:kernel-rt-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"7Server-NFV-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.src",
"7Server-NFV-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-doc-0:3.10.0-1062.4.2.rt56.1028.el7.noarch",
"7Server-NFV-7.7.Z:kernel-rt-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.src",
"7Server-RT-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-doc-0:3.10.0-1062.4.2.rt56.1028.el7.noarch",
"7Server-RT-7.7.Z:kernel-rt-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: TSX Transaction Asynchronous Abort (TAA)"
}
]
}
rhsa-2019_3841
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 7.2 Advanced Update Support, Red Hat Enterprise Linux 7.2 Telco Extended Update Support, and Red Hat Enterprise Linux 7.2 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* hw: Machine Check Error on Page Size Change (IFU) (CVE-2018-12207)\n\n* hw: TSX Transaction Asynchronous Abort (TAA) (CVE-2019-11135)\n\n* hw: Intel GPU Denial Of Service while accessing MMIO in lower power state (CVE-2019-0154)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2019:3841",
"url": "https://access.redhat.com/errata/RHSA-2019:3841"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce",
"url": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/tsx-asynchronousabort",
"url": "https://access.redhat.com/solutions/tsx-asynchronousabort"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/i915-graphics",
"url": "https://access.redhat.com/solutions/i915-graphics"
},
{
"category": "external",
"summary": "1646768",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646768"
},
{
"category": "external",
"summary": "1724393",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1724393"
},
{
"category": "external",
"summary": "1753062",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753062"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_3841.json"
}
],
"title": "Red Hat Security Advisory: kernel security update",
"tracking": {
"current_release_date": "2024-11-15T03:17:32+00:00",
"generator": {
"date": "2024-11-15T03:17:32+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2019:3841",
"initial_release_date": "2019-11-12T21:02:11+00:00",
"revision_history": [
{
"date": "2019-11-12T21:02:11+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2019-11-12T21:02:11+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-15T03:17:32+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product": {
"name": "Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.2::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.2::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product": {
"name": "Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:7.2::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:7.2::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product": {
"name": "Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_tus:7.2::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_tus:7.2::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-327.82.2.el7.x86_64",
"product": {
"name": "kernel-0:3.10.0-327.82.2.el7.x86_64",
"product_id": "kernel-0:3.10.0-327.82.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-327.82.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"product": {
"name": "kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"product_id": "kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-327.82.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"product_id": "kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-327.82.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"product": {
"name": "kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"product_id": "kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-327.82.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"product": {
"name": "kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"product_id": "kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-327.82.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"product": {
"name": "kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"product_id": "kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-327.82.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"product_id": "kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-327.82.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-327.82.2.el7.x86_64",
"product": {
"name": "perf-0:3.10.0-327.82.2.el7.x86_64",
"product_id": "perf-0:3.10.0-327.82.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-327.82.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-327.82.2.el7.x86_64",
"product": {
"name": "python-perf-0:3.10.0-327.82.2.el7.x86_64",
"product_id": "python-perf-0:3.10.0-327.82.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-327.82.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-327.82.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"product_id": "kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-327.82.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-327.82.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-327.82.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"product": {
"name": "perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"product_id": "perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-327.82.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"product_id": "python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-327.82.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-327.82.2.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-327.82.2.el7.src",
"product": {
"name": "kernel-0:3.10.0-327.82.2.el7.src",
"product_id": "kernel-0:3.10.0-327.82.2.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-327.82.2.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"product": {
"name": "kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"product_id": "kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-327.82.2.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"product": {
"name": "kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"product_id": "kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@3.10.0-327.82.2.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.82.2.el7.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-327.82.2.el7.src",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-327.82.2.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:perf-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:python-perf-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.82.2.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-327.82.2.el7.src",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:kernel-debug-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:kernel-devel-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-327.82.2.el7.noarch as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:kernel-doc-0:3.10.0-327.82.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:kernel-headers-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:kernel-tools-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:perf-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:python-perf-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.82.2.el7.src as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-327.82.2.el7.src",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-327.82.2.el7.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:perf-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:python-perf-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.82.2.el7.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-327.82.2.el7.src",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-327.82.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:perf-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.82.2.el7.src as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-327.82.2.el7.src",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-327.82.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.82.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:perf-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.82.2.el7.src as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-327.82.2.el7.src",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-327.82.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:perf-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Intel"
]
},
{
"names": [
"Deepak Gupta"
],
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2018-12207",
"cwe": {
"id": "CWE-226",
"name": "Sensitive Information in Resource Not Removed Before Reuse"
},
"discovery_date": "2018-11-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1646768"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way Intel CPUs handle inconsistency between, virtual to physical memory address translations in CPU\u0027s local cache and system software\u0027s Paging structure entries. A privileged guest user may use this flaw to induce a hardware Machine Check Error on the host processor, resulting in a severe DoS scenario by halting the processor.\r\n\r\nSystem software like OS OR Virtual Machine Monitor (VMM) use virtual memory system for storing program instructions and data in memory. Virtual Memory system uses Paging structures like Page Tables and Page Directories to manage system memory. The processor\u0027s Memory Management Unit (MMU) uses Paging structure entries to translate program\u0027s virtual memory addresses to physical memory addresses. The processor stores these address translations into its local cache buffer called - Translation Lookaside Buffer (TLB). TLB has two parts, one for instructions and other for data addresses.\r\n\r\nSystem software can modify its Paging structure entries to change address mappings OR certain attributes like page size etc. Upon such Paging structure alterations in memory, system software must invalidate the corresponding address translations in the processor\u0027s TLB cache. But before this TLB invalidation takes place, a privileged guest user may trigger an instruction fetch operation, which could use an already cached, but now invalid, virtual to physical address translation from Instruction TLB (ITLB). Thus accessing an invalid physical memory address and resulting in halting the processor due to the Machine Check Error (MCE) on Page Size Change.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: Machine Check Error on Page Size Change (IFU)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.E4S:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.E4S:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.TUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.TUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-12207"
},
{
"category": "external",
"summary": "RHBZ#1646768",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646768"
},
{
"category": "external",
"summary": "RHSB-ifu-page-mce",
"url": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-12207",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12207"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-12207",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12207"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-11-12T21:02:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.E4S:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.E4S:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.TUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.TUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:3841"
},
{
"category": "workaround",
"details": "For mitigation related information, please refer to the Red Hat vulnerability article: https://access.redhat.com/security/vulnerabilities/ifu-page-mce .",
"product_ids": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.E4S:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.E4S:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.TUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.TUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.E4S:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.E4S:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.TUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.TUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: Machine Check Error on Page Size Change (IFU)"
},
{
"acknowledgments": [
{
"names": [
"Intel"
]
}
],
"cve": "CVE-2019-0154",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"discovery_date": "2019-06-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1724393"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Intel graphics hardware (GPU) where a local attacker with the ability to issue an ioctl could trigger a hardware level crash if MMIO registers were read while the graphics card was in a low-power state. This creates a denial of service situation and the GPU and connected displays will remain unusable until a reboot occurs.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: Intel GPU Denial Of Service while accessing MMIO in lower power state",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Intel plans to release BIOS firmware to correct this issue. Red Hat\u0027s kernel update should mitigate this vulnerability. Some older hardware will not have BIOS firmware update and will rely on operating system level protection to prevent access while the device is in low-power states. For more information see https://access.redhat.com/solutions/i915-graphics",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.E4S:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.E4S:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.TUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.TUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-0154"
},
{
"category": "external",
"summary": "RHBZ#1724393",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1724393"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-0154",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0154"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-0154",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0154"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/i915-graphics",
"url": "https://access.redhat.com/solutions/i915-graphics"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00260.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00260.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-11-12T21:02:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.E4S:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.E4S:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.TUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.TUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:3841"
},
{
"category": "workaround",
"details": "Preventing loading of the i915 kernel module will prevent attackers from using this exploit against the system however the power management functionality of the card will be disabled and the system may draw additional power. See this KCS article (https://access.redhat.com/solutions/41278) for instructions on how to disable a kernel module. Graphical displays may also be at low resolution or not work correctly. This mitigation may not be suitable if running graphical tools locally is required.",
"product_ids": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.E4S:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.E4S:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.TUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.TUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.E4S:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.E4S:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.TUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.TUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: Intel GPU Denial Of Service while accessing MMIO in lower power state"
},
{
"acknowledgments": [
{
"names": [
"Intel"
]
}
],
"cve": "CVE-2019-0155",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"discovery_date": "2019-06-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1724398"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Intel graphics hardware (GPU), where a local attacker with the ability to issue commands to the GPU could inadvertently lead to memory corruption and possible privilege escalation. The attacker could use the GPU blitter to perform privilege MMIO operations, not limited to the address space required to function correctly.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: Intel GPU blitter manipulation can allow for arbitrary kernel memory write",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/solutions/i915-graphics",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.E4S:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.E4S:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.TUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.TUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-0155"
},
{
"category": "external",
"summary": "RHBZ#1724398",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1724398"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-0155",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0155"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-0155",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0155"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/i915-graphics",
"url": "https://access.redhat.com/solutions/i915-graphics"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00242.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00242.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-11-12T21:02:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.E4S:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.E4S:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.TUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.TUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:3841"
},
{
"category": "workaround",
"details": "Preventing loading of the i915 kernel module will prevent attackers from using this exploit against the system however the power management functionality of the card will be disabled and the system may draw additional power. See this KCS article( https://access.redhat.com/solutions/41278 ) for instructions on how to disable a kernel module. Graphical displays may also be at low resolution or not work correctly. This mitigation may not be suitable if running graphical tools locally is required.",
"product_ids": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.E4S:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.E4S:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.TUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.TUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.E4S:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.E4S:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.TUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.TUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: Intel GPU blitter manipulation can allow for arbitrary kernel memory write"
},
{
"acknowledgments": [
{
"names": [
"Intel"
]
}
],
"cve": "CVE-2019-11135",
"cwe": {
"id": "CWE-203",
"name": "Observable Discrepancy"
},
"discovery_date": "2019-09-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1753062"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way Intel CPUs handle speculative execution of instructions when the TSX Asynchronous Abort (TAA) error occurs. A local authenticated attacker with the ability to monitor execution times could infer the TSX memory state by comparing abort execution times. This could allow information disclosure via this observed side-channel for any TSX transaction being executed while an attacker is able to observe abort timing.\r\n\r\nIntel\u0027s Transactional Synchronisation Extensions (TSX) are set of instructions which enable transactional memory support to improve performance of the multi-threaded applications, in the lock-protected critical sections. The CPU executes instructions in the critical-sections as transactions, while ensuring their atomic state. When such transaction execution is unsuccessful, the processor cannot ensure atomic updates to the transaction memory, so the processor rolls back or aborts such transaction execution.\r\n\r\nWhile TSX Asynchronous Abort (TAA) is pending, CPU may continue to read data from architectural buffers and pass it to the dependent speculative operations. This may cause information leakage via speculative side-channel means, which is quite similar to the Microarchitectural Data Sampling (MDS) issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: TSX Transaction Asynchronous Abort (TAA)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "libvirt and qemu-kvm on Red Hat Enterprise Linux 6 are not affected by this vulnerability as they do not support MSR-based CPU features.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.E4S:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.E4S:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.TUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.TUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11135"
},
{
"category": "external",
"summary": "RHBZ#1753062",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753062"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11135",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11135"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11135",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11135"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/tsx-asynchronousabort",
"url": "https://access.redhat.com/solutions/tsx-asynchronousabort"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00270.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00270.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-11-12T21:02:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.E4S:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.E4S:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.TUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.TUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:3841"
},
{
"category": "workaround",
"details": "For mitigation related information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/solutions/tsx-asynchronousabort",
"product_ids": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.E4S:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.E4S:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.TUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.TUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.E4S:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.E4S:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.TUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.TUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: TSX Transaction Asynchronous Abort (TAA)"
}
]
}
RHSA-2019:3916
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for machine-os-content-container is now available for Red Hat OpenShift Container Platform 4.2.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments.\n\nThis is a text-only advisory for the machine-os-content container image, which includes RPM packages for Red Hat Enterprise Linux CoreOS.\n\nSecurity Fix(es):\n\n* A flaw was found in the way Intel CPUs handled inconsistency between virtual to physical memory address translations in the CPU\u0027s local cache and the system software\u0027s Paging structure entries. A privileged guest user can exploit this flaw to induce a hardware Machine Check Error (MCE) on the host processor, resulting in a severe DoS scenario by halting the processor. System software like the OS OR Virtual Machine Monitor (VMM) use the virtual memory system for storing program instructions and data in memory. The virtual memory system uses Paging structures like Page Tables and Page Directories to manage system memory. The processor\u0027s Memory Management Unit (MMU) uses Paging structure entries to translate a program\u0027s virtual memory addresses to physical memory addresses. The processor stores these address translations into its local cache buffer, called the Translation Lookaside Buffer (TLB). TLB has two parts, one for instructions and the other for data addresses. System software can modify its Paging structure entries to change address mappings or certain attributes like page size, etc. Upon such Paging structure alterations in memory, system software must invalidate the corresponding address translations in the processor\u0027s TLB cache. Before this TLB invalidation takes place, however, a privileged guest user could trigger an instruction fetch operation, which could use an already cached, but now invalid, virtual to physical address translation from Instruction TLB (ITLB). This would access an invalid physical memory address, resulting in halting the processor due to the MCE on Page Size Change. (CVE-2018-12207)\n\n* A flaw was found in the way sudo implemented running commands with an arbitrary user ID. If a sudoers entry is written to allow users to run a command as any user except root, this flaw can be used by an attacker to bypass that restriction. (CVE-2019-14287)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2019:3916",
"url": "https://access.redhat.com/errata/RHSA-2019:3916"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce",
"url": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1646768",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646768"
},
{
"category": "external",
"summary": "1760531",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1760531"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_3916.json"
}
],
"title": "Red Hat Security Advisory: OpenShift Container Platform 4.2.5 machine-os-content-container security update",
"tracking": {
"current_release_date": "2025-10-09T18:15:57+00:00",
"generator": {
"date": "2025-10-09T18:15:57+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2019:3916",
"initial_release_date": "2019-11-19T15:56:26+00:00",
"revision_history": [
{
"date": "2019-11-19T15:56:26+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2019-11-19T15:56:26+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T18:15:57+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenShift Container Platform 4",
"product": {
"name": "Red Hat OpenShift Container Platform 4",
"product_id": "Red Hat OpenShift Container Platform 4",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:4.2"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift Enterprise"
}
],
"category": "vendor",
"name": "Red Hat"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Intel"
]
},
{
"names": [
"Deepak Gupta"
],
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2018-12207",
"cwe": {
"id": "CWE-226",
"name": "Sensitive Information in Resource Not Removed Before Reuse"
},
"discovery_date": "2018-11-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1646768"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way Intel CPUs handle inconsistency between, virtual to physical memory address translations in CPU\u0027s local cache and system software\u0027s Paging structure entries. A privileged guest user may use this flaw to induce a hardware Machine Check Error on the host processor, resulting in a severe DoS scenario by halting the processor.\r\n\r\nSystem software like OS OR Virtual Machine Monitor (VMM) use virtual memory system for storing program instructions and data in memory. Virtual Memory system uses Paging structures like Page Tables and Page Directories to manage system memory. The processor\u0027s Memory Management Unit (MMU) uses Paging structure entries to translate program\u0027s virtual memory addresses to physical memory addresses. The processor stores these address translations into its local cache buffer called - Translation Lookaside Buffer (TLB). TLB has two parts, one for instructions and other for data addresses.\r\n\r\nSystem software can modify its Paging structure entries to change address mappings OR certain attributes like page size etc. Upon such Paging structure alterations in memory, system software must invalidate the corresponding address translations in the processor\u0027s TLB cache. But before this TLB invalidation takes place, a privileged guest user may trigger an instruction fetch operation, which could use an already cached, but now invalid, virtual to physical address translation from Instruction TLB (ITLB). Thus accessing an invalid physical memory address and resulting in halting the processor due to the Machine Check Error (MCE) on Page Size Change.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: Machine Check Error on Page Size Change (IFU)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Container Platform 4"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-12207"
},
{
"category": "external",
"summary": "RHBZ#1646768",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646768"
},
{
"category": "external",
"summary": "RHSB-ifu-page-mce",
"url": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-12207",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12207"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-12207",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12207"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-11-19T15:56:26+00:00",
"details": "See the following documentation, which will be updated shortly for release 4.2.5, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.2/release_notes/ocp-4-2-release-notes.html",
"product_ids": [
"Red Hat OpenShift Container Platform 4"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:3916"
},
{
"category": "workaround",
"details": "For mitigation related information, please refer to the Red Hat vulnerability article: https://access.redhat.com/security/vulnerabilities/ifu-page-mce .",
"product_ids": [
"Red Hat OpenShift Container Platform 4"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"Red Hat OpenShift Container Platform 4"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: Machine Check Error on Page Size Change (IFU)"
},
{
"acknowledgments": [
{
"names": [
"the Sudo project"
]
},
{
"names": [
"Joe Vennix"
],
"organization": "Apple Information Security",
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2019-14287",
"cwe": {
"id": "CWE-267",
"name": "Privilege Defined With Unsafe Actions"
},
"discovery_date": "2019-10-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1760531"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way sudo implemented running commands with arbitrary user ID. If a sudoers entry is written to allow the attacker to run a command as any user except root, this flaw can be used by the attacker to bypass that restriction.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "sudo: Privilege escalation via \u0027Runas\u0027 specification with \u0027ALL\u0027 keyword",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw only affects specific, non-default configurations of sudo, in which sudoers configuration entry allows a user to run a command as any user except root, for example:\n\nsomeuser myhost = (ALL, !root) /usr/bin/somecommand\n\nThis configuration allows user \"someuser\" to run somecommand as any other user except root. However, this flaw also allows someuser to run somecommand as root by specifying the target user using the numeric id of -1. Only the specified command can be run, this flaw does NOT allow user to run other commands that those specified in the sudoers configuration.\n\nAny other configurations of sudo (including configurations that allow user to run commands as any user including root and configurations that allow user to run command as a specific other user) are NOT affected by this flaw.\n\nRed Hat Virtualization Hypervisor includes an affected version of sudo, however the default configuration is not vulnerable to this flaw.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Container Platform 4"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-14287"
},
{
"category": "external",
"summary": "RHBZ#1760531",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1760531"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-14287",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14287"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14287",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14287"
},
{
"category": "external",
"summary": "https://www.sudo.ws/alerts/minus_1_uid.html",
"url": "https://www.sudo.ws/alerts/minus_1_uid.html"
}
],
"release_date": "2019-10-14T15:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-11-19T15:56:26+00:00",
"details": "See the following documentation, which will be updated shortly for release 4.2.5, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.2/release_notes/ocp-4-2-release-notes.html",
"product_ids": [
"Red Hat OpenShift Container Platform 4"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:3916"
},
{
"category": "workaround",
"details": "This vulnerability only affects configurations of sudo that have a runas user list that includes an exclusion of root. The most simple example is:\n\n~~~\nsomeuser ALL=(ALL, !root) /usr/bin/somecommand\n~~~\n\nThe exclusion is specified using an excalamation mark (!). In this example, the \"root\" user is specified by name. The root user may also be identified in other ways, such as by user id:\n\n~~~\nsomeuser ALL=(ALL, !#0) /usr/bin/somecommand\n~~~\n\nor by reference to a runas alias:\n\n~~~\nRunas_Alias MYGROUP = root, adminuser\nsomeuser ALL=(ALL, !MYGROUP) /usr/bin/somecommand\n~~~\n\nTo ensure your sudoers configuration is not affected by this vulnerability, we recommend examining each sudoers entry that includes the `!` character in the runas specification, to ensure that the root user is not among the exclusions. These can be found in the /etc/sudoers file or files under /etc/sudoers.d.",
"product_ids": [
"Red Hat OpenShift Container Platform 4"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"Red Hat OpenShift Container Platform 4"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "sudo: Privilege escalation via \u0027Runas\u0027 specification with \u0027ALL\u0027 keyword"
}
]
}
RHSA-2019:3835
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* hw: Machine Check Error on Page Size Change (IFU) (CVE-2018-12207)\n\n* hw: TSX Transaction Asynchronous Abort (TAA) (CVE-2019-11135)\n\n* hw: Intel GPU Denial Of Service while accessing MMIO in lower power state (CVE-2019-0154)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2019:3835",
"url": "https://access.redhat.com/errata/RHSA-2019:3835"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce",
"url": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/tsx-asynchronousabort",
"url": "https://access.redhat.com/solutions/tsx-asynchronousabort"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/i915-graphics",
"url": "https://access.redhat.com/solutions/i915-graphics"
},
{
"category": "external",
"summary": "1646768",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646768"
},
{
"category": "external",
"summary": "1724393",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1724393"
},
{
"category": "external",
"summary": "1753062",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753062"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_3835.json"
}
],
"title": "Red Hat Security Advisory: kernel-rt security update",
"tracking": {
"current_release_date": "2025-10-09T18:15:54+00:00",
"generator": {
"date": "2025-10-09T18:15:54+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2019:3835",
"initial_release_date": "2019-11-12T19:26:53+00:00",
"revision_history": [
{
"date": "2019-11-12T19:26:53+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2019-11-12T19:26:53+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T18:15:54+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.7.Z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras_rt:7"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Realtime (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.7.Z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras_rt:7"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"product": {
"name": "kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"product_id": "kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@3.10.0-1062.4.2.rt56.1028.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"product": {
"name": "kernel-rt-debug-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"product_id": "kernel-rt-debug-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug@3.10.0-1062.4.2.rt56.1028.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"product": {
"name": "kernel-rt-debug-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"product_id": "kernel-rt-debug-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-devel@3.10.0-1062.4.2.rt56.1028.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"product": {
"name": "kernel-rt-debug-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"product_id": "kernel-rt-debug-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@3.10.0-1062.4.2.rt56.1028.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"product": {
"name": "kernel-rt-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"product_id": "kernel-rt-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-devel@3.10.0-1062.4.2.rt56.1028.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"product": {
"name": "kernel-rt-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"product_id": "kernel-rt-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-kvm@3.10.0-1062.4.2.rt56.1028.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"product": {
"name": "kernel-rt-trace-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"product_id": "kernel-rt-trace-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace@3.10.0-1062.4.2.rt56.1028.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"product": {
"name": "kernel-rt-trace-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"product_id": "kernel-rt-trace-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace-devel@3.10.0-1062.4.2.rt56.1028.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"product": {
"name": "kernel-rt-trace-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"product_id": "kernel-rt-trace-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace-kvm@3.10.0-1062.4.2.rt56.1028.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"product": {
"name": "kernel-rt-debug-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"product_id": "kernel-rt-debug-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@3.10.0-1062.4.2.rt56.1028.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"product": {
"name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"product_id": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-kvm-debuginfo@3.10.0-1062.4.2.rt56.1028.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"product": {
"name": "kernel-rt-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"product_id": "kernel-rt-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo@3.10.0-1062.4.2.rt56.1028.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"product": {
"name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"product_id": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@3.10.0-1062.4.2.rt56.1028.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"product": {
"name": "kernel-rt-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"product_id": "kernel-rt-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-kvm-debuginfo@3.10.0-1062.4.2.rt56.1028.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"product": {
"name": "kernel-rt-trace-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"product_id": "kernel-rt-trace-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace-debuginfo@3.10.0-1062.4.2.rt56.1028.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"product": {
"name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"product_id": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace-kvm-debuginfo@3.10.0-1062.4.2.rt56.1028.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.src",
"product": {
"name": "kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.src",
"product_id": "kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@3.10.0-1062.4.2.rt56.1028.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-doc-0:3.10.0-1062.4.2.rt56.1028.el7.noarch",
"product": {
"name": "kernel-rt-doc-0:3.10.0-1062.4.2.rt56.1028.el7.noarch",
"product_id": "kernel-rt-doc-0:3.10.0-1062.4.2.rt56.1028.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-doc@3.10.0-1062.4.2.rt56.1028.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.src as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.src"
},
"product_reference": "kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.src",
"relates_to_product_reference": "7Server-NFV-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64"
},
"product_reference": "kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.7.Z:kernel-rt-debug-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64"
},
"product_reference": "kernel-rt-debug-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.7.Z:kernel-rt-debug-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.7.Z:kernel-rt-debug-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.7.Z:kernel-rt-debug-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.7.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.7.Z:kernel-rt-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.7.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.7.Z:kernel-rt-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64"
},
"product_reference": "kernel-rt-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-doc-0:3.10.0-1062.4.2.rt56.1028.el7.noarch as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.7.Z:kernel-rt-doc-0:3.10.0-1062.4.2.rt56.1028.el7.noarch"
},
"product_reference": "kernel-rt-doc-0:3.10.0-1062.4.2.rt56.1028.el7.noarch",
"relates_to_product_reference": "7Server-NFV-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.7.Z:kernel-rt-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64"
},
"product_reference": "kernel-rt-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.7.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64"
},
"product_reference": "kernel-rt-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.7.Z:kernel-rt-trace-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64"
},
"product_reference": "kernel-rt-trace-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.7.Z:kernel-rt-trace-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64"
},
"product_reference": "kernel-rt-trace-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.7.Z:kernel-rt-trace-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64"
},
"product_reference": "kernel-rt-trace-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.7.Z:kernel-rt-trace-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64"
},
"product_reference": "kernel-rt-trace-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)",
"product_id": "7Server-NFV-7.7.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64"
},
"product_reference": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"relates_to_product_reference": "7Server-NFV-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.src as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.src"
},
"product_reference": "kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.src",
"relates_to_product_reference": "7Server-RT-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64"
},
"product_reference": "kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.7.Z:kernel-rt-debug-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64"
},
"product_reference": "kernel-rt-debug-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.7.Z:kernel-rt-debug-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.7.Z:kernel-rt-debug-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.7.Z:kernel-rt-debug-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.7.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.7.Z:kernel-rt-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.7.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.7.Z:kernel-rt-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64"
},
"product_reference": "kernel-rt-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-doc-0:3.10.0-1062.4.2.rt56.1028.el7.noarch as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.7.Z:kernel-rt-doc-0:3.10.0-1062.4.2.rt56.1028.el7.noarch"
},
"product_reference": "kernel-rt-doc-0:3.10.0-1062.4.2.rt56.1028.el7.noarch",
"relates_to_product_reference": "7Server-RT-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.7.Z:kernel-rt-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64"
},
"product_reference": "kernel-rt-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.7.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64"
},
"product_reference": "kernel-rt-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.7.Z:kernel-rt-trace-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64"
},
"product_reference": "kernel-rt-trace-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.7.Z:kernel-rt-trace-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64"
},
"product_reference": "kernel-rt-trace-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.7.Z:kernel-rt-trace-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64"
},
"product_reference": "kernel-rt-trace-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.7.Z:kernel-rt-trace-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64"
},
"product_reference": "kernel-rt-trace-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)",
"product_id": "7Server-RT-7.7.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64"
},
"product_reference": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"relates_to_product_reference": "7Server-RT-7.7.Z"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Intel"
]
},
{
"names": [
"Deepak Gupta"
],
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2018-12207",
"cwe": {
"id": "CWE-226",
"name": "Sensitive Information in Resource Not Removed Before Reuse"
},
"discovery_date": "2018-11-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1646768"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way Intel CPUs handle inconsistency between, virtual to physical memory address translations in CPU\u0027s local cache and system software\u0027s Paging structure entries. A privileged guest user may use this flaw to induce a hardware Machine Check Error on the host processor, resulting in a severe DoS scenario by halting the processor.\r\n\r\nSystem software like OS OR Virtual Machine Monitor (VMM) use virtual memory system for storing program instructions and data in memory. Virtual Memory system uses Paging structures like Page Tables and Page Directories to manage system memory. The processor\u0027s Memory Management Unit (MMU) uses Paging structure entries to translate program\u0027s virtual memory addresses to physical memory addresses. The processor stores these address translations into its local cache buffer called - Translation Lookaside Buffer (TLB). TLB has two parts, one for instructions and other for data addresses.\r\n\r\nSystem software can modify its Paging structure entries to change address mappings OR certain attributes like page size etc. Upon such Paging structure alterations in memory, system software must invalidate the corresponding address translations in the processor\u0027s TLB cache. But before this TLB invalidation takes place, a privileged guest user may trigger an instruction fetch operation, which could use an already cached, but now invalid, virtual to physical address translation from Instruction TLB (ITLB). Thus accessing an invalid physical memory address and resulting in halting the processor due to the Machine Check Error (MCE) on Page Size Change.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: Machine Check Error on Page Size Change (IFU)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-NFV-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.src",
"7Server-NFV-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-doc-0:3.10.0-1062.4.2.rt56.1028.el7.noarch",
"7Server-NFV-7.7.Z:kernel-rt-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.src",
"7Server-RT-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-doc-0:3.10.0-1062.4.2.rt56.1028.el7.noarch",
"7Server-RT-7.7.Z:kernel-rt-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-12207"
},
{
"category": "external",
"summary": "RHBZ#1646768",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646768"
},
{
"category": "external",
"summary": "RHSB-ifu-page-mce",
"url": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-12207",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12207"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-12207",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12207"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-11-12T19:26:53+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-NFV-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.src",
"7Server-NFV-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-doc-0:3.10.0-1062.4.2.rt56.1028.el7.noarch",
"7Server-NFV-7.7.Z:kernel-rt-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.src",
"7Server-RT-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-doc-0:3.10.0-1062.4.2.rt56.1028.el7.noarch",
"7Server-RT-7.7.Z:kernel-rt-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:3835"
},
{
"category": "workaround",
"details": "For mitigation related information, please refer to the Red Hat vulnerability article: https://access.redhat.com/security/vulnerabilities/ifu-page-mce .",
"product_ids": [
"7Server-NFV-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.src",
"7Server-NFV-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-doc-0:3.10.0-1062.4.2.rt56.1028.el7.noarch",
"7Server-NFV-7.7.Z:kernel-rt-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.src",
"7Server-RT-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-doc-0:3.10.0-1062.4.2.rt56.1028.el7.noarch",
"7Server-RT-7.7.Z:kernel-rt-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7Server-NFV-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.src",
"7Server-NFV-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-doc-0:3.10.0-1062.4.2.rt56.1028.el7.noarch",
"7Server-NFV-7.7.Z:kernel-rt-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.src",
"7Server-RT-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-doc-0:3.10.0-1062.4.2.rt56.1028.el7.noarch",
"7Server-RT-7.7.Z:kernel-rt-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: Machine Check Error on Page Size Change (IFU)"
},
{
"acknowledgments": [
{
"names": [
"Intel"
]
}
],
"cve": "CVE-2019-0154",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"discovery_date": "2019-06-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1724393"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Intel graphics hardware (GPU) where a local attacker with the ability to issue an ioctl could trigger a hardware level crash if MMIO registers were read while the graphics card was in a low-power state. This creates a denial of service situation and the GPU and connected displays will remain unusable until a reboot occurs.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: Intel GPU Denial Of Service while accessing MMIO in lower power state",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Intel plans to release BIOS firmware to correct this issue. Red Hat\u0027s kernel update should mitigate this vulnerability. Some older hardware will not have BIOS firmware update and will rely on operating system level protection to prevent access while the device is in low-power states. For more information see https://access.redhat.com/solutions/i915-graphics",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-NFV-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.src",
"7Server-NFV-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-doc-0:3.10.0-1062.4.2.rt56.1028.el7.noarch",
"7Server-NFV-7.7.Z:kernel-rt-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.src",
"7Server-RT-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-doc-0:3.10.0-1062.4.2.rt56.1028.el7.noarch",
"7Server-RT-7.7.Z:kernel-rt-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-0154"
},
{
"category": "external",
"summary": "RHBZ#1724393",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1724393"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-0154",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0154"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-0154",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0154"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/i915-graphics",
"url": "https://access.redhat.com/solutions/i915-graphics"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00260.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00260.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-11-12T19:26:53+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-NFV-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.src",
"7Server-NFV-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-doc-0:3.10.0-1062.4.2.rt56.1028.el7.noarch",
"7Server-NFV-7.7.Z:kernel-rt-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.src",
"7Server-RT-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-doc-0:3.10.0-1062.4.2.rt56.1028.el7.noarch",
"7Server-RT-7.7.Z:kernel-rt-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:3835"
},
{
"category": "workaround",
"details": "Preventing loading of the i915 kernel module will prevent attackers from using this exploit against the system however the power management functionality of the card will be disabled and the system may draw additional power. See this KCS article (https://access.redhat.com/solutions/41278) for instructions on how to disable a kernel module. Graphical displays may also be at low resolution or not work correctly. This mitigation may not be suitable if running graphical tools locally is required.",
"product_ids": [
"7Server-NFV-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.src",
"7Server-NFV-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-doc-0:3.10.0-1062.4.2.rt56.1028.el7.noarch",
"7Server-NFV-7.7.Z:kernel-rt-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.src",
"7Server-RT-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-doc-0:3.10.0-1062.4.2.rt56.1028.el7.noarch",
"7Server-RT-7.7.Z:kernel-rt-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7Server-NFV-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.src",
"7Server-NFV-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-doc-0:3.10.0-1062.4.2.rt56.1028.el7.noarch",
"7Server-NFV-7.7.Z:kernel-rt-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.src",
"7Server-RT-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-doc-0:3.10.0-1062.4.2.rt56.1028.el7.noarch",
"7Server-RT-7.7.Z:kernel-rt-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: Intel GPU Denial Of Service while accessing MMIO in lower power state"
},
{
"acknowledgments": [
{
"names": [
"Intel"
]
}
],
"cve": "CVE-2019-11135",
"cwe": {
"id": "CWE-203",
"name": "Observable Discrepancy"
},
"discovery_date": "2019-09-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1753062"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way Intel CPUs handle speculative execution of instructions when the TSX Asynchronous Abort (TAA) error occurs. A local authenticated attacker with the ability to monitor execution times could infer the TSX memory state by comparing abort execution times. This could allow information disclosure via this observed side-channel for any TSX transaction being executed while an attacker is able to observe abort timing.\r\n\r\nIntel\u0027s Transactional Synchronisation Extensions (TSX) are set of instructions which enable transactional memory support to improve performance of the multi-threaded applications, in the lock-protected critical sections. The CPU executes instructions in the critical-sections as transactions, while ensuring their atomic state. When such transaction execution is unsuccessful, the processor cannot ensure atomic updates to the transaction memory, so the processor rolls back or aborts such transaction execution.\r\n\r\nWhile TSX Asynchronous Abort (TAA) is pending, CPU may continue to read data from architectural buffers and pass it to the dependent speculative operations. This may cause information leakage via speculative side-channel means, which is quite similar to the Microarchitectural Data Sampling (MDS) issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: TSX Transaction Asynchronous Abort (TAA)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "libvirt and qemu-kvm on Red Hat Enterprise Linux 6 are not affected by this vulnerability as they do not support MSR-based CPU features.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-NFV-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.src",
"7Server-NFV-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-doc-0:3.10.0-1062.4.2.rt56.1028.el7.noarch",
"7Server-NFV-7.7.Z:kernel-rt-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.src",
"7Server-RT-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-doc-0:3.10.0-1062.4.2.rt56.1028.el7.noarch",
"7Server-RT-7.7.Z:kernel-rt-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11135"
},
{
"category": "external",
"summary": "RHBZ#1753062",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753062"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11135",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11135"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11135",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11135"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/tsx-asynchronousabort",
"url": "https://access.redhat.com/solutions/tsx-asynchronousabort"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00270.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00270.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-11-12T19:26:53+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-NFV-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.src",
"7Server-NFV-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-doc-0:3.10.0-1062.4.2.rt56.1028.el7.noarch",
"7Server-NFV-7.7.Z:kernel-rt-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.src",
"7Server-RT-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-doc-0:3.10.0-1062.4.2.rt56.1028.el7.noarch",
"7Server-RT-7.7.Z:kernel-rt-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:3835"
},
{
"category": "workaround",
"details": "For mitigation related information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/solutions/tsx-asynchronousabort",
"product_ids": [
"7Server-NFV-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.src",
"7Server-NFV-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-doc-0:3.10.0-1062.4.2.rt56.1028.el7.noarch",
"7Server-NFV-7.7.Z:kernel-rt-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.src",
"7Server-RT-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-doc-0:3.10.0-1062.4.2.rt56.1028.el7.noarch",
"7Server-RT-7.7.Z:kernel-rt-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"7Server-NFV-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.src",
"7Server-NFV-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-doc-0:3.10.0-1062.4.2.rt56.1028.el7.noarch",
"7Server-NFV-7.7.Z:kernel-rt-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-NFV-7.7.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.src",
"7Server-RT-7.7.Z:kernel-rt-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-doc-0:3.10.0-1062.4.2.rt56.1028.el7.noarch",
"7Server-RT-7.7.Z:kernel-rt-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-devel-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-kvm-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64",
"7Server-RT-7.7.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-1062.4.2.rt56.1028.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: TSX Transaction Asynchronous Abort (TAA)"
}
]
}
rhsa-2020:0204
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 8.0 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* hw: Machine Check Error on Page Size Change (IFU) (CVE-2018-12207)\n\n* hw: TSX Transaction Asynchronous Abort (TAA) (CVE-2019-11135)\n\n* kernel: nfs: use-after-free in svc_process_common() (CVE-2018-16884)\n\n* hw: Intel GPU blitter manipulation can allow for arbitrary kernel memory write (CVE-2019-0155)\n\n* Kernel: vhost_net: infinite loop while receiving packets leads to DoS (CVE-2019-3900)\n\n* Kernel: page cache side channel attacks (CVE-2019-5489)\n\n* hardware: bluetooth: BR/EDR encryption key negotiation attacks (KNOB) (CVE-2019-9506)\n\n* kernel: Heap overflow in mwifiex_uap_parse_tail_ies function in drivers/net/wireless/marvell/mwifiex/ie.c (CVE-2019-10126)\n\n* kernel: heap overflow in mwifiex_update_vs_ie() function of Marvell WiFi driver (CVE-2019-14816)\n\n* Kernel: KVM: OOB memory access via mmio ring buffer (CVE-2019-14821)\n\n* kernel: heap overflow in marvell/mwifiex/tdls.c (CVE-2019-14901)\n\n* hw: Intel GPU Denial Of Service while accessing MMIO in lower power state (CVE-2019-0154)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* Backport TCP follow-up for small buffers (BZ#1739184)\n\n* TCP performance regression after CVE-2019-11478 bug fix (BZ#1743170)\n\n* RHEL8.0 - bnx2x link down, caused by transmit timeouts during load test (Marvell/Cavium/QLogic) (L3:) (BZ#1743548)\n\n* block: blk-mq improvement (BZ#1780567)\n\n* RHEL8.0 - Regression to RHEL7.6 by changing force_latency found during RHEL8.0 validation for SAP HANA on POWER (BZ#1781111)\n\n* blk-mq: overwirte performance drops on real MQ device (BZ#1782183)\n\n* RHEL8: creating vport takes lot of memory i.e 2GB per vport which leads to drain out system memory quickly. (BZ#1782705)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2020:0204",
"url": "https://access.redhat.com/errata/RHSA-2020:0204"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce",
"url": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce"
},
{
"category": "external",
"summary": "1646768",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646768"
},
{
"category": "external",
"summary": "1660375",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1660375"
},
{
"category": "external",
"summary": "1664110",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1664110"
},
{
"category": "external",
"summary": "1698757",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1698757"
},
{
"category": "external",
"summary": "1716992",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1716992"
},
{
"category": "external",
"summary": "1724393",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1724393"
},
{
"category": "external",
"summary": "1724398",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1724398"
},
{
"category": "external",
"summary": "1727857",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1727857"
},
{
"category": "external",
"summary": "1744149",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1744149"
},
{
"category": "external",
"summary": "1746708",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1746708"
},
{
"category": "external",
"summary": "1753062",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753062"
},
{
"category": "external",
"summary": "1773519",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1773519"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_0204.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2025-10-09T18:16:00+00:00",
"generator": {
"date": "2025-10-09T18:16:00+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2020:0204",
"initial_release_date": "2020-01-22T21:26:18+00:00",
"revision_history": [
{
"date": "2020-01-22T21:26:18+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2020-01-22T21:26:18+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T18:16:00+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:8.0::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-80.15.1.el8_0.ppc64le",
"product": {
"name": "bpftool-0:4.18.0-80.15.1.el8_0.ppc64le",
"product_id": "bpftool-0:4.18.0-80.15.1.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-80.15.1.el8_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-80.15.1.el8_0.ppc64le",
"product": {
"name": "kernel-0:4.18.0-80.15.1.el8_0.ppc64le",
"product_id": "kernel-0:4.18.0-80.15.1.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-80.15.1.el8_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"product": {
"name": "kernel-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"product_id": "kernel-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-80.15.1.el8_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"product": {
"name": "kernel-cross-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"product_id": "kernel-cross-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-80.15.1.el8_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-80.15.1.el8_0.ppc64le",
"product": {
"name": "kernel-debug-0:4.18.0-80.15.1.el8_0.ppc64le",
"product_id": "kernel-debug-0:4.18.0-80.15.1.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-80.15.1.el8_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"product": {
"name": "kernel-debug-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"product_id": "kernel-debug-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-80.15.1.el8_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"product": {
"name": "kernel-debug-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"product_id": "kernel-debug-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-80.15.1.el8_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"product": {
"name": "kernel-debug-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"product_id": "kernel-debug-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-80.15.1.el8_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"product_id": "kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-80.15.1.el8_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"product": {
"name": "kernel-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"product_id": "kernel-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-80.15.1.el8_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"product": {
"name": "kernel-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"product_id": "kernel-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-80.15.1.el8_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"product": {
"name": "kernel-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"product_id": "kernel-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-80.15.1.el8_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"product": {
"name": "kernel-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"product_id": "kernel-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-80.15.1.el8_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-80.15.1.el8_0.ppc64le",
"product": {
"name": "kernel-tools-0:4.18.0-80.15.1.el8_0.ppc64le",
"product_id": "kernel-tools-0:4.18.0-80.15.1.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-80.15.1.el8_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-80.15.1.el8_0.ppc64le",
"product": {
"name": "kernel-tools-libs-0:4.18.0-80.15.1.el8_0.ppc64le",
"product_id": "kernel-tools-libs-0:4.18.0-80.15.1.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-80.15.1.el8_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"product": {
"name": "perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"product_id": "perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-80.15.1.el8_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"product": {
"name": "python3-perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"product_id": "python3-perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-80.15.1.el8_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"product_id": "bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-80.15.1.el8_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"product_id": "kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-80.15.1.el8_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"product": {
"name": "kernel-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"product_id": "kernel-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-80.15.1.el8_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-80.15.1.el8_0.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-80.15.1.el8_0.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:4.18.0-80.15.1.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.18.0-80.15.1.el8_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"product_id": "kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-80.15.1.el8_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"product": {
"name": "perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"product_id": "perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-80.15.1.el8_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"product_id": "python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-80.15.1.el8_0?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-80.15.1.el8_0.x86_64",
"product": {
"name": "bpftool-0:4.18.0-80.15.1.el8_0.x86_64",
"product_id": "bpftool-0:4.18.0-80.15.1.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-80.15.1.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-80.15.1.el8_0.x86_64",
"product": {
"name": "kernel-0:4.18.0-80.15.1.el8_0.x86_64",
"product_id": "kernel-0:4.18.0-80.15.1.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-80.15.1.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-80.15.1.el8_0.x86_64",
"product": {
"name": "kernel-core-0:4.18.0-80.15.1.el8_0.x86_64",
"product_id": "kernel-core-0:4.18.0-80.15.1.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-80.15.1.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"product_id": "kernel-cross-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-80.15.1.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-80.15.1.el8_0.x86_64",
"product": {
"name": "kernel-debug-0:4.18.0-80.15.1.el8_0.x86_64",
"product_id": "kernel-debug-0:4.18.0-80.15.1.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-80.15.1.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-80.15.1.el8_0.x86_64",
"product": {
"name": "kernel-debug-core-0:4.18.0-80.15.1.el8_0.x86_64",
"product_id": "kernel-debug-core-0:4.18.0-80.15.1.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-80.15.1.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"product_id": "kernel-debug-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-80.15.1.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"product_id": "kernel-debug-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-80.15.1.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-80.15.1.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"product": {
"name": "kernel-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"product_id": "kernel-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-80.15.1.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"product": {
"name": "kernel-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"product_id": "kernel-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-80.15.1.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"product": {
"name": "kernel-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"product_id": "kernel-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-80.15.1.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"product_id": "kernel-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-80.15.1.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-80.15.1.el8_0.x86_64",
"product": {
"name": "kernel-tools-0:4.18.0-80.15.1.el8_0.x86_64",
"product_id": "kernel-tools-0:4.18.0-80.15.1.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-80.15.1.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-80.15.1.el8_0.x86_64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-80.15.1.el8_0.x86_64",
"product_id": "kernel-tools-libs-0:4.18.0-80.15.1.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-80.15.1.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-80.15.1.el8_0.x86_64",
"product": {
"name": "perf-0:4.18.0-80.15.1.el8_0.x86_64",
"product_id": "perf-0:4.18.0-80.15.1.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-80.15.1.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-80.15.1.el8_0.x86_64",
"product": {
"name": "python3-perf-0:4.18.0-80.15.1.el8_0.x86_64",
"product_id": "python3-perf-0:4.18.0-80.15.1.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-80.15.1.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"product_id": "bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-80.15.1.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-80.15.1.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"product_id": "kernel-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-80.15.1.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-80.15.1.el8_0.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-80.15.1.el8_0.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:4.18.0-80.15.1.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@4.18.0-80.15.1.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-80.15.1.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"product": {
"name": "perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"product_id": "perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-80.15.1.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"product_id": "python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-80.15.1.el8_0?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:4.18.0-80.15.1.el8_0.src",
"product": {
"name": "kernel-0:4.18.0-80.15.1.el8_0.src",
"product_id": "kernel-0:4.18.0-80.15.1.el8_0.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-80.15.1.el8_0?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:4.18.0-80.15.1.el8_0.noarch",
"product": {
"name": "kernel-abi-whitelists-0:4.18.0-80.15.1.el8_0.noarch",
"product_id": "kernel-abi-whitelists-0:4.18.0-80.15.1.el8_0.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@4.18.0-80.15.1.el8_0?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:4.18.0-80.15.1.el8_0.noarch",
"product": {
"name": "kernel-doc-0:4.18.0-80.15.1.el8_0.noarch",
"product_id": "kernel-doc-0:4.18.0-80.15.1.el8_0.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@4.18.0-80.15.1.el8_0?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-80.15.1.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-80.15.1.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-80.15.1.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.x86_64"
},
"product_reference": "bpftool-0:4.18.0-80.15.1.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-80.15.1.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.ppc64le"
},
"product_reference": "kernel-0:4.18.0-80.15.1.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-80.15.1.el8_0.src as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.src"
},
"product_reference": "kernel-0:4.18.0-80.15.1.el8_0.src",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-80.15.1.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.x86_64"
},
"product_reference": "kernel-0:4.18.0-80.15.1.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:4.18.0-80.15.1.el8_0.noarch as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.15.1.el8_0.noarch"
},
"product_reference": "kernel-abi-whitelists-0:4.18.0-80.15.1.el8_0.noarch",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-80.15.1.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-80.15.1.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-80.15.1.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-80.15.1.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-80.15.1.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-80.15.1.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-80.15.1.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-80.15.1.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-80.15.1.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-80.15.1.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-80.15.1.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-80.15.1.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-80.15.1.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-80.15.1.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-80.15.1.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-80.15.1.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-80.15.1.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.15.1.el8_0.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-80.15.1.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-80.15.1.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.15.1.el8_0.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-80.15.1.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-80.15.1.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-80.15.1.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-80.15.1.el8_0.noarch as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.15.1.el8_0.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-80.15.1.el8_0.noarch",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-80.15.1.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-80.15.1.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-80.15.1.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-80.15.1.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-80.15.1.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-80.15.1.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-80.15.1.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-80.15.1.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-80.15.1.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-80.15.1.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-80.15.1.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-80.15.1.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-80.15.1.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.ppc64le"
},
"product_reference": "perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-80.15.1.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.x86_64"
},
"product_reference": "perf-0:4.18.0-80.15.1.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-80.15.1.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-80.15.1.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-80.15.1.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Intel"
]
},
{
"names": [
"Deepak Gupta"
],
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2018-12207",
"cwe": {
"id": "CWE-226",
"name": "Sensitive Information in Resource Not Removed Before Reuse"
},
"discovery_date": "2018-11-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1646768"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way Intel CPUs handle inconsistency between, virtual to physical memory address translations in CPU\u0027s local cache and system software\u0027s Paging structure entries. A privileged guest user may use this flaw to induce a hardware Machine Check Error on the host processor, resulting in a severe DoS scenario by halting the processor.\r\n\r\nSystem software like OS OR Virtual Machine Monitor (VMM) use virtual memory system for storing program instructions and data in memory. Virtual Memory system uses Paging structures like Page Tables and Page Directories to manage system memory. The processor\u0027s Memory Management Unit (MMU) uses Paging structure entries to translate program\u0027s virtual memory addresses to physical memory addresses. The processor stores these address translations into its local cache buffer called - Translation Lookaside Buffer (TLB). TLB has two parts, one for instructions and other for data addresses.\r\n\r\nSystem software can modify its Paging structure entries to change address mappings OR certain attributes like page size etc. Upon such Paging structure alterations in memory, system software must invalidate the corresponding address translations in the processor\u0027s TLB cache. But before this TLB invalidation takes place, a privileged guest user may trigger an instruction fetch operation, which could use an already cached, but now invalid, virtual to physical address translation from Instruction TLB (ITLB). Thus accessing an invalid physical memory address and resulting in halting the processor due to the Machine Check Error (MCE) on Page Size Change.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: Machine Check Error on Page Size Change (IFU)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.src",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-12207"
},
{
"category": "external",
"summary": "RHBZ#1646768",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646768"
},
{
"category": "external",
"summary": "RHSB-ifu-page-mce",
"url": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-12207",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12207"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-12207",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12207"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-01-22T21:26:18+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.src",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2020:0204"
},
{
"category": "workaround",
"details": "For mitigation related information, please refer to the Red Hat vulnerability article: https://access.redhat.com/security/vulnerabilities/ifu-page-mce .",
"product_ids": [
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.src",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.src",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: Machine Check Error on Page Size Change (IFU)"
},
{
"acknowledgments": [
{
"names": [
"Evgenii Shatokhin",
"Vasily Averin"
],
"organization": "Virtuozzo"
}
],
"cve": "CVE-2018-16884",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2018-12-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1660375"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u0027s NFS41+ subsystem. NFS41+ shares mounted in different network namespaces at the same time can make bc_svc_process() use wrong back-channel IDs and cause a use-after-free vulnerability. Thus a malicious container user can cause a host kernel memory corruption and a system panic. Due to the nature of the flaw, privilege escalation cannot be fully ruled out.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: nfs: use-after-free in svc_process_common()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.src",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-16884"
},
{
"category": "external",
"summary": "RHBZ#1660375",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1660375"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-16884",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16884"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-16884",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-16884"
}
],
"release_date": "2018-11-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-01-22T21:26:18+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.src",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2020:0204"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:H",
"version": "3.0"
},
"products": [
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.src",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: nfs: use-after-free in svc_process_common()"
},
{
"acknowledgments": [
{
"names": [
"Intel"
]
}
],
"cve": "CVE-2019-0154",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"discovery_date": "2019-06-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1724393"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Intel graphics hardware (GPU) where a local attacker with the ability to issue an ioctl could trigger a hardware level crash if MMIO registers were read while the graphics card was in a low-power state. This creates a denial of service situation and the GPU and connected displays will remain unusable until a reboot occurs.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: Intel GPU Denial Of Service while accessing MMIO in lower power state",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Intel plans to release BIOS firmware to correct this issue. Red Hat\u0027s kernel update should mitigate this vulnerability. Some older hardware will not have BIOS firmware update and will rely on operating system level protection to prevent access while the device is in low-power states. For more information see https://access.redhat.com/solutions/i915-graphics",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.src",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-0154"
},
{
"category": "external",
"summary": "RHBZ#1724393",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1724393"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-0154",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0154"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-0154",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0154"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/i915-graphics",
"url": "https://access.redhat.com/solutions/i915-graphics"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00260.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00260.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-01-22T21:26:18+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.src",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2020:0204"
},
{
"category": "workaround",
"details": "Preventing loading of the i915 kernel module will prevent attackers from using this exploit against the system however the power management functionality of the card will be disabled and the system may draw additional power. See this KCS article (https://access.redhat.com/solutions/41278) for instructions on how to disable a kernel module. Graphical displays may also be at low resolution or not work correctly. This mitigation may not be suitable if running graphical tools locally is required.",
"product_ids": [
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.src",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.src",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: Intel GPU Denial Of Service while accessing MMIO in lower power state"
},
{
"acknowledgments": [
{
"names": [
"Intel"
]
}
],
"cve": "CVE-2019-0155",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"discovery_date": "2019-06-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1724398"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Intel graphics hardware (GPU), where a local attacker with the ability to issue commands to the GPU could inadvertently lead to memory corruption and possible privilege escalation. The attacker could use the GPU blitter to perform privilege MMIO operations, not limited to the address space required to function correctly.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: Intel GPU blitter manipulation can allow for arbitrary kernel memory write",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/solutions/i915-graphics",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.src",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-0155"
},
{
"category": "external",
"summary": "RHBZ#1724398",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1724398"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-0155",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0155"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-0155",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0155"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/i915-graphics",
"url": "https://access.redhat.com/solutions/i915-graphics"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00242.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00242.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-01-22T21:26:18+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.src",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2020:0204"
},
{
"category": "workaround",
"details": "Preventing loading of the i915 kernel module will prevent attackers from using this exploit against the system however the power management functionality of the card will be disabled and the system may draw additional power. See this KCS article( https://access.redhat.com/solutions/41278 ) for instructions on how to disable a kernel module. Graphical displays may also be at low resolution or not work correctly. This mitigation may not be suitable if running graphical tools locally is required.",
"product_ids": [
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.src",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.src",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: Intel GPU blitter manipulation can allow for arbitrary kernel memory write"
},
{
"acknowledgments": [
{
"names": [
"Jason Wang"
],
"organization": "Red Hat Inc.",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2019-3900",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2019-04-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1698757"
}
],
"notes": [
{
"category": "description",
"text": "An infinite loop issue was found in the vhost_net kernel module while handling incoming packets in handle_rx(). The infinite loop could occur if one end sends packets faster than the other end can process them. A guest user, maybe a remote one, could use this flaw to stall the vhost_net kernel thread, resulting in a DoS scenario.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Kernel: vhost_net: infinite loop while receiving packets leads to DoS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue does not affect the versions of the kernel package as shipped with Red Hat Enterprise Linux 5 and Red Hat Enterprise MRG 2.\n\nThis issue affects the version of Linux kernel as shipped with Red Hat Enterprise Linux 6 and 7. Future kernel updates for Red Hat Enterprise Linux 6 and 7 may address this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.src",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-3900"
},
{
"category": "external",
"summary": "RHBZ#1698757",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1698757"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-3900",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3900"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-3900",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-3900"
}
],
"release_date": "2019-04-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-01-22T21:26:18+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.src",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2020:0204"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.src",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "Kernel: vhost_net: infinite loop while receiving packets leads to DoS"
},
{
"cve": "CVE-2019-5489",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2019-01-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1664110"
}
],
"notes": [
{
"category": "description",
"text": "A new software page cache side channel attack scenario was discovered in operating systems that implement the very common \u0027page cache\u0027 caching mechanism. A malicious user/process could use \u0027in memory\u0027 page-cache knowledge to infer access timings to shared memory and gain knowledge which can be used to reduce effectiveness of cryptographic strength by monitoring algorithmic behavior, infer access patterns of memory to determine code paths taken, and exfiltrate data to a blinded attacker through page-granularity access times as a side-channel.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Kernel: page cache side channel attacks",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.src",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-5489"
},
{
"category": "external",
"summary": "RHBZ#1664110",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1664110"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-5489",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5489"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-5489",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-5489"
}
],
"release_date": "2019-01-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-01-22T21:26:18+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.src",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2020:0204"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:L/A:N",
"version": "3.0"
},
"products": [
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.src",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "Kernel: page cache side channel attacks"
},
{
"cve": "CVE-2019-9506",
"cwe": {
"id": "CWE-327",
"name": "Use of a Broken or Risky Cryptographic Algorithm"
},
"discovery_date": "2019-06-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1727857"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in the Bluetooth protocol. An attacker within physical proximity to the Bluetooth connection could downgrade the encryption protocol to be trivially brute forced.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hardware: bluetooth: BR/EDR encryption key negotiation attacks (KNOB)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.src",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-9506"
},
{
"category": "external",
"summary": "RHBZ#1727857",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1727857"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-9506",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9506"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9506",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9506"
}
],
"release_date": "2019-08-10T09:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-01-22T21:26:18+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.src",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2020:0204"
},
{
"category": "workaround",
"details": "At this time there is no known mitigation if bluetooth hardware is to be continue to be used. Replacing the hardware with its wired version and disabling bluetooth may be a suitable alternative for some environments.",
"product_ids": [
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.src",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L",
"version": "3.0"
},
"products": [
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.src",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hardware: bluetooth: BR/EDR encryption key negotiation attacks (KNOB)"
},
{
"acknowledgments": [
{
"names": [
"huangwen"
],
"organization": "ADLab of Venustech"
}
],
"cve": "CVE-2019-10126",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2019-05-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1716992"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the mwifiex implementation in the Linux kernel. A system connecting to wireless access point could be manipulated by an attacker with advanced permissions on the access point into localized memory corruption or possibly privilege escalation.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Heap overflow in mwifiex_uap_parse_tail_ies function in drivers/net/wireless/marvell/mwifiex/ie.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.src",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-10126"
},
{
"category": "external",
"summary": "RHBZ#1716992",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1716992"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-10126",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10126"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-10126",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10126"
}
],
"release_date": "2019-05-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-01-22T21:26:18+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.src",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2020:0204"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.src",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Heap overflow in mwifiex_uap_parse_tail_ies function in drivers/net/wireless/marvell/mwifiex/ie.c"
},
{
"acknowledgments": [
{
"names": [
"Intel"
]
}
],
"cve": "CVE-2019-11135",
"cwe": {
"id": "CWE-203",
"name": "Observable Discrepancy"
},
"discovery_date": "2019-09-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1753062"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way Intel CPUs handle speculative execution of instructions when the TSX Asynchronous Abort (TAA) error occurs. A local authenticated attacker with the ability to monitor execution times could infer the TSX memory state by comparing abort execution times. This could allow information disclosure via this observed side-channel for any TSX transaction being executed while an attacker is able to observe abort timing.\r\n\r\nIntel\u0027s Transactional Synchronisation Extensions (TSX) are set of instructions which enable transactional memory support to improve performance of the multi-threaded applications, in the lock-protected critical sections. The CPU executes instructions in the critical-sections as transactions, while ensuring their atomic state. When such transaction execution is unsuccessful, the processor cannot ensure atomic updates to the transaction memory, so the processor rolls back or aborts such transaction execution.\r\n\r\nWhile TSX Asynchronous Abort (TAA) is pending, CPU may continue to read data from architectural buffers and pass it to the dependent speculative operations. This may cause information leakage via speculative side-channel means, which is quite similar to the Microarchitectural Data Sampling (MDS) issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: TSX Transaction Asynchronous Abort (TAA)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "libvirt and qemu-kvm on Red Hat Enterprise Linux 6 are not affected by this vulnerability as they do not support MSR-based CPU features.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.src",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11135"
},
{
"category": "external",
"summary": "RHBZ#1753062",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753062"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11135",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11135"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11135",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11135"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/tsx-asynchronousabort",
"url": "https://access.redhat.com/solutions/tsx-asynchronousabort"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00270.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00270.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-01-22T21:26:18+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.src",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2020:0204"
},
{
"category": "workaround",
"details": "For mitigation related information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/solutions/tsx-asynchronousabort",
"product_ids": [
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.src",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.src",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: TSX Transaction Asynchronous Abort (TAA)"
},
{
"acknowledgments": [
{
"names": [
"Huangwen"
],
"organization": "ADLab of Venustech"
}
],
"cve": "CVE-2019-14816",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2019-08-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1744149"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the Linux kernel\u0027s Marvell WiFi chip driver. Where, while parsing vendor-specific informational attributes, an attacker on the same WiFi physical network segment could cause a system crash, resulting in a denial of service, or potentially execute arbitrary code. This flaw affects the network interface at the most basic level meaning the attacker only needs to affiliate with the same network device as the vulnerable system to create an attack path.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: heap overflow in mwifiex_update_vs_ie() function of Marvell WiFi driver",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.src",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-14816"
},
{
"category": "external",
"summary": "RHBZ#1744149",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1744149"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-14816",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14816"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14816",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14816"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7caac62ed598a196d6ddf8d9c121e12e082cac3a",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7caac62ed598a196d6ddf8d9c121e12e082cac3a"
}
],
"release_date": "2019-08-28T10:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-01-22T21:26:18+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.src",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2020:0204"
},
{
"category": "workaround",
"details": "At this time there is no mitigation to the flaw, if you are able to disable wireless and your system is able to work this will be a temporary mitigation until a kernel update is available for installation.",
"product_ids": [
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.src",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.src",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: heap overflow in mwifiex_update_vs_ie() function of Marvell WiFi driver"
},
{
"acknowledgments": [
{
"names": [
"Matt Delco"
],
"organization": "Google.com"
}
],
"cve": "CVE-2019-14821",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2019-08-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1746708"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds access issue was found in the way Linux kernel\u0027s KVM hypervisor implements the Coalesced MMIO write operation. It operates on an MMIO ring buffer \u0027struct kvm_coalesced_mmio\u0027 object, wherein write indices \u0027ring-\u003efirst\u0027 and \u0027ring-\u003elast\u0027 value could be supplied by a host user-space process. An unprivileged host user or process with access to \u0027/dev/kvm\u0027 device could use this flaw to crash the host kernel, resulting in a denial of service or potentially escalating privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Kernel: KVM: OOB memory access via mmio ring buffer",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue requires unprivileged users to have access to \u0027/dev/kvm\u0027 device. So restricting access to \u0027/dev/kvm\u0027 device to known trusted users could limit its exploitation by untrusted users/processes.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.src",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-14821"
},
{
"category": "external",
"summary": "RHBZ#1746708",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1746708"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-14821",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14821"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14821",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14821"
}
],
"release_date": "2019-09-17T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-01-22T21:26:18+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.src",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2020:0204"
},
{
"category": "workaround",
"details": "Restrict access to the \u0027/dev/kvm\u0027 device to trusted users.",
"product_ids": [
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.src",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.src",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "Kernel: KVM: OOB memory access via mmio ring buffer"
},
{
"acknowledgments": [
{
"names": [
"Huangwen and Wang Qize"
],
"organization": "ADLab of VenusTech"
}
],
"cve": "CVE-2019-14901",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2019-11-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1773519"
}
],
"notes": [
{
"category": "description",
"text": "A heap overflow flaw was found in the Linux kernel\u0027s Marvell WiFi chip driver. The vulnerability allows a remote attacker to cause a system crash, resulting in a denial of service, or execute arbitrary code. The highest threat with this vulnerability is with the availability of the system. If code execution occurs, the code will run with the permissions of root. This will affect both confidentiality and integrity of files on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: heap overflow in marvell/mwifiex/tdls.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.src",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-14901"
},
{
"category": "external",
"summary": "RHBZ#1773519",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1773519"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-14901",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14901"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14901",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14901"
}
],
"release_date": "2019-11-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-01-22T21:26:18+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.src",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2020:0204"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.src",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: heap overflow in marvell/mwifiex/tdls.c"
}
]
}
rhsa-2019:3837
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 7.6 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* hw: Machine Check Error on Page Size Change (IFU) (CVE-2018-12207)\n\n* hw: TSX Transaction Asynchronous Abort (TAA) (CVE-2019-11135)\n\n* hw: Intel GPU Denial Of Service while accessing MMIO in lower power state (CVE-2019-0154)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2019:3837",
"url": "https://access.redhat.com/errata/RHSA-2019:3837"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce",
"url": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/tsx-asynchronousabort",
"url": "https://access.redhat.com/solutions/tsx-asynchronousabort"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/i915-graphics",
"url": "https://access.redhat.com/solutions/i915-graphics"
},
{
"category": "external",
"summary": "1646768",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646768"
},
{
"category": "external",
"summary": "1724393",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1724393"
},
{
"category": "external",
"summary": "1753062",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753062"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_3837.json"
}
],
"title": "Red Hat Security Advisory: kernel security update",
"tracking": {
"current_release_date": "2025-10-09T18:15:54+00:00",
"generator": {
"date": "2025-10-09T18:15:54+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2019:3837",
"initial_release_date": "2019-11-12T20:54:34+00:00",
"revision_history": [
{
"date": "2019-11-12T20:54:34+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2019-11-12T20:54:34+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T18:15:54+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product": {
"name": "Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::hypervisor"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.6::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.6::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product": {
"name": "Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.6::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-957.38.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-957.38.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"product_id": "kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-957.38.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-957.38.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-957.38.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"product": {
"name": "perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"product_id": "perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-957.38.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"product_id": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-957.38.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-0:3.10.0-957.38.2.el7.x86_64",
"product": {
"name": "bpftool-0:3.10.0-957.38.2.el7.x86_64",
"product_id": "bpftool-0:3.10.0-957.38.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@3.10.0-957.38.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-957.38.2.el7.x86_64",
"product": {
"name": "kernel-0:3.10.0-957.38.2.el7.x86_64",
"product_id": "kernel-0:3.10.0-957.38.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-957.38.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"product": {
"name": "kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"product_id": "kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-957.38.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"product_id": "kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-957.38.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"product": {
"name": "kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"product_id": "kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-957.38.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"product": {
"name": "kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"product_id": "kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-957.38.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"product": {
"name": "kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"product_id": "kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-957.38.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"product_id": "kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-957.38.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-957.38.2.el7.x86_64",
"product": {
"name": "perf-0:3.10.0-957.38.2.el7.x86_64",
"product_id": "perf-0:3.10.0-957.38.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-957.38.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-957.38.2.el7.x86_64",
"product": {
"name": "python-perf-0:3.10.0-957.38.2.el7.x86_64",
"product_id": "python-perf-0:3.10.0-957.38.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-957.38.2.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"product": {
"name": "kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"product_id": "kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-957.38.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"product_id": "kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-957.38.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"product_id": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-957.38.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"product_id": "kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-957.38.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@3.10.0-957.38.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"product_id": "kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-957.38.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"product": {
"name": "perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"product_id": "perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-957.38.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"product_id": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-957.38.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-957.38.2.el7.ppc64le",
"product": {
"name": "kernel-0:3.10.0-957.38.2.el7.ppc64le",
"product_id": "kernel-0:3.10.0-957.38.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-957.38.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"product": {
"name": "kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"product_id": "kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-957.38.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"product": {
"name": "kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"product_id": "kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-957.38.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"product": {
"name": "kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"product_id": "kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-957.38.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"product": {
"name": "kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"product_id": "kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-957.38.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"product": {
"name": "kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"product_id": "kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-957.38.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"product_id": "kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-957.38.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-957.38.2.el7.ppc64le",
"product": {
"name": "perf-0:3.10.0-957.38.2.el7.ppc64le",
"product_id": "perf-0:3.10.0-957.38.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-957.38.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"product": {
"name": "python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"product_id": "python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-957.38.2.el7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-957.38.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-957.38.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"product_id": "kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-957.38.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"product": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"product_id": "kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64@3.10.0-957.38.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-957.38.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"product": {
"name": "perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"product_id": "perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-957.38.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"product_id": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-957.38.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-957.38.2.el7.ppc64",
"product": {
"name": "kernel-0:3.10.0-957.38.2.el7.ppc64",
"product_id": "kernel-0:3.10.0-957.38.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-957.38.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"product": {
"name": "kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"product_id": "kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-957.38.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"product": {
"name": "kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"product_id": "kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-957.38.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"product_id": "kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-957.38.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"product": {
"name": "kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"product_id": "kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-957.38.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"product": {
"name": "kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"product_id": "kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-957.38.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"product": {
"name": "kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"product_id": "kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-957.38.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"product_id": "kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-957.38.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-957.38.2.el7.ppc64",
"product": {
"name": "perf-0:3.10.0-957.38.2.el7.ppc64",
"product_id": "perf-0:3.10.0-957.38.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-957.38.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-957.38.2.el7.ppc64",
"product": {
"name": "python-perf-0:3.10.0-957.38.2.el7.ppc64",
"product_id": "python-perf-0:3.10.0-957.38.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-957.38.2.el7?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-957.38.2.el7.src",
"product": {
"name": "kernel-0:3.10.0-957.38.2.el7.src",
"product_id": "kernel-0:3.10.0-957.38.2.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-957.38.2.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"product": {
"name": "kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"product_id": "kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-957.38.2.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"product": {
"name": "kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"product_id": "kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@3.10.0-957.38.2.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-957.38.2.el7.s390x",
"product": {
"name": "kernel-0:3.10.0-957.38.2.el7.s390x",
"product_id": "kernel-0:3.10.0-957.38.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-957.38.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"product": {
"name": "kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"product_id": "kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-957.38.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"product": {
"name": "kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"product_id": "kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-957.38.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"product": {
"name": "kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"product_id": "kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-957.38.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"product": {
"name": "kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"product_id": "kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-957.38.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"product": {
"name": "kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"product_id": "kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump@3.10.0-957.38.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"product": {
"name": "kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"product_id": "kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-devel@3.10.0-957.38.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-957.38.2.el7.s390x",
"product": {
"name": "perf-0:3.10.0-957.38.2.el7.s390x",
"product_id": "perf-0:3.10.0-957.38.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-957.38.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-957.38.2.el7.s390x",
"product": {
"name": "python-perf-0:3.10.0-957.38.2.el7.s390x",
"product_id": "python-perf-0:3.10.0-957.38.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-957.38.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"product_id": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-957.38.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"product": {
"name": "kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"product_id": "kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-957.38.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@3.10.0-957.38.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"product": {
"name": "kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"product_id": "kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@3.10.0-957.38.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"product": {
"name": "perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"product_id": "perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-957.38.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"product_id": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-957.38.2.el7?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.38.2.el7.src as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-957.38.2.el7.src",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-957.38.2.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "perf-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.38.2.el7.src as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-957.38.2.el7.src",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-957.38.2.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "perf-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:bpftool-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.38.2.el7.src as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-957.38.2.el7.src",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-957.38.2.el7.noarch as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-doc-0:3.10.0-957.38.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-kdump-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "perf-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.38.2.el7.src as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-957.38.2.el7.src",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-957.38.2.el7.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "perf-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.38.2.el7.src as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-957.38.2.el7.src",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-957.38.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "perf-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Intel"
]
},
{
"names": [
"Deepak Gupta"
],
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2018-12207",
"cwe": {
"id": "CWE-226",
"name": "Sensitive Information in Resource Not Removed Before Reuse"
},
"discovery_date": "2018-11-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1646768"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way Intel CPUs handle inconsistency between, virtual to physical memory address translations in CPU\u0027s local cache and system software\u0027s Paging structure entries. A privileged guest user may use this flaw to induce a hardware Machine Check Error on the host processor, resulting in a severe DoS scenario by halting the processor.\r\n\r\nSystem software like OS OR Virtual Machine Monitor (VMM) use virtual memory system for storing program instructions and data in memory. Virtual Memory system uses Paging structures like Page Tables and Page Directories to manage system memory. The processor\u0027s Memory Management Unit (MMU) uses Paging structure entries to translate program\u0027s virtual memory addresses to physical memory addresses. The processor stores these address translations into its local cache buffer called - Translation Lookaside Buffer (TLB). TLB has two parts, one for instructions and other for data addresses.\r\n\r\nSystem software can modify its Paging structure entries to change address mappings OR certain attributes like page size etc. Upon such Paging structure alterations in memory, system software must invalidate the corresponding address translations in the processor\u0027s TLB cache. But before this TLB invalidation takes place, a privileged guest user may trigger an instruction fetch operation, which could use an already cached, but now invalid, virtual to physical address translation from Instruction TLB (ITLB). Thus accessing an invalid physical memory address and resulting in halting the processor due to the Machine Check Error (MCE) on Page Size Change.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: Machine Check Error on Page Size Change (IFU)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7ComputeNode-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7ComputeNode-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7ComputeNode-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.src",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7Server-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7Server-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-12207"
},
{
"category": "external",
"summary": "RHBZ#1646768",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646768"
},
{
"category": "external",
"summary": "RHSB-ifu-page-mce",
"url": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-12207",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12207"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-12207",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12207"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-11-12T20:54:34+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7ComputeNode-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7ComputeNode-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7ComputeNode-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.src",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7Server-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7Server-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:3837"
},
{
"category": "workaround",
"details": "For mitigation related information, please refer to the Red Hat vulnerability article: https://access.redhat.com/security/vulnerabilities/ifu-page-mce .",
"product_ids": [
"7ComputeNode-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7ComputeNode-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7ComputeNode-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.src",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7Server-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7Server-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7ComputeNode-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7ComputeNode-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7ComputeNode-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.src",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7Server-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7Server-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: Machine Check Error on Page Size Change (IFU)"
},
{
"acknowledgments": [
{
"names": [
"Intel"
]
}
],
"cve": "CVE-2019-0154",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"discovery_date": "2019-06-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1724393"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Intel graphics hardware (GPU) where a local attacker with the ability to issue an ioctl could trigger a hardware level crash if MMIO registers were read while the graphics card was in a low-power state. This creates a denial of service situation and the GPU and connected displays will remain unusable until a reboot occurs.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: Intel GPU Denial Of Service while accessing MMIO in lower power state",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Intel plans to release BIOS firmware to correct this issue. Red Hat\u0027s kernel update should mitigate this vulnerability. Some older hardware will not have BIOS firmware update and will rely on operating system level protection to prevent access while the device is in low-power states. For more information see https://access.redhat.com/solutions/i915-graphics",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7ComputeNode-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7ComputeNode-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7ComputeNode-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.src",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7Server-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7Server-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-0154"
},
{
"category": "external",
"summary": "RHBZ#1724393",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1724393"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-0154",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0154"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-0154",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0154"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/i915-graphics",
"url": "https://access.redhat.com/solutions/i915-graphics"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00260.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00260.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-11-12T20:54:34+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7ComputeNode-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7ComputeNode-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7ComputeNode-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.src",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7Server-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7Server-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:3837"
},
{
"category": "workaround",
"details": "Preventing loading of the i915 kernel module will prevent attackers from using this exploit against the system however the power management functionality of the card will be disabled and the system may draw additional power. See this KCS article (https://access.redhat.com/solutions/41278) for instructions on how to disable a kernel module. Graphical displays may also be at low resolution or not work correctly. This mitigation may not be suitable if running graphical tools locally is required.",
"product_ids": [
"7ComputeNode-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7ComputeNode-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7ComputeNode-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.src",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7Server-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7Server-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7ComputeNode-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7ComputeNode-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7ComputeNode-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.src",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7Server-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7Server-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: Intel GPU Denial Of Service while accessing MMIO in lower power state"
},
{
"acknowledgments": [
{
"names": [
"Intel"
]
}
],
"cve": "CVE-2019-11135",
"cwe": {
"id": "CWE-203",
"name": "Observable Discrepancy"
},
"discovery_date": "2019-09-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1753062"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way Intel CPUs handle speculative execution of instructions when the TSX Asynchronous Abort (TAA) error occurs. A local authenticated attacker with the ability to monitor execution times could infer the TSX memory state by comparing abort execution times. This could allow information disclosure via this observed side-channel for any TSX transaction being executed while an attacker is able to observe abort timing.\r\n\r\nIntel\u0027s Transactional Synchronisation Extensions (TSX) are set of instructions which enable transactional memory support to improve performance of the multi-threaded applications, in the lock-protected critical sections. The CPU executes instructions in the critical-sections as transactions, while ensuring their atomic state. When such transaction execution is unsuccessful, the processor cannot ensure atomic updates to the transaction memory, so the processor rolls back or aborts such transaction execution.\r\n\r\nWhile TSX Asynchronous Abort (TAA) is pending, CPU may continue to read data from architectural buffers and pass it to the dependent speculative operations. This may cause information leakage via speculative side-channel means, which is quite similar to the Microarchitectural Data Sampling (MDS) issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: TSX Transaction Asynchronous Abort (TAA)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "libvirt and qemu-kvm on Red Hat Enterprise Linux 6 are not affected by this vulnerability as they do not support MSR-based CPU features.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7ComputeNode-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7ComputeNode-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7ComputeNode-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.src",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7Server-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7Server-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11135"
},
{
"category": "external",
"summary": "RHBZ#1753062",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753062"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11135",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11135"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11135",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11135"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/tsx-asynchronousabort",
"url": "https://access.redhat.com/solutions/tsx-asynchronousabort"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00270.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00270.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-11-12T20:54:34+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7ComputeNode-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7ComputeNode-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7ComputeNode-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.src",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7Server-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7Server-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:3837"
},
{
"category": "workaround",
"details": "For mitigation related information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/solutions/tsx-asynchronousabort",
"product_ids": [
"7ComputeNode-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7ComputeNode-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7ComputeNode-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.src",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7Server-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7Server-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"7ComputeNode-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7ComputeNode-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7ComputeNode-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.src",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7Server-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7Server-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: TSX Transaction Asynchronous Abort (TAA)"
}
]
}
rhsa-2019_3836
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 6.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* hw: Machine Check Error on Page Size Change (IFU) (CVE-2018-12207)\n\n* hw: TSX Transaction Asynchronous Abort (TAA) (CVE-2019-11135)\n\n* Kernel: vhost_net: infinite loop while receiving packets leads to DoS (CVE-2019-3900)\n\n* hw: Intel GPU Denial Of Service while accessing MMIO in lower power state (CVE-2019-0154)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* [Intel 6.10 Bug] With mWait/C-states disabled, HT on, ibrs enabled, performance impact observed on user space benchmark (BZ#1560787)\n\n* kernel-2.6.32-573.60.2.el6 hangs/resets during boot in efi_enter_virtual_mode() on Xeon v2 E7-2870 (BZ#1645724)\n\n* Slab leak: skbuff_head_cache slab object still allocated after mcast processes are stopped and \"fragments dropped after timeout\" errors are shown (BZ#1752536)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2019:3836",
"url": "https://access.redhat.com/errata/RHSA-2019:3836"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce",
"url": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/tsx-asynchronousabort",
"url": "https://access.redhat.com/solutions/tsx-asynchronousabort"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/i915-graphics",
"url": "https://access.redhat.com/solutions/i915-graphics"
},
{
"category": "external",
"summary": "1646768",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646768"
},
{
"category": "external",
"summary": "1698757",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1698757"
},
{
"category": "external",
"summary": "1724393",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1724393"
},
{
"category": "external",
"summary": "1753062",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753062"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_3836.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2024-11-15T05:17:59+00:00",
"generator": {
"date": "2024-11-15T05:17:59+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2019:3836",
"initial_release_date": "2019-11-12T21:11:39+00:00",
"revision_history": [
{
"date": "2019-11-12T21:11:39+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2019-11-12T21:11:39+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-15T05:17:59+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux HPC Node (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::workstation"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::workstation"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.32-754.24.2.el6.i686",
"product": {
"name": "kernel-0:2.6.32-754.24.2.el6.i686",
"product_id": "kernel-0:2.6.32-754.24.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-754.24.2.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-754.24.2.el6.i686",
"product": {
"name": "kernel-debug-0:2.6.32-754.24.2.el6.i686",
"product_id": "kernel-debug-0:2.6.32-754.24.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-754.24.2.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"product": {
"name": "kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"product_id": "kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-754.24.2.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-754.24.2.el6.i686",
"product": {
"name": "kernel-devel-0:2.6.32-754.24.2.el6.i686",
"product_id": "kernel-devel-0:2.6.32-754.24.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-754.24.2.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.32-754.24.2.el6.i686",
"product": {
"name": "kernel-headers-0:2.6.32-754.24.2.el6.i686",
"product_id": "kernel-headers-0:2.6.32-754.24.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.32-754.24.2.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "perf-0:2.6.32-754.24.2.el6.i686",
"product": {
"name": "perf-0:2.6.32-754.24.2.el6.i686",
"product_id": "perf-0:2.6.32-754.24.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-754.24.2.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"product_id": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-754.24.2.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"product": {
"name": "kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"product_id": "kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-754.24.2.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"product": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"product_id": "kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-i686@2.6.32-754.24.2.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"product": {
"name": "perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"product_id": "perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-754.24.2.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"product": {
"name": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"product_id": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-754.24.2.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:2.6.32-754.24.2.el6.i686",
"product": {
"name": "python-perf-0:2.6.32-754.24.2.el6.i686",
"product_id": "python-perf-0:2.6.32-754.24.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@2.6.32-754.24.2.el6?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.32-754.24.2.el6.x86_64",
"product": {
"name": "kernel-0:2.6.32-754.24.2.el6.x86_64",
"product_id": "kernel-0:2.6.32-754.24.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-754.24.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"product": {
"name": "kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"product_id": "kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-754.24.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"product": {
"name": "kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"product_id": "kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-754.24.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"product": {
"name": "kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"product_id": "kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-754.24.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"product": {
"name": "kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"product_id": "kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.32-754.24.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:2.6.32-754.24.2.el6.x86_64",
"product": {
"name": "perf-0:2.6.32-754.24.2.el6.x86_64",
"product_id": "perf-0:2.6.32-754.24.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-754.24.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"product_id": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-754.24.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"product": {
"name": "kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"product_id": "kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-754.24.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@2.6.32-754.24.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"product": {
"name": "perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"product_id": "perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-754.24.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"product": {
"name": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"product_id": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-754.24.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:2.6.32-754.24.2.el6.x86_64",
"product": {
"name": "python-perf-0:2.6.32-754.24.2.el6.x86_64",
"product_id": "python-perf-0:2.6.32-754.24.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@2.6.32-754.24.2.el6?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.32-754.24.2.el6.src",
"product": {
"name": "kernel-0:2.6.32-754.24.2.el6.src",
"product_id": "kernel-0:2.6.32-754.24.2.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-754.24.2.el6?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"product": {
"name": "kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"product_id": "kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@2.6.32-754.24.2.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"product": {
"name": "kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"product_id": "kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@2.6.32-754.24.2.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"product": {
"name": "kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"product_id": "kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-firmware@2.6.32-754.24.2.el6?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.32-754.24.2.el6.s390x",
"product": {
"name": "kernel-0:2.6.32-754.24.2.el6.s390x",
"product_id": "kernel-0:2.6.32-754.24.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-754.24.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"product": {
"name": "kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"product_id": "kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-754.24.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"product": {
"name": "kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"product_id": "kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-754.24.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"product": {
"name": "kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"product_id": "kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-754.24.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"product": {
"name": "kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"product_id": "kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.32-754.24.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"product": {
"name": "kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"product_id": "kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump@2.6.32-754.24.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"product": {
"name": "kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"product_id": "kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.32-754.24.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:2.6.32-754.24.2.el6.s390x",
"product": {
"name": "perf-0:2.6.32-754.24.2.el6.s390x",
"product_id": "perf-0:2.6.32-754.24.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-754.24.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"product_id": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-754.24.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"product": {
"name": "kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"product_id": "kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-754.24.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@2.6.32-754.24.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"product": {
"name": "kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"product_id": "kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.32-754.24.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"product": {
"name": "perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"product_id": "perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-754.24.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"product": {
"name": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"product_id": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-754.24.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:2.6.32-754.24.2.el6.s390x",
"product": {
"name": "python-perf-0:2.6.32-754.24.2.el6.s390x",
"product_id": "python-perf-0:2.6.32-754.24.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@2.6.32-754.24.2.el6?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.32-754.24.2.el6.ppc64",
"product": {
"name": "kernel-0:2.6.32-754.24.2.el6.ppc64",
"product_id": "kernel-0:2.6.32-754.24.2.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-754.24.2.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"product": {
"name": "kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"product_id": "kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@2.6.32-754.24.2.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"product": {
"name": "kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"product_id": "kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-754.24.2.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"product": {
"name": "kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"product_id": "kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-754.24.2.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"product": {
"name": "kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"product_id": "kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-754.24.2.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"product": {
"name": "kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"product_id": "kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.32-754.24.2.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "perf-0:2.6.32-754.24.2.el6.ppc64",
"product": {
"name": "perf-0:2.6.32-754.24.2.el6.ppc64",
"product_id": "perf-0:2.6.32-754.24.2.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-754.24.2.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"product_id": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-754.24.2.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"product": {
"name": "kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"product_id": "kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-754.24.2.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"product": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"product_id": "kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64@2.6.32-754.24.2.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"product": {
"name": "perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"product_id": "perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-754.24.2.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"product": {
"name": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"product_id": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-754.24.2.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:2.6.32-754.24.2.el6.ppc64",
"product": {
"name": "python-perf-0:2.6.32-754.24.2.el6.ppc64",
"product_id": "python-perf-0:2.6.32-754.24.2.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@2.6.32-754.24.2.el6?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.24.2.el6.src as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.src"
},
"product_reference": "kernel-0:2.6.32-754.24.2.el6.src",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-754.24.2.el6.noarch as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-754.24.2.el6.noarch as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "perf-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "perf-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "perf-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "python-perf-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.24.2.el6.src as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src"
},
"product_reference": "kernel-0:2.6.32-754.24.2.el6.src",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-754.24.2.el6.noarch as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-754.24.2.el6.noarch as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "perf-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "perf-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "perf-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "python-perf-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.24.2.el6.src as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.src"
},
"product_reference": "kernel-0:2.6.32-754.24.2.el6.src",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-754.24.2.el6.noarch as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-754.24.2.el6.noarch as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "perf-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "perf-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "perf-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "python-perf-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.24.2.el6.src as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src"
},
"product_reference": "kernel-0:2.6.32-754.24.2.el6.src",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-754.24.2.el6.noarch as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-754.24.2.el6.noarch as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "perf-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "perf-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "perf-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "python-perf-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.24.2.el6.src as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.src"
},
"product_reference": "kernel-0:2.6.32-754.24.2.el6.src",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-754.24.2.el6.noarch as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-754.24.2.el6.noarch as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "perf-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "perf-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "perf-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "python-perf-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.24.2.el6.src as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src"
},
"product_reference": "kernel-0:2.6.32-754.24.2.el6.src",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-754.24.2.el6.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-754.24.2.el6.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "perf-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "perf-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "perf-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "python-perf-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.24.2.el6.src as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.src"
},
"product_reference": "kernel-0:2.6.32-754.24.2.el6.src",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-754.24.2.el6.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-754.24.2.el6.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "perf-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "perf-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "perf-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "python-perf-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.24.2.el6.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src"
},
"product_reference": "kernel-0:2.6.32-754.24.2.el6.src",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-754.24.2.el6.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-754.24.2.el6.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "perf-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "perf-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "perf-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "python-perf-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Intel"
]
},
{
"names": [
"Deepak Gupta"
],
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2018-12207",
"cwe": {
"id": "CWE-226",
"name": "Sensitive Information in Resource Not Removed Before Reuse"
},
"discovery_date": "2018-11-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1646768"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way Intel CPUs handle inconsistency between, virtual to physical memory address translations in CPU\u0027s local cache and system software\u0027s Paging structure entries. A privileged guest user may use this flaw to induce a hardware Machine Check Error on the host processor, resulting in a severe DoS scenario by halting the processor.\r\n\r\nSystem software like OS OR Virtual Machine Monitor (VMM) use virtual memory system for storing program instructions and data in memory. Virtual Memory system uses Paging structures like Page Tables and Page Directories to manage system memory. The processor\u0027s Memory Management Unit (MMU) uses Paging structure entries to translate program\u0027s virtual memory addresses to physical memory addresses. The processor stores these address translations into its local cache buffer called - Translation Lookaside Buffer (TLB). TLB has two parts, one for instructions and other for data addresses.\r\n\r\nSystem software can modify its Paging structure entries to change address mappings OR certain attributes like page size etc. Upon such Paging structure alterations in memory, system software must invalidate the corresponding address translations in the processor\u0027s TLB cache. But before this TLB invalidation takes place, a privileged guest user may trigger an instruction fetch operation, which could use an already cached, but now invalid, virtual to physical address translation from Instruction TLB (ITLB). Thus accessing an invalid physical memory address and resulting in halting the processor due to the Machine Check Error (MCE) on Page Size Change.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: Machine Check Error on Page Size Change (IFU)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Client-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Server-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-12207"
},
{
"category": "external",
"summary": "RHBZ#1646768",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646768"
},
{
"category": "external",
"summary": "RHSB-ifu-page-mce",
"url": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-12207",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12207"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-12207",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12207"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-11-12T21:11:39+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Client-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Server-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:3836"
},
{
"category": "workaround",
"details": "For mitigation related information, please refer to the Red Hat vulnerability article: https://access.redhat.com/security/vulnerabilities/ifu-page-mce .",
"product_ids": [
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Client-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Server-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Client-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Server-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: Machine Check Error on Page Size Change (IFU)"
},
{
"acknowledgments": [
{
"names": [
"Intel"
]
}
],
"cve": "CVE-2019-0154",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"discovery_date": "2019-06-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1724393"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Intel graphics hardware (GPU) where a local attacker with the ability to issue an ioctl could trigger a hardware level crash if MMIO registers were read while the graphics card was in a low-power state. This creates a denial of service situation and the GPU and connected displays will remain unusable until a reboot occurs.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: Intel GPU Denial Of Service while accessing MMIO in lower power state",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Intel plans to release BIOS firmware to correct this issue. Red Hat\u0027s kernel update should mitigate this vulnerability. Some older hardware will not have BIOS firmware update and will rely on operating system level protection to prevent access while the device is in low-power states. For more information see https://access.redhat.com/solutions/i915-graphics",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Client-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Server-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-0154"
},
{
"category": "external",
"summary": "RHBZ#1724393",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1724393"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-0154",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0154"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-0154",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0154"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/i915-graphics",
"url": "https://access.redhat.com/solutions/i915-graphics"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00260.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00260.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-11-12T21:11:39+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Client-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Server-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:3836"
},
{
"category": "workaround",
"details": "Preventing loading of the i915 kernel module will prevent attackers from using this exploit against the system however the power management functionality of the card will be disabled and the system may draw additional power. See this KCS article (https://access.redhat.com/solutions/41278) for instructions on how to disable a kernel module. Graphical displays may also be at low resolution or not work correctly. This mitigation may not be suitable if running graphical tools locally is required.",
"product_ids": [
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Client-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Server-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Client-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Server-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: Intel GPU Denial Of Service while accessing MMIO in lower power state"
},
{
"acknowledgments": [
{
"names": [
"Jason Wang"
],
"organization": "Red Hat Inc.",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2019-3900",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2019-04-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1698757"
}
],
"notes": [
{
"category": "description",
"text": "An infinite loop issue was found in the vhost_net kernel module while handling incoming packets in handle_rx(). The infinite loop could occur if one end sends packets faster than the other end can process them. A guest user, maybe a remote one, could use this flaw to stall the vhost_net kernel thread, resulting in a DoS scenario.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Kernel: vhost_net: infinite loop while receiving packets leads to DoS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue does not affect the versions of the kernel package as shipped with Red Hat Enterprise Linux 5 and Red Hat Enterprise MRG 2.\n\nThis issue affects the version of Linux kernel as shipped with Red Hat Enterprise Linux 6 and 7. Future kernel updates for Red Hat Enterprise Linux 6 and 7 may address this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Client-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Server-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-3900"
},
{
"category": "external",
"summary": "RHBZ#1698757",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1698757"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-3900",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3900"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-3900",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-3900"
}
],
"release_date": "2019-04-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-11-12T21:11:39+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Client-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Server-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:3836"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Client-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Server-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "Kernel: vhost_net: infinite loop while receiving packets leads to DoS"
},
{
"acknowledgments": [
{
"names": [
"Intel"
]
}
],
"cve": "CVE-2019-11135",
"cwe": {
"id": "CWE-203",
"name": "Observable Discrepancy"
},
"discovery_date": "2019-09-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1753062"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way Intel CPUs handle speculative execution of instructions when the TSX Asynchronous Abort (TAA) error occurs. A local authenticated attacker with the ability to monitor execution times could infer the TSX memory state by comparing abort execution times. This could allow information disclosure via this observed side-channel for any TSX transaction being executed while an attacker is able to observe abort timing.\r\n\r\nIntel\u0027s Transactional Synchronisation Extensions (TSX) are set of instructions which enable transactional memory support to improve performance of the multi-threaded applications, in the lock-protected critical sections. The CPU executes instructions in the critical-sections as transactions, while ensuring their atomic state. When such transaction execution is unsuccessful, the processor cannot ensure atomic updates to the transaction memory, so the processor rolls back or aborts such transaction execution.\r\n\r\nWhile TSX Asynchronous Abort (TAA) is pending, CPU may continue to read data from architectural buffers and pass it to the dependent speculative operations. This may cause information leakage via speculative side-channel means, which is quite similar to the Microarchitectural Data Sampling (MDS) issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: TSX Transaction Asynchronous Abort (TAA)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "libvirt and qemu-kvm on Red Hat Enterprise Linux 6 are not affected by this vulnerability as they do not support MSR-based CPU features.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Client-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Server-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11135"
},
{
"category": "external",
"summary": "RHBZ#1753062",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753062"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11135",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11135"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11135",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11135"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/tsx-asynchronousabort",
"url": "https://access.redhat.com/solutions/tsx-asynchronousabort"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00270.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00270.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-11-12T21:11:39+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Client-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Server-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:3836"
},
{
"category": "workaround",
"details": "For mitigation related information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/solutions/tsx-asynchronousabort",
"product_ids": [
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Client-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Server-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Client-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Server-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: TSX Transaction Asynchronous Abort (TAA)"
}
]
}
rhsa-2019:3834
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* hw: Machine Check Error on Page Size Change (IFU) (CVE-2018-12207)\n\n* hw: TSX Transaction Asynchronous Abort (TAA) (CVE-2019-11135)\n\n* hw: Intel GPU Denial Of Service while accessing MMIO in lower power state (CVE-2019-0154)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2019:3834",
"url": "https://access.redhat.com/errata/RHSA-2019:3834"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce",
"url": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/tsx-asynchronousabort",
"url": "https://access.redhat.com/solutions/tsx-asynchronousabort"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/i915-graphics",
"url": "https://access.redhat.com/solutions/i915-graphics"
},
{
"category": "external",
"summary": "1646768",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646768"
},
{
"category": "external",
"summary": "1724393",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1724393"
},
{
"category": "external",
"summary": "1753062",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753062"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_3834.json"
}
],
"title": "Red Hat Security Advisory: kernel security update",
"tracking": {
"current_release_date": "2025-10-09T18:15:53+00:00",
"generator": {
"date": "2025-10-09T18:15:53+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2019:3834",
"initial_release_date": "2019-11-12T21:02:41+00:00",
"revision_history": [
{
"date": "2019-11-12T21:02:41+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2019-11-12T21:02:41+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T18:15:53+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Client (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Client Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"product": {
"name": "bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"product_id": "bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@3.10.0-1062.4.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-1062.4.2.el7.x86_64",
"product": {
"name": "kernel-0:3.10.0-1062.4.2.el7.x86_64",
"product_id": "kernel-0:3.10.0-1062.4.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-1062.4.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"product": {
"name": "kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"product_id": "kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-1062.4.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"product_id": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-1062.4.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"product": {
"name": "kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"product_id": "kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-1062.4.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"product": {
"name": "kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"product_id": "kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-1062.4.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"product": {
"name": "kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"product_id": "kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-1062.4.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"product_id": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-1062.4.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-1062.4.2.el7.x86_64",
"product": {
"name": "perf-0:3.10.0-1062.4.2.el7.x86_64",
"product_id": "perf-0:3.10.0-1062.4.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-1062.4.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"product": {
"name": "python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"product_id": "python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-1062.4.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"product": {
"name": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"product_id": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@3.10.0-1062.4.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-1062.4.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"product_id": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-1062.4.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-1062.4.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-1062.4.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"product": {
"name": "perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"product_id": "perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-1062.4.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"product_id": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-1062.4.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-1062.4.2.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-1062.4.2.el7.src",
"product": {
"name": "kernel-0:3.10.0-1062.4.2.el7.src",
"product_id": "kernel-0:3.10.0-1062.4.2.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-1062.4.2.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"product": {
"name": "kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"product_id": "kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-1062.4.2.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"product": {
"name": "kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"product_id": "kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@3.10.0-1062.4.2.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:3.10.0-1062.4.2.el7.s390x",
"product": {
"name": "bpftool-0:3.10.0-1062.4.2.el7.s390x",
"product_id": "bpftool-0:3.10.0-1062.4.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@3.10.0-1062.4.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-1062.4.2.el7.s390x",
"product": {
"name": "kernel-0:3.10.0-1062.4.2.el7.s390x",
"product_id": "kernel-0:3.10.0-1062.4.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-1062.4.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"product": {
"name": "kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"product_id": "kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-1062.4.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"product": {
"name": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"product_id": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-1062.4.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"product": {
"name": "kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"product_id": "kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-1062.4.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"product": {
"name": "kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"product_id": "kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-1062.4.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"product": {
"name": "kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"product_id": "kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump@3.10.0-1062.4.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"product": {
"name": "kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"product_id": "kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-devel@3.10.0-1062.4.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-1062.4.2.el7.s390x",
"product": {
"name": "perf-0:3.10.0-1062.4.2.el7.s390x",
"product_id": "perf-0:3.10.0-1062.4.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-1062.4.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-1062.4.2.el7.s390x",
"product": {
"name": "python-perf-0:3.10.0-1062.4.2.el7.s390x",
"product_id": "python-perf-0:3.10.0-1062.4.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-1062.4.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"product": {
"name": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"product_id": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@3.10.0-1062.4.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"product_id": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-1062.4.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"product": {
"name": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"product_id": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-1062.4.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@3.10.0-1062.4.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"product": {
"name": "kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"product_id": "kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@3.10.0-1062.4.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"product": {
"name": "perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"product_id": "perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-1062.4.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"product_id": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-1062.4.2.el7?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"product": {
"name": "bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"product_id": "bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@3.10.0-1062.4.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-1062.4.2.el7.ppc64",
"product": {
"name": "kernel-0:3.10.0-1062.4.2.el7.ppc64",
"product_id": "kernel-0:3.10.0-1062.4.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-1062.4.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"product": {
"name": "kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"product_id": "kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-1062.4.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"product": {
"name": "kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"product_id": "kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-1062.4.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"product_id": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-1062.4.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"product": {
"name": "kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"product_id": "kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-1062.4.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"product": {
"name": "kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"product_id": "kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-1062.4.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"product": {
"name": "kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"product_id": "kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-1062.4.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"product_id": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-1062.4.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-1062.4.2.el7.ppc64",
"product": {
"name": "perf-0:3.10.0-1062.4.2.el7.ppc64",
"product_id": "perf-0:3.10.0-1062.4.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-1062.4.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"product": {
"name": "python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"product_id": "python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-1062.4.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"product": {
"name": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"product_id": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@3.10.0-1062.4.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-1062.4.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"product_id": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-1062.4.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"product": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"product_id": "kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64@3.10.0-1062.4.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-1062.4.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"product": {
"name": "perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"product_id": "perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-1062.4.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"product_id": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-1062.4.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-1062.4.2.el7?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"product": {
"name": "bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"product_id": "bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@3.10.0-1062.4.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"product": {
"name": "kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"product_id": "kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-1062.4.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"product": {
"name": "kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"product_id": "kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-1062.4.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"product": {
"name": "kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"product_id": "kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-1062.4.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"product": {
"name": "kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"product_id": "kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-1062.4.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"product": {
"name": "kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"product_id": "kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-1062.4.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"product": {
"name": "kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"product_id": "kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-1062.4.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"product_id": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-1062.4.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-1062.4.2.el7.ppc64le",
"product": {
"name": "perf-0:3.10.0-1062.4.2.el7.ppc64le",
"product_id": "perf-0:3.10.0-1062.4.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-1062.4.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"product": {
"name": "python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"product_id": "python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-1062.4.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"product": {
"name": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"product_id": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@3.10.0-1062.4.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"product_id": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-1062.4.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"product_id": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-1062.4.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@3.10.0-1062.4.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"product_id": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-1062.4.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"product": {
"name": "perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"product_id": "perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-1062.4.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"product_id": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-1062.4.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"product": {
"name": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"product_id": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-1062.4.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"product_id": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-1062.4.2.el7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "bpftool-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.4.2.el7.src as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-1062.4.2.el7.src",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1062.4.2.el7.noarch as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "perf-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "bpftool-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.4.2.el7.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-1062.4.2.el7.src",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1062.4.2.el7.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "perf-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "bpftool-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.4.2.el7.src as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-1062.4.2.el7.src",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1062.4.2.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "perf-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "bpftool-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.4.2.el7.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-1062.4.2.el7.src",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1062.4.2.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "perf-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "bpftool-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.4.2.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-1062.4.2.el7.src",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1062.4.2.el7.noarch as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "perf-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "bpftool-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.4.2.el7.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-1062.4.2.el7.src",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1062.4.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "perf-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "bpftool-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.4.2.el7.src as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-1062.4.2.el7.src",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1062.4.2.el7.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "perf-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "bpftool-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.4.2.el7.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-1062.4.2.el7.src",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1062.4.2.el7.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "perf-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Intel"
]
},
{
"names": [
"Deepak Gupta"
],
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2018-12207",
"cwe": {
"id": "CWE-226",
"name": "Sensitive Information in Resource Not Removed Before Reuse"
},
"discovery_date": "2018-11-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1646768"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way Intel CPUs handle inconsistency between, virtual to physical memory address translations in CPU\u0027s local cache and system software\u0027s Paging structure entries. A privileged guest user may use this flaw to induce a hardware Machine Check Error on the host processor, resulting in a severe DoS scenario by halting the processor.\r\n\r\nSystem software like OS OR Virtual Machine Monitor (VMM) use virtual memory system for storing program instructions and data in memory. Virtual Memory system uses Paging structures like Page Tables and Page Directories to manage system memory. The processor\u0027s Memory Management Unit (MMU) uses Paging structure entries to translate program\u0027s virtual memory addresses to physical memory addresses. The processor stores these address translations into its local cache buffer called - Translation Lookaside Buffer (TLB). TLB has two parts, one for instructions and other for data addresses.\r\n\r\nSystem software can modify its Paging structure entries to change address mappings OR certain attributes like page size etc. Upon such Paging structure alterations in memory, system software must invalidate the corresponding address translations in the processor\u0027s TLB cache. But before this TLB invalidation takes place, a privileged guest user may trigger an instruction fetch operation, which could use an already cached, but now invalid, virtual to physical address translation from Instruction TLB (ITLB). Thus accessing an invalid physical memory address and resulting in halting the processor due to the Machine Check Error (MCE) on Page Size Change.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: Machine Check Error on Page Size Change (IFU)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Client-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Client-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7ComputeNode-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7ComputeNode-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Server-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Server-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Workstation-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Workstation-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-12207"
},
{
"category": "external",
"summary": "RHBZ#1646768",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646768"
},
{
"category": "external",
"summary": "RHSB-ifu-page-mce",
"url": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-12207",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12207"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-12207",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12207"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-11-12T21:02:41+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Client-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Client-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7ComputeNode-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7ComputeNode-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Server-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Server-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Workstation-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Workstation-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:3834"
},
{
"category": "workaround",
"details": "For mitigation related information, please refer to the Red Hat vulnerability article: https://access.redhat.com/security/vulnerabilities/ifu-page-mce .",
"product_ids": [
"7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Client-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Client-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7ComputeNode-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7ComputeNode-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Server-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Server-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Workstation-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Workstation-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Client-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Client-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7ComputeNode-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7ComputeNode-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Server-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Server-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Workstation-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Workstation-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: Machine Check Error on Page Size Change (IFU)"
},
{
"acknowledgments": [
{
"names": [
"Intel"
]
}
],
"cve": "CVE-2019-0154",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"discovery_date": "2019-06-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1724393"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Intel graphics hardware (GPU) where a local attacker with the ability to issue an ioctl could trigger a hardware level crash if MMIO registers were read while the graphics card was in a low-power state. This creates a denial of service situation and the GPU and connected displays will remain unusable until a reboot occurs.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: Intel GPU Denial Of Service while accessing MMIO in lower power state",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Intel plans to release BIOS firmware to correct this issue. Red Hat\u0027s kernel update should mitigate this vulnerability. Some older hardware will not have BIOS firmware update and will rely on operating system level protection to prevent access while the device is in low-power states. For more information see https://access.redhat.com/solutions/i915-graphics",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Client-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Client-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7ComputeNode-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7ComputeNode-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Server-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Server-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Workstation-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Workstation-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-0154"
},
{
"category": "external",
"summary": "RHBZ#1724393",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1724393"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-0154",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0154"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-0154",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0154"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/i915-graphics",
"url": "https://access.redhat.com/solutions/i915-graphics"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00260.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00260.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-11-12T21:02:41+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Client-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Client-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7ComputeNode-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7ComputeNode-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Server-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Server-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Workstation-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Workstation-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:3834"
},
{
"category": "workaround",
"details": "Preventing loading of the i915 kernel module will prevent attackers from using this exploit against the system however the power management functionality of the card will be disabled and the system may draw additional power. See this KCS article (https://access.redhat.com/solutions/41278) for instructions on how to disable a kernel module. Graphical displays may also be at low resolution or not work correctly. This mitigation may not be suitable if running graphical tools locally is required.",
"product_ids": [
"7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Client-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Client-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7ComputeNode-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7ComputeNode-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Server-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Server-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Workstation-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Workstation-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Client-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Client-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7ComputeNode-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7ComputeNode-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Server-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Server-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Workstation-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Workstation-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: Intel GPU Denial Of Service while accessing MMIO in lower power state"
},
{
"acknowledgments": [
{
"names": [
"Intel"
]
}
],
"cve": "CVE-2019-11135",
"cwe": {
"id": "CWE-203",
"name": "Observable Discrepancy"
},
"discovery_date": "2019-09-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1753062"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way Intel CPUs handle speculative execution of instructions when the TSX Asynchronous Abort (TAA) error occurs. A local authenticated attacker with the ability to monitor execution times could infer the TSX memory state by comparing abort execution times. This could allow information disclosure via this observed side-channel for any TSX transaction being executed while an attacker is able to observe abort timing.\r\n\r\nIntel\u0027s Transactional Synchronisation Extensions (TSX) are set of instructions which enable transactional memory support to improve performance of the multi-threaded applications, in the lock-protected critical sections. The CPU executes instructions in the critical-sections as transactions, while ensuring their atomic state. When such transaction execution is unsuccessful, the processor cannot ensure atomic updates to the transaction memory, so the processor rolls back or aborts such transaction execution.\r\n\r\nWhile TSX Asynchronous Abort (TAA) is pending, CPU may continue to read data from architectural buffers and pass it to the dependent speculative operations. This may cause information leakage via speculative side-channel means, which is quite similar to the Microarchitectural Data Sampling (MDS) issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: TSX Transaction Asynchronous Abort (TAA)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "libvirt and qemu-kvm on Red Hat Enterprise Linux 6 are not affected by this vulnerability as they do not support MSR-based CPU features.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Client-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Client-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7ComputeNode-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7ComputeNode-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Server-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Server-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Workstation-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Workstation-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11135"
},
{
"category": "external",
"summary": "RHBZ#1753062",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753062"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11135",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11135"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11135",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11135"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/tsx-asynchronousabort",
"url": "https://access.redhat.com/solutions/tsx-asynchronousabort"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00270.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00270.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-11-12T21:02:41+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Client-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Client-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7ComputeNode-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7ComputeNode-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Server-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Server-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Workstation-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Workstation-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:3834"
},
{
"category": "workaround",
"details": "For mitigation related information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/solutions/tsx-asynchronousabort",
"product_ids": [
"7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Client-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Client-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7ComputeNode-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7ComputeNode-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Server-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Server-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Workstation-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Workstation-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Client-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Client-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7ComputeNode-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7ComputeNode-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Server-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Server-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Workstation-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Workstation-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: TSX Transaction Asynchronous Abort (TAA)"
}
]
}
rhsa-2019:3843
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 6.5 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* hw: Machine Check Error on Page Size Change (IFU) (CVE-2018-12207)\n\n* hw: TSX Transaction Asynchronous Abort (TAA) (CVE-2019-11135)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2019:3843",
"url": "https://access.redhat.com/errata/RHSA-2019:3843"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce",
"url": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/tsx-asynchronousabort",
"url": "https://access.redhat.com/solutions/tsx-asynchronousabort"
},
{
"category": "external",
"summary": "1646768",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646768"
},
{
"category": "external",
"summary": "1753062",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753062"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_3843.json"
}
],
"title": "Red Hat Security Advisory: kernel security update",
"tracking": {
"current_release_date": "2025-10-09T18:15:58+00:00",
"generator": {
"date": "2025-10-09T18:15:58+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2019:3843",
"initial_release_date": "2019-11-12T21:12:23+00:00",
"revision_history": [
{
"date": "2019-11-12T21:12:23+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2019-11-12T21:12:23+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T18:15:58+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product": {
"name": "Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:6.5::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:6.5::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.32-431.96.3.el6.x86_64",
"product": {
"name": "kernel-0:2.6.32-431.96.3.el6.x86_64",
"product_id": "kernel-0:2.6.32-431.96.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-431.96.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-431.96.3.el6.x86_64",
"product": {
"name": "kernel-debug-0:2.6.32-431.96.3.el6.x86_64",
"product_id": "kernel-debug-0:2.6.32-431.96.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-431.96.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-431.96.3.el6.x86_64",
"product": {
"name": "kernel-debug-devel-0:2.6.32-431.96.3.el6.x86_64",
"product_id": "kernel-debug-devel-0:2.6.32-431.96.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-431.96.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-431.96.3.el6.x86_64",
"product": {
"name": "kernel-devel-0:2.6.32-431.96.3.el6.x86_64",
"product_id": "kernel-devel-0:2.6.32-431.96.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-431.96.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.32-431.96.3.el6.x86_64",
"product": {
"name": "kernel-headers-0:2.6.32-431.96.3.el6.x86_64",
"product_id": "kernel-headers-0:2.6.32-431.96.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.32-431.96.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:2.6.32-431.96.3.el6.x86_64",
"product": {
"name": "perf-0:2.6.32-431.96.3.el6.x86_64",
"product_id": "perf-0:2.6.32-431.96.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-431.96.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"product_id": "kernel-debug-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-431.96.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"product": {
"name": "kernel-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"product_id": "kernel-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-431.96.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-431.96.3.el6.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-431.96.3.el6.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:2.6.32-431.96.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@2.6.32-431.96.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"product": {
"name": "perf-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"product_id": "perf-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-431.96.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"product": {
"name": "python-perf-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"product_id": "python-perf-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-431.96.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:2.6.32-431.96.3.el6.x86_64",
"product": {
"name": "python-perf-0:2.6.32-431.96.3.el6.x86_64",
"product_id": "python-perf-0:2.6.32-431.96.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@2.6.32-431.96.3.el6?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.32-431.96.3.el6.src",
"product": {
"name": "kernel-0:2.6.32-431.96.3.el6.src",
"product_id": "kernel-0:2.6.32-431.96.3.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-431.96.3.el6?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:2.6.32-431.96.3.el6.noarch",
"product": {
"name": "kernel-abi-whitelists-0:2.6.32-431.96.3.el6.noarch",
"product_id": "kernel-abi-whitelists-0:2.6.32-431.96.3.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@2.6.32-431.96.3.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:2.6.32-431.96.3.el6.noarch",
"product": {
"name": "kernel-doc-0:2.6.32-431.96.3.el6.noarch",
"product_id": "kernel-doc-0:2.6.32-431.96.3.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@2.6.32-431.96.3.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-firmware-0:2.6.32-431.96.3.el6.noarch",
"product": {
"name": "kernel-firmware-0:2.6.32-431.96.3.el6.noarch",
"product_id": "kernel-firmware-0:2.6.32-431.96.3.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-firmware@2.6.32-431.96.3.el6?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-431.96.3.el6.src as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:kernel-0:2.6.32-431.96.3.el6.src"
},
"product_reference": "kernel-0:2.6.32-431.96.3.el6.src",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-431.96.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:kernel-0:2.6.32-431.96.3.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-431.96.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-431.96.3.el6.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.96.3.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-431.96.3.el6.noarch",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-431.96.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:kernel-debug-0:2.6.32-431.96.3.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-431.96.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-431.96.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.96.3.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-431.96.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.96.3.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-431.96.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-431.96.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.96.3.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-431.96.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.96.3.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-431.96.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-431.96.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:kernel-devel-0:2.6.32-431.96.3.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-431.96.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-431.96.3.el6.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:kernel-doc-0:2.6.32-431.96.3.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-431.96.3.el6.noarch",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-431.96.3.el6.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.96.3.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-431.96.3.el6.noarch",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-431.96.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:kernel-headers-0:2.6.32-431.96.3.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-431.96.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-431.96.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:perf-0:2.6.32-431.96.3.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-431.96.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-431.96.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.96.3.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-431.96.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:python-perf-0:2.6.32-431.96.3.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-431.96.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-431.96.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.96.3.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-431.96.3.el6.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:kernel-0:2.6.32-431.96.3.el6.src"
},
"product_reference": "kernel-0:2.6.32-431.96.3.el6.src",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-431.96.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:kernel-0:2.6.32-431.96.3.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-431.96.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-431.96.3.el6.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.96.3.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-431.96.3.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-431.96.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.96.3.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-431.96.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-431.96.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.96.3.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-431.96.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.96.3.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-431.96.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-431.96.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.96.3.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-431.96.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.96.3.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-431.96.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-431.96.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.96.3.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-431.96.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-431.96.3.el6.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.96.3.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-431.96.3.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-431.96.3.el6.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.96.3.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-431.96.3.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-431.96.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.96.3.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-431.96.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-431.96.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:perf-0:2.6.32-431.96.3.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-431.96.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-431.96.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.96.3.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-431.96.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.96.3.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-431.96.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-431.96.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.96.3.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Intel"
]
},
{
"names": [
"Deepak Gupta"
],
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2018-12207",
"cwe": {
"id": "CWE-226",
"name": "Sensitive Information in Resource Not Removed Before Reuse"
},
"discovery_date": "2018-11-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1646768"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way Intel CPUs handle inconsistency between, virtual to physical memory address translations in CPU\u0027s local cache and system software\u0027s Paging structure entries. A privileged guest user may use this flaw to induce a hardware Machine Check Error on the host processor, resulting in a severe DoS scenario by halting the processor.\r\n\r\nSystem software like OS OR Virtual Machine Monitor (VMM) use virtual memory system for storing program instructions and data in memory. Virtual Memory system uses Paging structures like Page Tables and Page Directories to manage system memory. The processor\u0027s Memory Management Unit (MMU) uses Paging structure entries to translate program\u0027s virtual memory addresses to physical memory addresses. The processor stores these address translations into its local cache buffer called - Translation Lookaside Buffer (TLB). TLB has two parts, one for instructions and other for data addresses.\r\n\r\nSystem software can modify its Paging structure entries to change address mappings OR certain attributes like page size etc. Upon such Paging structure alterations in memory, system software must invalidate the corresponding address translations in the processor\u0027s TLB cache. But before this TLB invalidation takes place, a privileged guest user may trigger an instruction fetch operation, which could use an already cached, but now invalid, virtual to physical address translation from Instruction TLB (ITLB). Thus accessing an invalid physical memory address and resulting in halting the processor due to the Machine Check Error (MCE) on Page Size Change.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: Machine Check Error on Page Size Change (IFU)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-6.5.AUS:kernel-0:2.6.32-431.96.3.el6.src",
"6Server-6.5.AUS:kernel-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.96.3.el6.noarch",
"6Server-6.5.AUS:kernel-debug-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-devel-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-doc-0:2.6.32-431.96.3.el6.noarch",
"6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.96.3.el6.noarch",
"6Server-6.5.AUS:kernel-headers-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:perf-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:python-perf-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.96.3.el6.src",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.96.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.96.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.96.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:perf-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.96.3.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-12207"
},
{
"category": "external",
"summary": "RHBZ#1646768",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646768"
},
{
"category": "external",
"summary": "RHSB-ifu-page-mce",
"url": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-12207",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12207"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-12207",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12207"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-11-12T21:12:23+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Server-6.5.AUS:kernel-0:2.6.32-431.96.3.el6.src",
"6Server-6.5.AUS:kernel-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.96.3.el6.noarch",
"6Server-6.5.AUS:kernel-debug-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-devel-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-doc-0:2.6.32-431.96.3.el6.noarch",
"6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.96.3.el6.noarch",
"6Server-6.5.AUS:kernel-headers-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:perf-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:python-perf-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.96.3.el6.src",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.96.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.96.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.96.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:perf-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.96.3.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:3843"
},
{
"category": "workaround",
"details": "For mitigation related information, please refer to the Red Hat vulnerability article: https://access.redhat.com/security/vulnerabilities/ifu-page-mce .",
"product_ids": [
"6Server-6.5.AUS:kernel-0:2.6.32-431.96.3.el6.src",
"6Server-6.5.AUS:kernel-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.96.3.el6.noarch",
"6Server-6.5.AUS:kernel-debug-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-devel-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-doc-0:2.6.32-431.96.3.el6.noarch",
"6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.96.3.el6.noarch",
"6Server-6.5.AUS:kernel-headers-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:perf-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:python-perf-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.96.3.el6.src",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.96.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.96.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.96.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:perf-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.96.3.el6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"6Server-6.5.AUS:kernel-0:2.6.32-431.96.3.el6.src",
"6Server-6.5.AUS:kernel-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.96.3.el6.noarch",
"6Server-6.5.AUS:kernel-debug-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-devel-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-doc-0:2.6.32-431.96.3.el6.noarch",
"6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.96.3.el6.noarch",
"6Server-6.5.AUS:kernel-headers-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:perf-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:python-perf-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.96.3.el6.src",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.96.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.96.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.96.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:perf-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.96.3.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: Machine Check Error on Page Size Change (IFU)"
},
{
"acknowledgments": [
{
"names": [
"Intel"
]
}
],
"cve": "CVE-2019-11135",
"cwe": {
"id": "CWE-203",
"name": "Observable Discrepancy"
},
"discovery_date": "2019-09-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1753062"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way Intel CPUs handle speculative execution of instructions when the TSX Asynchronous Abort (TAA) error occurs. A local authenticated attacker with the ability to monitor execution times could infer the TSX memory state by comparing abort execution times. This could allow information disclosure via this observed side-channel for any TSX transaction being executed while an attacker is able to observe abort timing.\r\n\r\nIntel\u0027s Transactional Synchronisation Extensions (TSX) are set of instructions which enable transactional memory support to improve performance of the multi-threaded applications, in the lock-protected critical sections. The CPU executes instructions in the critical-sections as transactions, while ensuring their atomic state. When such transaction execution is unsuccessful, the processor cannot ensure atomic updates to the transaction memory, so the processor rolls back or aborts such transaction execution.\r\n\r\nWhile TSX Asynchronous Abort (TAA) is pending, CPU may continue to read data from architectural buffers and pass it to the dependent speculative operations. This may cause information leakage via speculative side-channel means, which is quite similar to the Microarchitectural Data Sampling (MDS) issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: TSX Transaction Asynchronous Abort (TAA)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "libvirt and qemu-kvm on Red Hat Enterprise Linux 6 are not affected by this vulnerability as they do not support MSR-based CPU features.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-6.5.AUS:kernel-0:2.6.32-431.96.3.el6.src",
"6Server-6.5.AUS:kernel-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.96.3.el6.noarch",
"6Server-6.5.AUS:kernel-debug-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-devel-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-doc-0:2.6.32-431.96.3.el6.noarch",
"6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.96.3.el6.noarch",
"6Server-6.5.AUS:kernel-headers-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:perf-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:python-perf-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.96.3.el6.src",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.96.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.96.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.96.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:perf-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.96.3.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11135"
},
{
"category": "external",
"summary": "RHBZ#1753062",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753062"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11135",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11135"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11135",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11135"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/tsx-asynchronousabort",
"url": "https://access.redhat.com/solutions/tsx-asynchronousabort"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00270.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00270.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-11-12T21:12:23+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Server-6.5.AUS:kernel-0:2.6.32-431.96.3.el6.src",
"6Server-6.5.AUS:kernel-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.96.3.el6.noarch",
"6Server-6.5.AUS:kernel-debug-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-devel-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-doc-0:2.6.32-431.96.3.el6.noarch",
"6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.96.3.el6.noarch",
"6Server-6.5.AUS:kernel-headers-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:perf-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:python-perf-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.96.3.el6.src",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.96.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.96.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.96.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:perf-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.96.3.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:3843"
},
{
"category": "workaround",
"details": "For mitigation related information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/solutions/tsx-asynchronousabort",
"product_ids": [
"6Server-6.5.AUS:kernel-0:2.6.32-431.96.3.el6.src",
"6Server-6.5.AUS:kernel-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.96.3.el6.noarch",
"6Server-6.5.AUS:kernel-debug-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-devel-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-doc-0:2.6.32-431.96.3.el6.noarch",
"6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.96.3.el6.noarch",
"6Server-6.5.AUS:kernel-headers-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:perf-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:python-perf-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.96.3.el6.src",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.96.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.96.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.96.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:perf-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.96.3.el6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"6Server-6.5.AUS:kernel-0:2.6.32-431.96.3.el6.src",
"6Server-6.5.AUS:kernel-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.96.3.el6.noarch",
"6Server-6.5.AUS:kernel-debug-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-devel-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-doc-0:2.6.32-431.96.3.el6.noarch",
"6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.96.3.el6.noarch",
"6Server-6.5.AUS:kernel-headers-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:perf-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:python-perf-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.96.3.el6.src",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.96.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.96.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.96.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:perf-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.96.3.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: TSX Transaction Asynchronous Abort (TAA)"
}
]
}
rhsa-2019_3840
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 7.3 Advanced Update Support, Red Hat Enterprise Linux 7.3 Telco Extended Update Support, and Red Hat Enterprise Linux 7.3 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* hw: Machine Check Error on Page Size Change (IFU) (CVE-2018-12207)\n\n* hw: TSX Transaction Asynchronous Abort (TAA) (CVE-2019-11135)\n\n* hw: Intel GPU Denial Of Service while accessing MMIO in lower power state (CVE-2019-0154)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2019:3840",
"url": "https://access.redhat.com/errata/RHSA-2019:3840"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce",
"url": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/tsx-asynchronousabort",
"url": "https://access.redhat.com/solutions/tsx-asynchronousabort"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/i915-graphics",
"url": "https://access.redhat.com/solutions/i915-graphics"
},
{
"category": "external",
"summary": "1646768",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646768"
},
{
"category": "external",
"summary": "1724393",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1724393"
},
{
"category": "external",
"summary": "1753062",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753062"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_3840.json"
}
],
"title": "Red Hat Security Advisory: kernel security update",
"tracking": {
"current_release_date": "2024-11-15T03:17:50+00:00",
"generator": {
"date": "2024-11-15T03:17:50+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2019:3840",
"initial_release_date": "2019-11-12T21:22:53+00:00",
"revision_history": [
{
"date": "2019-11-12T21:22:53+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2019-11-12T21:22:54+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-15T03:17:50+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product": {
"name": "Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.3::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.3::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product": {
"name": "Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:7.3::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:7.3::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server TUS (v. 7.3)",
"product": {
"name": "Red Hat Enterprise Linux Server TUS (v. 7.3)",
"product_id": "7Server-7.3.TUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_tus:7.3::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.3)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.3)",
"product_id": "7Server-optional-7.3.TUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_tus:7.3::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-514.70.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-514.70.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"product_id": "kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-514.70.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-514.70.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-514.70.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"product": {
"name": "perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"product_id": "perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-514.70.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"product_id": "python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-514.70.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-514.70.2.el7.x86_64",
"product": {
"name": "kernel-0:3.10.0-514.70.2.el7.x86_64",
"product_id": "kernel-0:3.10.0-514.70.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-514.70.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"product": {
"name": "kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"product_id": "kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-514.70.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"product_id": "kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-514.70.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"product": {
"name": "kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"product_id": "kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-514.70.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"product": {
"name": "kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"product_id": "kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-514.70.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"product": {
"name": "kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"product_id": "kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-514.70.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"product_id": "kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-514.70.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-514.70.2.el7.x86_64",
"product": {
"name": "perf-0:3.10.0-514.70.2.el7.x86_64",
"product_id": "perf-0:3.10.0-514.70.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-514.70.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-514.70.2.el7.x86_64",
"product": {
"name": "python-perf-0:3.10.0-514.70.2.el7.x86_64",
"product_id": "python-perf-0:3.10.0-514.70.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-514.70.2.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-514.70.2.el7.src",
"product": {
"name": "kernel-0:3.10.0-514.70.2.el7.src",
"product_id": "kernel-0:3.10.0-514.70.2.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-514.70.2.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"product": {
"name": "kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"product_id": "kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-514.70.2.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"product": {
"name": "kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"product_id": "kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@3.10.0-514.70.2.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-514.70.2.el7.ppc64le",
"product": {
"name": "kernel-debug-devel-0:3.10.0-514.70.2.el7.ppc64le",
"product_id": "kernel-debug-devel-0:3.10.0-514.70.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-514.70.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.ppc64le",
"product_id": "kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-514.70.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"product_id": "kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-514.70.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"product_id": "kernel-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-514.70.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.70.2.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.70.2.el7.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.70.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@3.10.0-514.70.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"product_id": "kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-514.70.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"product": {
"name": "perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"product_id": "perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-514.70.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"product_id": "python-perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-514.70.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-514.70.2.el7.ppc64le",
"product": {
"name": "kernel-0:3.10.0-514.70.2.el7.ppc64le",
"product_id": "kernel-0:3.10.0-514.70.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-514.70.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:3.10.0-514.70.2.el7.ppc64le",
"product": {
"name": "kernel-bootwrapper-0:3.10.0-514.70.2.el7.ppc64le",
"product_id": "kernel-bootwrapper-0:3.10.0-514.70.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-514.70.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-514.70.2.el7.ppc64le",
"product": {
"name": "kernel-debug-0:3.10.0-514.70.2.el7.ppc64le",
"product_id": "kernel-debug-0:3.10.0-514.70.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-514.70.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-514.70.2.el7.ppc64le",
"product": {
"name": "kernel-devel-0:3.10.0-514.70.2.el7.ppc64le",
"product_id": "kernel-devel-0:3.10.0-514.70.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-514.70.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-514.70.2.el7.ppc64le",
"product": {
"name": "kernel-headers-0:3.10.0-514.70.2.el7.ppc64le",
"product_id": "kernel-headers-0:3.10.0-514.70.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-514.70.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-514.70.2.el7.ppc64le",
"product": {
"name": "kernel-tools-0:3.10.0-514.70.2.el7.ppc64le",
"product_id": "kernel-tools-0:3.10.0-514.70.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-514.70.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-514.70.2.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-0:3.10.0-514.70.2.el7.ppc64le",
"product_id": "kernel-tools-libs-0:3.10.0-514.70.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-514.70.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-514.70.2.el7.ppc64le",
"product": {
"name": "perf-0:3.10.0-514.70.2.el7.ppc64le",
"product_id": "perf-0:3.10.0-514.70.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-514.70.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-514.70.2.el7.ppc64le",
"product": {
"name": "python-perf-0:3.10.0-514.70.2.el7.ppc64le",
"product_id": "python-perf-0:3.10.0-514.70.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-514.70.2.el7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.70.2.el7.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-514.70.2.el7.src",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-514.70.2.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:perf-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:python-perf-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.3)",
"product_id": "7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.70.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-514.70.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.70.2.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-514.70.2.el7.src",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-514.70.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.70.2.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-514.70.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-514.70.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-514.70.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-514.70.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-514.70.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-514.70.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.70.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.70.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.70.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-514.70.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-514.70.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-514.70.2.el7.noarch as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-doc-0:3.10.0-514.70.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-514.70.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-514.70.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-514.70.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-514.70.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-514.70.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-514.70.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-514.70.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:perf-0:3.10.0-514.70.2.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-514.70.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:perf-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-514.70.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-514.70.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.3)",
"product_id": "7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.70.2.el7.src as a component of Red Hat Enterprise Linux Server TUS (v. 7.3)",
"product_id": "7Server-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-514.70.2.el7.src",
"relates_to_product_reference": "7Server-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.3)",
"product_id": "7Server-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 7.3)",
"product_id": "7Server-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"relates_to_product_reference": "7Server-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.3)",
"product_id": "7Server-7.3.TUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.3)",
"product_id": "7Server-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.3)",
"product_id": "7Server-7.3.TUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.3)",
"product_id": "7Server-7.3.TUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.3)",
"product_id": "7Server-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.3)",
"product_id": "7Server-7.3.TUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-514.70.2.el7.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 7.3)",
"product_id": "7Server-7.3.TUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"relates_to_product_reference": "7Server-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.3)",
"product_id": "7Server-7.3.TUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.3)",
"product_id": "7Server-7.3.TUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.3)",
"product_id": "7Server-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.3)",
"product_id": "7Server-7.3.TUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.3)",
"product_id": "7Server-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.3)",
"product_id": "7Server-7.3.TUS:perf-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.3)",
"product_id": "7Server-7.3.TUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.3)",
"product_id": "7Server-7.3.TUS:python-perf-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.3)",
"product_id": "7Server-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.70.2.el7.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-514.70.2.el7.src",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-514.70.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:perf-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.3)",
"product_id": "7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.70.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-514.70.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.70.2.el7.src as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-514.70.2.el7.src",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-514.70.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.70.2.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-514.70.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-514.70.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-514.70.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-514.70.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-514.70.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-514.70.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.70.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.70.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.70.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-514.70.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-514.70.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-514.70.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-doc-0:3.10.0-514.70.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-514.70.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-514.70.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-514.70.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-514.70.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-514.70.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-514.70.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-514.70.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:perf-0:3.10.0-514.70.2.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-514.70.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:perf-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-514.70.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-514.70.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.3)",
"product_id": "7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.70.2.el7.src as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.3)",
"product_id": "7Server-optional-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-514.70.2.el7.src",
"relates_to_product_reference": "7Server-optional-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.3)",
"product_id": "7Server-optional-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.3)",
"product_id": "7Server-optional-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.3)",
"product_id": "7Server-optional-7.3.TUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.3)",
"product_id": "7Server-optional-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.3)",
"product_id": "7Server-optional-7.3.TUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.3)",
"product_id": "7Server-optional-7.3.TUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.3)",
"product_id": "7Server-optional-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.3)",
"product_id": "7Server-optional-7.3.TUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-514.70.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.3)",
"product_id": "7Server-optional-7.3.TUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.3)",
"product_id": "7Server-optional-7.3.TUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.3)",
"product_id": "7Server-optional-7.3.TUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.3)",
"product_id": "7Server-optional-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.3)",
"product_id": "7Server-optional-7.3.TUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.3)",
"product_id": "7Server-optional-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.3)",
"product_id": "7Server-optional-7.3.TUS:perf-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.3)",
"product_id": "7Server-optional-7.3.TUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.3)",
"product_id": "7Server-optional-7.3.TUS:python-perf-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.3)",
"product_id": "7Server-optional-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.3.TUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Intel"
]
},
{
"names": [
"Deepak Gupta"
],
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2018-12207",
"cwe": {
"id": "CWE-226",
"name": "Sensitive Information in Resource Not Removed Before Reuse"
},
"discovery_date": "2018-11-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1646768"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way Intel CPUs handle inconsistency between, virtual to physical memory address translations in CPU\u0027s local cache and system software\u0027s Paging structure entries. A privileged guest user may use this flaw to induce a hardware Machine Check Error on the host processor, resulting in a severe DoS scenario by halting the processor.\r\n\r\nSystem software like OS OR Virtual Machine Monitor (VMM) use virtual memory system for storing program instructions and data in memory. Virtual Memory system uses Paging structures like Page Tables and Page Directories to manage system memory. The processor\u0027s Memory Management Unit (MMU) uses Paging structure entries to translate program\u0027s virtual memory addresses to physical memory addresses. The processor stores these address translations into its local cache buffer called - Translation Lookaside Buffer (TLB). TLB has two parts, one for instructions and other for data addresses.\r\n\r\nSystem software can modify its Paging structure entries to change address mappings OR certain attributes like page size etc. Upon such Paging structure alterations in memory, system software must invalidate the corresponding address translations in the processor\u0027s TLB cache. But before this TLB invalidation takes place, a privileged guest user may trigger an instruction fetch operation, which could use an already cached, but now invalid, virtual to physical address translation from Instruction TLB (ITLB). Thus accessing an invalid physical memory address and resulting in halting the processor due to the Machine Check Error (MCE) on Page Size Change.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: Machine Check Error on Page Size Change (IFU)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:perf-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.TUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.TUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:perf-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-optional-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.TUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.TUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-12207"
},
{
"category": "external",
"summary": "RHBZ#1646768",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646768"
},
{
"category": "external",
"summary": "RHSB-ifu-page-mce",
"url": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-12207",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12207"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-12207",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12207"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-11-12T21:22:53+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:perf-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.TUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.TUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:perf-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-optional-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.TUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.TUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:3840"
},
{
"category": "workaround",
"details": "For mitigation related information, please refer to the Red Hat vulnerability article: https://access.redhat.com/security/vulnerabilities/ifu-page-mce .",
"product_ids": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:perf-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.TUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.TUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:perf-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-optional-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.TUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.TUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:perf-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.TUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.TUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:perf-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-optional-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.TUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.TUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: Machine Check Error on Page Size Change (IFU)"
},
{
"acknowledgments": [
{
"names": [
"Intel"
]
}
],
"cve": "CVE-2019-0154",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"discovery_date": "2019-06-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1724393"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Intel graphics hardware (GPU) where a local attacker with the ability to issue an ioctl could trigger a hardware level crash if MMIO registers were read while the graphics card was in a low-power state. This creates a denial of service situation and the GPU and connected displays will remain unusable until a reboot occurs.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: Intel GPU Denial Of Service while accessing MMIO in lower power state",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Intel plans to release BIOS firmware to correct this issue. Red Hat\u0027s kernel update should mitigate this vulnerability. Some older hardware will not have BIOS firmware update and will rely on operating system level protection to prevent access while the device is in low-power states. For more information see https://access.redhat.com/solutions/i915-graphics",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:perf-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.TUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.TUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:perf-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-optional-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.TUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.TUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-0154"
},
{
"category": "external",
"summary": "RHBZ#1724393",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1724393"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-0154",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0154"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-0154",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0154"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/i915-graphics",
"url": "https://access.redhat.com/solutions/i915-graphics"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00260.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00260.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-11-12T21:22:53+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:perf-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.TUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.TUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:perf-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-optional-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.TUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.TUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:3840"
},
{
"category": "workaround",
"details": "Preventing loading of the i915 kernel module will prevent attackers from using this exploit against the system however the power management functionality of the card will be disabled and the system may draw additional power. See this KCS article (https://access.redhat.com/solutions/41278) for instructions on how to disable a kernel module. Graphical displays may also be at low resolution or not work correctly. This mitigation may not be suitable if running graphical tools locally is required.",
"product_ids": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:perf-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.TUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.TUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:perf-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-optional-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.TUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.TUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:perf-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.TUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.TUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:perf-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-optional-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.TUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.TUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: Intel GPU Denial Of Service while accessing MMIO in lower power state"
},
{
"acknowledgments": [
{
"names": [
"Intel"
]
}
],
"cve": "CVE-2019-11135",
"cwe": {
"id": "CWE-203",
"name": "Observable Discrepancy"
},
"discovery_date": "2019-09-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1753062"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way Intel CPUs handle speculative execution of instructions when the TSX Asynchronous Abort (TAA) error occurs. A local authenticated attacker with the ability to monitor execution times could infer the TSX memory state by comparing abort execution times. This could allow information disclosure via this observed side-channel for any TSX transaction being executed while an attacker is able to observe abort timing.\r\n\r\nIntel\u0027s Transactional Synchronisation Extensions (TSX) are set of instructions which enable transactional memory support to improve performance of the multi-threaded applications, in the lock-protected critical sections. The CPU executes instructions in the critical-sections as transactions, while ensuring their atomic state. When such transaction execution is unsuccessful, the processor cannot ensure atomic updates to the transaction memory, so the processor rolls back or aborts such transaction execution.\r\n\r\nWhile TSX Asynchronous Abort (TAA) is pending, CPU may continue to read data from architectural buffers and pass it to the dependent speculative operations. This may cause information leakage via speculative side-channel means, which is quite similar to the Microarchitectural Data Sampling (MDS) issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: TSX Transaction Asynchronous Abort (TAA)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "libvirt and qemu-kvm on Red Hat Enterprise Linux 6 are not affected by this vulnerability as they do not support MSR-based CPU features.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:perf-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.TUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.TUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:perf-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-optional-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.TUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.TUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11135"
},
{
"category": "external",
"summary": "RHBZ#1753062",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753062"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11135",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11135"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11135",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11135"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/tsx-asynchronousabort",
"url": "https://access.redhat.com/solutions/tsx-asynchronousabort"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00270.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00270.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-11-12T21:22:53+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:perf-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.TUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.TUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:perf-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-optional-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.TUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.TUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:3840"
},
{
"category": "workaround",
"details": "For mitigation related information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/solutions/tsx-asynchronousabort",
"product_ids": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:perf-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.TUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.TUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:perf-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-optional-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.TUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.TUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"7Server-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.AUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.AUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:perf-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.TUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-7.3.TUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-optional-7.3.AUS:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.AUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.AUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-optional-7.3.E4S:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.E4S:kernel-bootwrapper-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-debuginfo-common-ppc64le-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:perf-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.ppc64le",
"7Server-optional-7.3.E4S:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.src",
"7Server-optional-7.3.TUS:kernel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-abi-whitelists-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.TUS:kernel-debug-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debug-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debug-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-doc-0:3.10.0-514.70.2.el7.noarch",
"7Server-optional-7.3.TUS:kernel-headers-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-libs-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:kernel-tools-libs-devel-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:python-perf-0:3.10.0-514.70.2.el7.x86_64",
"7Server-optional-7.3.TUS:python-perf-debuginfo-0:3.10.0-514.70.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: TSX Transaction Asynchronous Abort (TAA)"
}
]
}
rhsa-2019_3837
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 7.6 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* hw: Machine Check Error on Page Size Change (IFU) (CVE-2018-12207)\n\n* hw: TSX Transaction Asynchronous Abort (TAA) (CVE-2019-11135)\n\n* hw: Intel GPU Denial Of Service while accessing MMIO in lower power state (CVE-2019-0154)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2019:3837",
"url": "https://access.redhat.com/errata/RHSA-2019:3837"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce",
"url": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/tsx-asynchronousabort",
"url": "https://access.redhat.com/solutions/tsx-asynchronousabort"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/i915-graphics",
"url": "https://access.redhat.com/solutions/i915-graphics"
},
{
"category": "external",
"summary": "1646768",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646768"
},
{
"category": "external",
"summary": "1724393",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1724393"
},
{
"category": "external",
"summary": "1753062",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753062"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_3837.json"
}
],
"title": "Red Hat Security Advisory: kernel security update",
"tracking": {
"current_release_date": "2024-11-15T03:17:14+00:00",
"generator": {
"date": "2024-11-15T03:17:14+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2019:3837",
"initial_release_date": "2019-11-12T20:54:34+00:00",
"revision_history": [
{
"date": "2019-11-12T20:54:34+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2019-11-12T20:54:34+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-15T03:17:14+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product": {
"name": "Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::hypervisor"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.6::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.6::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product": {
"name": "Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.6::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-957.38.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-957.38.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"product_id": "kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-957.38.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-957.38.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-957.38.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"product": {
"name": "perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"product_id": "perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-957.38.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"product_id": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-957.38.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-0:3.10.0-957.38.2.el7.x86_64",
"product": {
"name": "bpftool-0:3.10.0-957.38.2.el7.x86_64",
"product_id": "bpftool-0:3.10.0-957.38.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@3.10.0-957.38.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-957.38.2.el7.x86_64",
"product": {
"name": "kernel-0:3.10.0-957.38.2.el7.x86_64",
"product_id": "kernel-0:3.10.0-957.38.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-957.38.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"product": {
"name": "kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"product_id": "kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-957.38.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"product_id": "kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-957.38.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"product": {
"name": "kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"product_id": "kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-957.38.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"product": {
"name": "kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"product_id": "kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-957.38.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"product": {
"name": "kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"product_id": "kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-957.38.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"product_id": "kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-957.38.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-957.38.2.el7.x86_64",
"product": {
"name": "perf-0:3.10.0-957.38.2.el7.x86_64",
"product_id": "perf-0:3.10.0-957.38.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-957.38.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-957.38.2.el7.x86_64",
"product": {
"name": "python-perf-0:3.10.0-957.38.2.el7.x86_64",
"product_id": "python-perf-0:3.10.0-957.38.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-957.38.2.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"product": {
"name": "kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"product_id": "kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-957.38.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"product_id": "kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-957.38.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"product_id": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-957.38.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"product_id": "kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-957.38.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@3.10.0-957.38.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"product_id": "kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-957.38.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"product": {
"name": "perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"product_id": "perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-957.38.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"product_id": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-957.38.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-957.38.2.el7.ppc64le",
"product": {
"name": "kernel-0:3.10.0-957.38.2.el7.ppc64le",
"product_id": "kernel-0:3.10.0-957.38.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-957.38.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"product": {
"name": "kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"product_id": "kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-957.38.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"product": {
"name": "kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"product_id": "kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-957.38.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"product": {
"name": "kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"product_id": "kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-957.38.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"product": {
"name": "kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"product_id": "kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-957.38.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"product": {
"name": "kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"product_id": "kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-957.38.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"product_id": "kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-957.38.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-957.38.2.el7.ppc64le",
"product": {
"name": "perf-0:3.10.0-957.38.2.el7.ppc64le",
"product_id": "perf-0:3.10.0-957.38.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-957.38.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"product": {
"name": "python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"product_id": "python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-957.38.2.el7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-957.38.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-957.38.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"product_id": "kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-957.38.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"product": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"product_id": "kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64@3.10.0-957.38.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-957.38.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"product": {
"name": "perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"product_id": "perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-957.38.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"product_id": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-957.38.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-957.38.2.el7.ppc64",
"product": {
"name": "kernel-0:3.10.0-957.38.2.el7.ppc64",
"product_id": "kernel-0:3.10.0-957.38.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-957.38.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"product": {
"name": "kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"product_id": "kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-957.38.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"product": {
"name": "kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"product_id": "kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-957.38.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"product_id": "kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-957.38.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"product": {
"name": "kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"product_id": "kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-957.38.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"product": {
"name": "kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"product_id": "kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-957.38.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"product": {
"name": "kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"product_id": "kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-957.38.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"product_id": "kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-957.38.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-957.38.2.el7.ppc64",
"product": {
"name": "perf-0:3.10.0-957.38.2.el7.ppc64",
"product_id": "perf-0:3.10.0-957.38.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-957.38.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-957.38.2.el7.ppc64",
"product": {
"name": "python-perf-0:3.10.0-957.38.2.el7.ppc64",
"product_id": "python-perf-0:3.10.0-957.38.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-957.38.2.el7?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-957.38.2.el7.src",
"product": {
"name": "kernel-0:3.10.0-957.38.2.el7.src",
"product_id": "kernel-0:3.10.0-957.38.2.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-957.38.2.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"product": {
"name": "kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"product_id": "kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-957.38.2.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"product": {
"name": "kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"product_id": "kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@3.10.0-957.38.2.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-957.38.2.el7.s390x",
"product": {
"name": "kernel-0:3.10.0-957.38.2.el7.s390x",
"product_id": "kernel-0:3.10.0-957.38.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-957.38.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"product": {
"name": "kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"product_id": "kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-957.38.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"product": {
"name": "kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"product_id": "kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-957.38.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"product": {
"name": "kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"product_id": "kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-957.38.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"product": {
"name": "kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"product_id": "kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-957.38.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"product": {
"name": "kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"product_id": "kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump@3.10.0-957.38.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"product": {
"name": "kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"product_id": "kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-devel@3.10.0-957.38.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-957.38.2.el7.s390x",
"product": {
"name": "perf-0:3.10.0-957.38.2.el7.s390x",
"product_id": "perf-0:3.10.0-957.38.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-957.38.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-957.38.2.el7.s390x",
"product": {
"name": "python-perf-0:3.10.0-957.38.2.el7.s390x",
"product_id": "python-perf-0:3.10.0-957.38.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-957.38.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"product_id": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-957.38.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"product": {
"name": "kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"product_id": "kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-957.38.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@3.10.0-957.38.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"product": {
"name": "kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"product_id": "kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@3.10.0-957.38.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"product": {
"name": "perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"product_id": "perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-957.38.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"product_id": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-957.38.2.el7?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.38.2.el7.src as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-957.38.2.el7.src",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-957.38.2.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "perf-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.6)",
"product_id": "7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.38.2.el7.src as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-957.38.2.el7.src",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-957.38.2.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "perf-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.6)",
"product_id": "7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:bpftool-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.38.2.el7.src as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-957.38.2.el7.src",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-957.38.2.el7.noarch as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-doc-0:3.10.0-957.38.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-kdump-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "perf-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.38.2.el7.src as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-957.38.2.el7.src",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-957.38.2.el7.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "perf-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.38.2.el7.src as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-957.38.2.el7.src",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-957.38.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "perf-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.6)",
"product_id": "7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.6.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Intel"
]
},
{
"names": [
"Deepak Gupta"
],
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2018-12207",
"cwe": {
"id": "CWE-226",
"name": "Sensitive Information in Resource Not Removed Before Reuse"
},
"discovery_date": "2018-11-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1646768"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way Intel CPUs handle inconsistency between, virtual to physical memory address translations in CPU\u0027s local cache and system software\u0027s Paging structure entries. A privileged guest user may use this flaw to induce a hardware Machine Check Error on the host processor, resulting in a severe DoS scenario by halting the processor.\r\n\r\nSystem software like OS OR Virtual Machine Monitor (VMM) use virtual memory system for storing program instructions and data in memory. Virtual Memory system uses Paging structures like Page Tables and Page Directories to manage system memory. The processor\u0027s Memory Management Unit (MMU) uses Paging structure entries to translate program\u0027s virtual memory addresses to physical memory addresses. The processor stores these address translations into its local cache buffer called - Translation Lookaside Buffer (TLB). TLB has two parts, one for instructions and other for data addresses.\r\n\r\nSystem software can modify its Paging structure entries to change address mappings OR certain attributes like page size etc. Upon such Paging structure alterations in memory, system software must invalidate the corresponding address translations in the processor\u0027s TLB cache. But before this TLB invalidation takes place, a privileged guest user may trigger an instruction fetch operation, which could use an already cached, but now invalid, virtual to physical address translation from Instruction TLB (ITLB). Thus accessing an invalid physical memory address and resulting in halting the processor due to the Machine Check Error (MCE) on Page Size Change.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: Machine Check Error on Page Size Change (IFU)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7ComputeNode-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7ComputeNode-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7ComputeNode-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.src",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7Server-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7Server-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-12207"
},
{
"category": "external",
"summary": "RHBZ#1646768",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646768"
},
{
"category": "external",
"summary": "RHSB-ifu-page-mce",
"url": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-12207",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12207"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-12207",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12207"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-11-12T20:54:34+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7ComputeNode-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7ComputeNode-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7ComputeNode-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.src",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7Server-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7Server-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:3837"
},
{
"category": "workaround",
"details": "For mitigation related information, please refer to the Red Hat vulnerability article: https://access.redhat.com/security/vulnerabilities/ifu-page-mce .",
"product_ids": [
"7ComputeNode-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7ComputeNode-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7ComputeNode-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.src",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7Server-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7Server-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7ComputeNode-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7ComputeNode-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7ComputeNode-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.src",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7Server-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7Server-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: Machine Check Error on Page Size Change (IFU)"
},
{
"acknowledgments": [
{
"names": [
"Intel"
]
}
],
"cve": "CVE-2019-0154",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"discovery_date": "2019-06-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1724393"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Intel graphics hardware (GPU) where a local attacker with the ability to issue an ioctl could trigger a hardware level crash if MMIO registers were read while the graphics card was in a low-power state. This creates a denial of service situation and the GPU and connected displays will remain unusable until a reboot occurs.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: Intel GPU Denial Of Service while accessing MMIO in lower power state",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Intel plans to release BIOS firmware to correct this issue. Red Hat\u0027s kernel update should mitigate this vulnerability. Some older hardware will not have BIOS firmware update and will rely on operating system level protection to prevent access while the device is in low-power states. For more information see https://access.redhat.com/solutions/i915-graphics",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7ComputeNode-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7ComputeNode-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7ComputeNode-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.src",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7Server-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7Server-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-0154"
},
{
"category": "external",
"summary": "RHBZ#1724393",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1724393"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-0154",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0154"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-0154",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0154"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/i915-graphics",
"url": "https://access.redhat.com/solutions/i915-graphics"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00260.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00260.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-11-12T20:54:34+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7ComputeNode-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7ComputeNode-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7ComputeNode-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.src",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7Server-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7Server-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:3837"
},
{
"category": "workaround",
"details": "Preventing loading of the i915 kernel module will prevent attackers from using this exploit against the system however the power management functionality of the card will be disabled and the system may draw additional power. See this KCS article (https://access.redhat.com/solutions/41278) for instructions on how to disable a kernel module. Graphical displays may also be at low resolution or not work correctly. This mitigation may not be suitable if running graphical tools locally is required.",
"product_ids": [
"7ComputeNode-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7ComputeNode-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7ComputeNode-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.src",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7Server-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7Server-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7ComputeNode-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7ComputeNode-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7ComputeNode-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.src",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7Server-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7Server-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: Intel GPU Denial Of Service while accessing MMIO in lower power state"
},
{
"acknowledgments": [
{
"names": [
"Intel"
]
}
],
"cve": "CVE-2019-11135",
"cwe": {
"id": "CWE-203",
"name": "Observable Discrepancy"
},
"discovery_date": "2019-09-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1753062"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way Intel CPUs handle speculative execution of instructions when the TSX Asynchronous Abort (TAA) error occurs. A local authenticated attacker with the ability to monitor execution times could infer the TSX memory state by comparing abort execution times. This could allow information disclosure via this observed side-channel for any TSX transaction being executed while an attacker is able to observe abort timing.\r\n\r\nIntel\u0027s Transactional Synchronisation Extensions (TSX) are set of instructions which enable transactional memory support to improve performance of the multi-threaded applications, in the lock-protected critical sections. The CPU executes instructions in the critical-sections as transactions, while ensuring their atomic state. When such transaction execution is unsuccessful, the processor cannot ensure atomic updates to the transaction memory, so the processor rolls back or aborts such transaction execution.\r\n\r\nWhile TSX Asynchronous Abort (TAA) is pending, CPU may continue to read data from architectural buffers and pass it to the dependent speculative operations. This may cause information leakage via speculative side-channel means, which is quite similar to the Microarchitectural Data Sampling (MDS) issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: TSX Transaction Asynchronous Abort (TAA)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "libvirt and qemu-kvm on Red Hat Enterprise Linux 6 are not affected by this vulnerability as they do not support MSR-based CPU features.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7ComputeNode-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7ComputeNode-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7ComputeNode-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.src",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7Server-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7Server-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11135"
},
{
"category": "external",
"summary": "RHBZ#1753062",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753062"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11135",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11135"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11135",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11135"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/tsx-asynchronousabort",
"url": "https://access.redhat.com/solutions/tsx-asynchronousabort"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00270.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00270.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-11-12T20:54:34+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7ComputeNode-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7ComputeNode-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7ComputeNode-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.src",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7Server-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7Server-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:3837"
},
{
"category": "workaround",
"details": "For mitigation related information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/solutions/tsx-asynchronousabort",
"product_ids": [
"7ComputeNode-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7ComputeNode-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7ComputeNode-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.src",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7Server-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7Server-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"7ComputeNode-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src",
"7ComputeNode-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7ComputeNode-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src",
"7ComputeNode-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7ComputeNode-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7ComputeNode-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.src",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src",
"7Server-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7Server-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:bpftool-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.src",
"7Server-optional-7.6.EUS:kernel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-abi-whitelists-0:3.10.0-957.38.2.el7.noarch",
"7Server-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-bootwrapper-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debug-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debug-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debug-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-debuginfo-common-s390x-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-doc-0:3.10.0-957.38.2.el7.noarch",
"7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-headers-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-kdump-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-kdump-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-kdump-devel-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-tools-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-tools-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-tools-libs-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:kernel-tools-libs-devel-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:python-perf-0:3.10.0-957.38.2.el7.x86_64",
"7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64",
"7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.ppc64le",
"7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.s390x",
"7Server-optional-7.6.EUS:python-perf-debuginfo-0:3.10.0-957.38.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: TSX Transaction Asynchronous Abort (TAA)"
}
]
}
rhsa-2019:3941
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat OpenShift Container Platform release 4.1.24 is now available with updates to packages and images that fix several bugs and add enhancements.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments.\n\nThis is a text-only advisory for the machine-os-content container image, which includes RPM packages for Red Hat Enterprise Linux CoreOS.\n\nSecurity Fix(es):\n\n* A flaw was found in the way Intel CPUs handle inconsistency between, virtual to physical memory address translations in CPU\u0027s local cache and system software\u0027s Paging structure entries. A privileged guest user may use this flaw to induce a hardware Machine Check Error on the host processor, resulting in a severe DoS scenario by halting the processor.\n\nSystem software like OS OR Virtual Machine Monitor (VMM) use virtual memory system for storing program instructions and data in memory. Virtual Memory system uses Paging structures like Page Tables and Page Directories to manage system memory. The processor\u0027s Memory Management Unit (MMU) uses Paging structure entries to translate program\u0027s virtual memory addresses to physical memory addresses. The processor stores these address translations into its local cache buffer called - Translation Lookaside Buffer (TLB). TLB has two parts, one for instructions and other for data addresses.\n\nSystem software can modify its Paging structure entries to change address mappings OR certain attributes like page size etc. Upon such Paging structure alterations in memory, system software must invalidate the corresponding address translations in the processor\u0027s TLB cache. But before this TLB invalidation takes place, a privileged guest user may trigger an instruction fetch operation, which could use an already cached, but now invalid, virtual to physical address translation from Instruction TLB (ITLB). Thus accessing an invalid physical memory address and resulting in halting the processor due to the Machine Check Error (MCE) on Page Size Change. (CVE-2018-12207)\n\n* A flaw was found in the way sudo implemented running commands with an arbitrary user ID. If a sudoers entry is written to allow users to run a command as any user except root, this flaw can be used by an attacker to bypass that restriction. (CVE-2019-14287)\n\n* An improper authorization flaw was discovered in systemd-resolved in the way it configures the exposed DBus interface org.freedesktop.resolve1. An unprivileged local user could call all DBus methods, even when marked as privileged operations. An attacker could abuse this flaw by changing the DNS, Search Domain, LLMNR, DNSSEC, and other network link settings without any authorization, giving them control of the network names resolution process and causing the system to communicate with wrong or malicious servers. (CVE-2019-15718)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2019:3941",
"url": "https://access.redhat.com/errata/RHSA-2019:3941"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce",
"url": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce"
},
{
"category": "external",
"summary": "1646768",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646768"
},
{
"category": "external",
"summary": "1746057",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1746057"
},
{
"category": "external",
"summary": "1760531",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1760531"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_3941.json"
}
],
"title": "Red Hat Security Advisory: OpenShift Container Platform 4.1.24 machine-os-content-container security update",
"tracking": {
"current_release_date": "2025-10-09T18:15:57+00:00",
"generator": {
"date": "2025-10-09T18:15:57+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2019:3941",
"initial_release_date": "2019-11-21T09:55:18+00:00",
"revision_history": [
{
"date": "2019-11-21T09:55:18+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2019-11-21T09:55:18+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T18:15:57+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenShift Container Platform 4",
"product": {
"name": "Red Hat OpenShift Container Platform 4",
"product_id": "Red Hat OpenShift Container Platform 4",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:4.1"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift Enterprise"
}
],
"category": "vendor",
"name": "Red Hat"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Intel"
]
},
{
"names": [
"Deepak Gupta"
],
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2018-12207",
"cwe": {
"id": "CWE-226",
"name": "Sensitive Information in Resource Not Removed Before Reuse"
},
"discovery_date": "2018-11-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1646768"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way Intel CPUs handle inconsistency between, virtual to physical memory address translations in CPU\u0027s local cache and system software\u0027s Paging structure entries. A privileged guest user may use this flaw to induce a hardware Machine Check Error on the host processor, resulting in a severe DoS scenario by halting the processor.\r\n\r\nSystem software like OS OR Virtual Machine Monitor (VMM) use virtual memory system for storing program instructions and data in memory. Virtual Memory system uses Paging structures like Page Tables and Page Directories to manage system memory. The processor\u0027s Memory Management Unit (MMU) uses Paging structure entries to translate program\u0027s virtual memory addresses to physical memory addresses. The processor stores these address translations into its local cache buffer called - Translation Lookaside Buffer (TLB). TLB has two parts, one for instructions and other for data addresses.\r\n\r\nSystem software can modify its Paging structure entries to change address mappings OR certain attributes like page size etc. Upon such Paging structure alterations in memory, system software must invalidate the corresponding address translations in the processor\u0027s TLB cache. But before this TLB invalidation takes place, a privileged guest user may trigger an instruction fetch operation, which could use an already cached, but now invalid, virtual to physical address translation from Instruction TLB (ITLB). Thus accessing an invalid physical memory address and resulting in halting the processor due to the Machine Check Error (MCE) on Page Size Change.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: Machine Check Error on Page Size Change (IFU)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Container Platform 4"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-12207"
},
{
"category": "external",
"summary": "RHBZ#1646768",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646768"
},
{
"category": "external",
"summary": "RHSB-ifu-page-mce",
"url": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-12207",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12207"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-12207",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12207"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-11-21T09:55:18+00:00",
"details": "For OpenShift Container Platform 4.1 see the following documentation, which\nwill be updated shortly for release 4.1.24, for important instructions on\nhow to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/4.1/release_notes/ocp-4-1-release-notes.html",
"product_ids": [
"Red Hat OpenShift Container Platform 4"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:3941"
},
{
"category": "workaround",
"details": "For mitigation related information, please refer to the Red Hat vulnerability article: https://access.redhat.com/security/vulnerabilities/ifu-page-mce .",
"product_ids": [
"Red Hat OpenShift Container Platform 4"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"Red Hat OpenShift Container Platform 4"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: Machine Check Error on Page Size Change (IFU)"
},
{
"acknowledgments": [
{
"names": [
"the Sudo project"
]
},
{
"names": [
"Joe Vennix"
],
"organization": "Apple Information Security",
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2019-14287",
"cwe": {
"id": "CWE-267",
"name": "Privilege Defined With Unsafe Actions"
},
"discovery_date": "2019-10-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1760531"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way sudo implemented running commands with arbitrary user ID. If a sudoers entry is written to allow the attacker to run a command as any user except root, this flaw can be used by the attacker to bypass that restriction.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "sudo: Privilege escalation via \u0027Runas\u0027 specification with \u0027ALL\u0027 keyword",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw only affects specific, non-default configurations of sudo, in which sudoers configuration entry allows a user to run a command as any user except root, for example:\n\nsomeuser myhost = (ALL, !root) /usr/bin/somecommand\n\nThis configuration allows user \"someuser\" to run somecommand as any other user except root. However, this flaw also allows someuser to run somecommand as root by specifying the target user using the numeric id of -1. Only the specified command can be run, this flaw does NOT allow user to run other commands that those specified in the sudoers configuration.\n\nAny other configurations of sudo (including configurations that allow user to run commands as any user including root and configurations that allow user to run command as a specific other user) are NOT affected by this flaw.\n\nRed Hat Virtualization Hypervisor includes an affected version of sudo, however the default configuration is not vulnerable to this flaw.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Container Platform 4"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-14287"
},
{
"category": "external",
"summary": "RHBZ#1760531",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1760531"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-14287",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14287"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14287",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14287"
},
{
"category": "external",
"summary": "https://www.sudo.ws/alerts/minus_1_uid.html",
"url": "https://www.sudo.ws/alerts/minus_1_uid.html"
}
],
"release_date": "2019-10-14T15:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-11-21T09:55:18+00:00",
"details": "For OpenShift Container Platform 4.1 see the following documentation, which\nwill be updated shortly for release 4.1.24, for important instructions on\nhow to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/4.1/release_notes/ocp-4-1-release-notes.html",
"product_ids": [
"Red Hat OpenShift Container Platform 4"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:3941"
},
{
"category": "workaround",
"details": "This vulnerability only affects configurations of sudo that have a runas user list that includes an exclusion of root. The most simple example is:\n\n~~~\nsomeuser ALL=(ALL, !root) /usr/bin/somecommand\n~~~\n\nThe exclusion is specified using an excalamation mark (!). In this example, the \"root\" user is specified by name. The root user may also be identified in other ways, such as by user id:\n\n~~~\nsomeuser ALL=(ALL, !#0) /usr/bin/somecommand\n~~~\n\nor by reference to a runas alias:\n\n~~~\nRunas_Alias MYGROUP = root, adminuser\nsomeuser ALL=(ALL, !MYGROUP) /usr/bin/somecommand\n~~~\n\nTo ensure your sudoers configuration is not affected by this vulnerability, we recommend examining each sudoers entry that includes the `!` character in the runas specification, to ensure that the root user is not among the exclusions. These can be found in the /etc/sudoers file or files under /etc/sudoers.d.",
"product_ids": [
"Red Hat OpenShift Container Platform 4"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"Red Hat OpenShift Container Platform 4"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "sudo: Privilege escalation via \u0027Runas\u0027 specification with \u0027ALL\u0027 keyword"
},
{
"cve": "CVE-2019-15718",
"cwe": {
"id": "CWE-285",
"name": "Improper Authorization"
},
"discovery_date": "2019-08-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1746057"
}
],
"notes": [
{
"category": "description",
"text": "An improper authorization flaw was discovered in systemd-resolved in the way it configures the exposed DBus interface org.freedesktop.resolve1. An unprivileged local attacker could call all DBus methods, even when marked as privileged operations. An attacker could abuse this flaw by changing the DNS, Search Domain, LLMNR, DNSSEC and other network link settings without any authorization, allowing control of the network names resolution process and cause the system to communicate with wrong or malicious servers.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "systemd: systemd-resolved allows unprivileged users to configure DNS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue does not affect the versions of systemd as shipped with Red Hat Enterprise Linux 7 as the shipped systemd-resolved does not provide any privileged DBus method.\nThis issue does affect the versions of systemd as shipped with Red Hat Enterprise Linux 8, however the systemd-resolved service is not enabled by default, so the flaw cannot be exploited unless the service was manually enabled.\n\nThe flaw was rated as Moderate as it requires a local attacker and changing the DNS servers cannot compromise the system by itself, though it could be used for phishing attacks or to redirect the users to malicious websites. Moreover, on Red Hat Enterprise Linux 8 systemd-resolved needs to be manually enabled by an administrator to make the system vulnerable.\n\nOpenShift Container Platform 4 includes a vulnerable version of systemd on RHEL CoreOS nodes. However, the systemd-resolved service is removed from RHEL CoreOS instances, making this vulnerability not exploitable. This flaw is rated Low for OpenShift Container Platform 4.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Container Platform 4"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-15718"
},
{
"category": "external",
"summary": "RHBZ#1746057",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1746057"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-15718",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15718"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-15718",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-15718"
}
],
"release_date": "2019-09-03T15:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-11-21T09:55:18+00:00",
"details": "For OpenShift Container Platform 4.1 see the following documentation, which\nwill be updated shortly for release 4.1.24, for important instructions on\nhow to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/4.1/release_notes/ocp-4-1-release-notes.html",
"product_ids": [
"Red Hat OpenShift Container Platform 4"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:3941"
},
{
"category": "workaround",
"details": "Disable systemd-resolved service by using `sudo systemctl disable systemd-resolved`.",
"product_ids": [
"Red Hat OpenShift Container Platform 4"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"Red Hat OpenShift Container Platform 4"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "systemd: systemd-resolved allows unprivileged users to configure DNS"
}
]
}
rhsa-2019_3936
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kpatch-patch is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.\n\nSecurity Fix(es):\n\n* hw: Machine Check Error on Page Size Change (IFU) (CVE-2018-12207)\n\n* hw: TSX Transaction Asynchronous Abort (TAA) (CVE-2019-11135)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2019:3936",
"url": "https://access.redhat.com/errata/RHSA-2019:3936"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce",
"url": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/tsx-asynchronousabort",
"url": "https://access.redhat.com/solutions/tsx-asynchronousabort"
},
{
"category": "external",
"summary": "1646768",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646768"
},
{
"category": "external",
"summary": "1753062",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753062"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_3936.json"
}
],
"title": "Red Hat Security Advisory: kpatch-patch security update",
"tracking": {
"current_release_date": "2024-11-15T03:18:23+00:00",
"generator": {
"date": "2024-11-15T03:18:23+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2019:3936",
"initial_release_date": "2019-11-22T08:52:34+00:00",
"revision_history": [
{
"date": "2019-11-22T08:52:34+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2019-11-22T08:52:34+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-15T03:18:23+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:8::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147-0:1-3.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147-0:1-3.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147-0:1-3.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147@1-3.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147-debugsource-0:1-3.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147-debugsource-0:1-3.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147-debugsource-0:1-3.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147-debugsource@1-3.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147-debuginfo-0:1-3.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147-debuginfo-0:1-3.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147-debuginfo-0:1-3.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147-debuginfo@1-3.el8_1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147-0:1-3.el8_1.src",
"product": {
"name": "kpatch-patch-4_18_0-147-0:1-3.el8_1.src",
"product_id": "kpatch-patch-4_18_0-147-0:1-3.el8_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147@1-3.el8_1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147-0:1-3.el8_1.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kpatch-patch-4_18_0-147-0:1-3.el8_1.src"
},
"product_reference": "kpatch-patch-4_18_0-147-0:1-3.el8_1.src",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147-0:1-3.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kpatch-patch-4_18_0-147-0:1-3.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147-0:1-3.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147-debuginfo-0:1-3.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kpatch-patch-4_18_0-147-debuginfo-0:1-3.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147-debuginfo-0:1-3.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147-debugsource-0:1-3.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kpatch-patch-4_18_0-147-debugsource-0:1-3.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147-debugsource-0:1-3.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Intel"
]
},
{
"names": [
"Deepak Gupta"
],
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2018-12207",
"cwe": {
"id": "CWE-226",
"name": "Sensitive Information in Resource Not Removed Before Reuse"
},
"discovery_date": "2018-11-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1646768"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way Intel CPUs handle inconsistency between, virtual to physical memory address translations in CPU\u0027s local cache and system software\u0027s Paging structure entries. A privileged guest user may use this flaw to induce a hardware Machine Check Error on the host processor, resulting in a severe DoS scenario by halting the processor.\r\n\r\nSystem software like OS OR Virtual Machine Monitor (VMM) use virtual memory system for storing program instructions and data in memory. Virtual Memory system uses Paging structures like Page Tables and Page Directories to manage system memory. The processor\u0027s Memory Management Unit (MMU) uses Paging structure entries to translate program\u0027s virtual memory addresses to physical memory addresses. The processor stores these address translations into its local cache buffer called - Translation Lookaside Buffer (TLB). TLB has two parts, one for instructions and other for data addresses.\r\n\r\nSystem software can modify its Paging structure entries to change address mappings OR certain attributes like page size etc. Upon such Paging structure alterations in memory, system software must invalidate the corresponding address translations in the processor\u0027s TLB cache. But before this TLB invalidation takes place, a privileged guest user may trigger an instruction fetch operation, which could use an already cached, but now invalid, virtual to physical address translation from Instruction TLB (ITLB). Thus accessing an invalid physical memory address and resulting in halting the processor due to the Machine Check Error (MCE) on Page Size Change.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: Machine Check Error on Page Size Change (IFU)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.1.0.Z.MAIN.EUS:kpatch-patch-4_18_0-147-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.MAIN.EUS:kpatch-patch-4_18_0-147-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kpatch-patch-4_18_0-147-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kpatch-patch-4_18_0-147-debugsource-0:1-3.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-12207"
},
{
"category": "external",
"summary": "RHBZ#1646768",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646768"
},
{
"category": "external",
"summary": "RHSB-ifu-page-mce",
"url": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-12207",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12207"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-12207",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12207"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-11-22T08:52:34+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.1.0.Z.MAIN.EUS:kpatch-patch-4_18_0-147-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.MAIN.EUS:kpatch-patch-4_18_0-147-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kpatch-patch-4_18_0-147-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kpatch-patch-4_18_0-147-debugsource-0:1-3.el8_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:3936"
},
{
"category": "workaround",
"details": "For mitigation related information, please refer to the Red Hat vulnerability article: https://access.redhat.com/security/vulnerabilities/ifu-page-mce .",
"product_ids": [
"BaseOS-8.1.0.Z.MAIN.EUS:kpatch-patch-4_18_0-147-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.MAIN.EUS:kpatch-patch-4_18_0-147-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kpatch-patch-4_18_0-147-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kpatch-patch-4_18_0-147-debugsource-0:1-3.el8_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"BaseOS-8.1.0.Z.MAIN.EUS:kpatch-patch-4_18_0-147-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.MAIN.EUS:kpatch-patch-4_18_0-147-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kpatch-patch-4_18_0-147-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kpatch-patch-4_18_0-147-debugsource-0:1-3.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: Machine Check Error on Page Size Change (IFU)"
},
{
"acknowledgments": [
{
"names": [
"Intel"
]
}
],
"cve": "CVE-2019-11135",
"cwe": {
"id": "CWE-203",
"name": "Observable Discrepancy"
},
"discovery_date": "2019-09-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1753062"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way Intel CPUs handle speculative execution of instructions when the TSX Asynchronous Abort (TAA) error occurs. A local authenticated attacker with the ability to monitor execution times could infer the TSX memory state by comparing abort execution times. This could allow information disclosure via this observed side-channel for any TSX transaction being executed while an attacker is able to observe abort timing.\r\n\r\nIntel\u0027s Transactional Synchronisation Extensions (TSX) are set of instructions which enable transactional memory support to improve performance of the multi-threaded applications, in the lock-protected critical sections. The CPU executes instructions in the critical-sections as transactions, while ensuring their atomic state. When such transaction execution is unsuccessful, the processor cannot ensure atomic updates to the transaction memory, so the processor rolls back or aborts such transaction execution.\r\n\r\nWhile TSX Asynchronous Abort (TAA) is pending, CPU may continue to read data from architectural buffers and pass it to the dependent speculative operations. This may cause information leakage via speculative side-channel means, which is quite similar to the Microarchitectural Data Sampling (MDS) issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: TSX Transaction Asynchronous Abort (TAA)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "libvirt and qemu-kvm on Red Hat Enterprise Linux 6 are not affected by this vulnerability as they do not support MSR-based CPU features.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.1.0.Z.MAIN.EUS:kpatch-patch-4_18_0-147-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.MAIN.EUS:kpatch-patch-4_18_0-147-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kpatch-patch-4_18_0-147-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kpatch-patch-4_18_0-147-debugsource-0:1-3.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11135"
},
{
"category": "external",
"summary": "RHBZ#1753062",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753062"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11135",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11135"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11135",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11135"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/tsx-asynchronousabort",
"url": "https://access.redhat.com/solutions/tsx-asynchronousabort"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00270.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00270.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-11-22T08:52:34+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.1.0.Z.MAIN.EUS:kpatch-patch-4_18_0-147-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.MAIN.EUS:kpatch-patch-4_18_0-147-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kpatch-patch-4_18_0-147-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kpatch-patch-4_18_0-147-debugsource-0:1-3.el8_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:3936"
},
{
"category": "workaround",
"details": "For mitigation related information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/solutions/tsx-asynchronousabort",
"product_ids": [
"BaseOS-8.1.0.Z.MAIN.EUS:kpatch-patch-4_18_0-147-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.MAIN.EUS:kpatch-patch-4_18_0-147-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kpatch-patch-4_18_0-147-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kpatch-patch-4_18_0-147-debugsource-0:1-3.el8_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"BaseOS-8.1.0.Z.MAIN.EUS:kpatch-patch-4_18_0-147-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.MAIN.EUS:kpatch-patch-4_18_0-147-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kpatch-patch-4_18_0-147-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kpatch-patch-4_18_0-147-debugsource-0:1-3.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: TSX Transaction Asynchronous Abort (TAA)"
}
]
}
RHSA-2019:3836
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 6.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* hw: Machine Check Error on Page Size Change (IFU) (CVE-2018-12207)\n\n* hw: TSX Transaction Asynchronous Abort (TAA) (CVE-2019-11135)\n\n* Kernel: vhost_net: infinite loop while receiving packets leads to DoS (CVE-2019-3900)\n\n* hw: Intel GPU Denial Of Service while accessing MMIO in lower power state (CVE-2019-0154)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* [Intel 6.10 Bug] With mWait/C-states disabled, HT on, ibrs enabled, performance impact observed on user space benchmark (BZ#1560787)\n\n* kernel-2.6.32-573.60.2.el6 hangs/resets during boot in efi_enter_virtual_mode() on Xeon v2 E7-2870 (BZ#1645724)\n\n* Slab leak: skbuff_head_cache slab object still allocated after mcast processes are stopped and \"fragments dropped after timeout\" errors are shown (BZ#1752536)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2019:3836",
"url": "https://access.redhat.com/errata/RHSA-2019:3836"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce",
"url": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/tsx-asynchronousabort",
"url": "https://access.redhat.com/solutions/tsx-asynchronousabort"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/i915-graphics",
"url": "https://access.redhat.com/solutions/i915-graphics"
},
{
"category": "external",
"summary": "1646768",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646768"
},
{
"category": "external",
"summary": "1698757",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1698757"
},
{
"category": "external",
"summary": "1724393",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1724393"
},
{
"category": "external",
"summary": "1753062",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753062"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_3836.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2025-10-09T18:15:57+00:00",
"generator": {
"date": "2025-10-09T18:15:57+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2019:3836",
"initial_release_date": "2019-11-12T21:11:39+00:00",
"revision_history": [
{
"date": "2019-11-12T21:11:39+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2019-11-12T21:11:39+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T18:15:57+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux HPC Node (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::workstation"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::workstation"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.32-754.24.2.el6.i686",
"product": {
"name": "kernel-0:2.6.32-754.24.2.el6.i686",
"product_id": "kernel-0:2.6.32-754.24.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-754.24.2.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-754.24.2.el6.i686",
"product": {
"name": "kernel-debug-0:2.6.32-754.24.2.el6.i686",
"product_id": "kernel-debug-0:2.6.32-754.24.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-754.24.2.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"product": {
"name": "kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"product_id": "kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-754.24.2.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-754.24.2.el6.i686",
"product": {
"name": "kernel-devel-0:2.6.32-754.24.2.el6.i686",
"product_id": "kernel-devel-0:2.6.32-754.24.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-754.24.2.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.32-754.24.2.el6.i686",
"product": {
"name": "kernel-headers-0:2.6.32-754.24.2.el6.i686",
"product_id": "kernel-headers-0:2.6.32-754.24.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.32-754.24.2.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "perf-0:2.6.32-754.24.2.el6.i686",
"product": {
"name": "perf-0:2.6.32-754.24.2.el6.i686",
"product_id": "perf-0:2.6.32-754.24.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-754.24.2.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"product_id": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-754.24.2.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"product": {
"name": "kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"product_id": "kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-754.24.2.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"product": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"product_id": "kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-i686@2.6.32-754.24.2.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"product": {
"name": "perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"product_id": "perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-754.24.2.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"product": {
"name": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"product_id": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-754.24.2.el6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:2.6.32-754.24.2.el6.i686",
"product": {
"name": "python-perf-0:2.6.32-754.24.2.el6.i686",
"product_id": "python-perf-0:2.6.32-754.24.2.el6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@2.6.32-754.24.2.el6?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.32-754.24.2.el6.x86_64",
"product": {
"name": "kernel-0:2.6.32-754.24.2.el6.x86_64",
"product_id": "kernel-0:2.6.32-754.24.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-754.24.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"product": {
"name": "kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"product_id": "kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-754.24.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"product": {
"name": "kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"product_id": "kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-754.24.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"product": {
"name": "kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"product_id": "kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-754.24.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"product": {
"name": "kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"product_id": "kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.32-754.24.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:2.6.32-754.24.2.el6.x86_64",
"product": {
"name": "perf-0:2.6.32-754.24.2.el6.x86_64",
"product_id": "perf-0:2.6.32-754.24.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-754.24.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"product_id": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-754.24.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"product": {
"name": "kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"product_id": "kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-754.24.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@2.6.32-754.24.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"product": {
"name": "perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"product_id": "perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-754.24.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"product": {
"name": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"product_id": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-754.24.2.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:2.6.32-754.24.2.el6.x86_64",
"product": {
"name": "python-perf-0:2.6.32-754.24.2.el6.x86_64",
"product_id": "python-perf-0:2.6.32-754.24.2.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@2.6.32-754.24.2.el6?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.32-754.24.2.el6.src",
"product": {
"name": "kernel-0:2.6.32-754.24.2.el6.src",
"product_id": "kernel-0:2.6.32-754.24.2.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-754.24.2.el6?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"product": {
"name": "kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"product_id": "kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@2.6.32-754.24.2.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"product": {
"name": "kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"product_id": "kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@2.6.32-754.24.2.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"product": {
"name": "kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"product_id": "kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-firmware@2.6.32-754.24.2.el6?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.32-754.24.2.el6.s390x",
"product": {
"name": "kernel-0:2.6.32-754.24.2.el6.s390x",
"product_id": "kernel-0:2.6.32-754.24.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-754.24.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"product": {
"name": "kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"product_id": "kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-754.24.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"product": {
"name": "kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"product_id": "kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-754.24.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"product": {
"name": "kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"product_id": "kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-754.24.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"product": {
"name": "kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"product_id": "kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.32-754.24.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"product": {
"name": "kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"product_id": "kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump@2.6.32-754.24.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"product": {
"name": "kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"product_id": "kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.32-754.24.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:2.6.32-754.24.2.el6.s390x",
"product": {
"name": "perf-0:2.6.32-754.24.2.el6.s390x",
"product_id": "perf-0:2.6.32-754.24.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-754.24.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"product_id": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-754.24.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"product": {
"name": "kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"product_id": "kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-754.24.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@2.6.32-754.24.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"product": {
"name": "kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"product_id": "kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.32-754.24.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"product": {
"name": "perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"product_id": "perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-754.24.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"product": {
"name": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"product_id": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-754.24.2.el6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:2.6.32-754.24.2.el6.s390x",
"product": {
"name": "python-perf-0:2.6.32-754.24.2.el6.s390x",
"product_id": "python-perf-0:2.6.32-754.24.2.el6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@2.6.32-754.24.2.el6?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.32-754.24.2.el6.ppc64",
"product": {
"name": "kernel-0:2.6.32-754.24.2.el6.ppc64",
"product_id": "kernel-0:2.6.32-754.24.2.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-754.24.2.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"product": {
"name": "kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"product_id": "kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@2.6.32-754.24.2.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"product": {
"name": "kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"product_id": "kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-754.24.2.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"product": {
"name": "kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"product_id": "kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-754.24.2.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"product": {
"name": "kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"product_id": "kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-754.24.2.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"product": {
"name": "kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"product_id": "kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.32-754.24.2.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "perf-0:2.6.32-754.24.2.el6.ppc64",
"product": {
"name": "perf-0:2.6.32-754.24.2.el6.ppc64",
"product_id": "perf-0:2.6.32-754.24.2.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-754.24.2.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"product_id": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-754.24.2.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"product": {
"name": "kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"product_id": "kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-754.24.2.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"product": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"product_id": "kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64@2.6.32-754.24.2.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"product": {
"name": "perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"product_id": "perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-754.24.2.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"product": {
"name": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"product_id": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-754.24.2.el6?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:2.6.32-754.24.2.el6.ppc64",
"product": {
"name": "python-perf-0:2.6.32-754.24.2.el6.ppc64",
"product_id": "python-perf-0:2.6.32-754.24.2.el6.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@2.6.32-754.24.2.el6?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.24.2.el6.src as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.src"
},
"product_reference": "kernel-0:2.6.32-754.24.2.el6.src",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-754.24.2.el6.noarch as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-754.24.2.el6.noarch as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "perf-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "perf-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "perf-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "python-perf-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Client-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.24.2.el6.src as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src"
},
"product_reference": "kernel-0:2.6.32-754.24.2.el6.src",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-754.24.2.el6.noarch as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-754.24.2.el6.noarch as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "perf-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "perf-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "perf-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "python-perf-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Client-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.24.2.el6.src as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.src"
},
"product_reference": "kernel-0:2.6.32-754.24.2.el6.src",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-754.24.2.el6.noarch as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-754.24.2.el6.noarch as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "perf-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "perf-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "perf-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "python-perf-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.24.2.el6.src as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src"
},
"product_reference": "kernel-0:2.6.32-754.24.2.el6.src",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-754.24.2.el6.noarch as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-754.24.2.el6.noarch as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "perf-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "perf-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "perf-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "python-perf-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.24.2.el6.src as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.src"
},
"product_reference": "kernel-0:2.6.32-754.24.2.el6.src",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-754.24.2.el6.noarch as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-754.24.2.el6.noarch as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "perf-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "perf-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "perf-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "python-perf-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Server-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.24.2.el6.src as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src"
},
"product_reference": "kernel-0:2.6.32-754.24.2.el6.src",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-754.24.2.el6.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-754.24.2.el6.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "perf-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "perf-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "perf-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "python-perf-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.24.2.el6.src as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.src"
},
"product_reference": "kernel-0:2.6.32-754.24.2.el6.src",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-754.24.2.el6.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-754.24.2.el6.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "perf-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "perf-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "perf-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "python-perf-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Workstation-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.24.2.el6.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src"
},
"product_reference": "kernel-0:2.6.32-754.24.2.el6.src",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-debug-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-devel-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-754.24.2.el6.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-754.24.2.el6.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "kernel-headers-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "perf-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "perf-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "perf-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "python-perf-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "python-perf-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "python-perf-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.10.z"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Intel"
]
},
{
"names": [
"Deepak Gupta"
],
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2018-12207",
"cwe": {
"id": "CWE-226",
"name": "Sensitive Information in Resource Not Removed Before Reuse"
},
"discovery_date": "2018-11-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1646768"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way Intel CPUs handle inconsistency between, virtual to physical memory address translations in CPU\u0027s local cache and system software\u0027s Paging structure entries. A privileged guest user may use this flaw to induce a hardware Machine Check Error on the host processor, resulting in a severe DoS scenario by halting the processor.\r\n\r\nSystem software like OS OR Virtual Machine Monitor (VMM) use virtual memory system for storing program instructions and data in memory. Virtual Memory system uses Paging structures like Page Tables and Page Directories to manage system memory. The processor\u0027s Memory Management Unit (MMU) uses Paging structure entries to translate program\u0027s virtual memory addresses to physical memory addresses. The processor stores these address translations into its local cache buffer called - Translation Lookaside Buffer (TLB). TLB has two parts, one for instructions and other for data addresses.\r\n\r\nSystem software can modify its Paging structure entries to change address mappings OR certain attributes like page size etc. Upon such Paging structure alterations in memory, system software must invalidate the corresponding address translations in the processor\u0027s TLB cache. But before this TLB invalidation takes place, a privileged guest user may trigger an instruction fetch operation, which could use an already cached, but now invalid, virtual to physical address translation from Instruction TLB (ITLB). Thus accessing an invalid physical memory address and resulting in halting the processor due to the Machine Check Error (MCE) on Page Size Change.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: Machine Check Error on Page Size Change (IFU)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Client-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Server-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-12207"
},
{
"category": "external",
"summary": "RHBZ#1646768",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646768"
},
{
"category": "external",
"summary": "RHSB-ifu-page-mce",
"url": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-12207",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12207"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-12207",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12207"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-11-12T21:11:39+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Client-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Server-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:3836"
},
{
"category": "workaround",
"details": "For mitigation related information, please refer to the Red Hat vulnerability article: https://access.redhat.com/security/vulnerabilities/ifu-page-mce .",
"product_ids": [
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Client-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Server-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Client-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Server-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: Machine Check Error on Page Size Change (IFU)"
},
{
"acknowledgments": [
{
"names": [
"Intel"
]
}
],
"cve": "CVE-2019-0154",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"discovery_date": "2019-06-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1724393"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Intel graphics hardware (GPU) where a local attacker with the ability to issue an ioctl could trigger a hardware level crash if MMIO registers were read while the graphics card was in a low-power state. This creates a denial of service situation and the GPU and connected displays will remain unusable until a reboot occurs.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: Intel GPU Denial Of Service while accessing MMIO in lower power state",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Intel plans to release BIOS firmware to correct this issue. Red Hat\u0027s kernel update should mitigate this vulnerability. Some older hardware will not have BIOS firmware update and will rely on operating system level protection to prevent access while the device is in low-power states. For more information see https://access.redhat.com/solutions/i915-graphics",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Client-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Server-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-0154"
},
{
"category": "external",
"summary": "RHBZ#1724393",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1724393"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-0154",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0154"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-0154",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0154"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/i915-graphics",
"url": "https://access.redhat.com/solutions/i915-graphics"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00260.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00260.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-11-12T21:11:39+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Client-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Server-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:3836"
},
{
"category": "workaround",
"details": "Preventing loading of the i915 kernel module will prevent attackers from using this exploit against the system however the power management functionality of the card will be disabled and the system may draw additional power. See this KCS article (https://access.redhat.com/solutions/41278) for instructions on how to disable a kernel module. Graphical displays may also be at low resolution or not work correctly. This mitigation may not be suitable if running graphical tools locally is required.",
"product_ids": [
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Client-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Server-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Client-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Server-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: Intel GPU Denial Of Service while accessing MMIO in lower power state"
},
{
"acknowledgments": [
{
"names": [
"Jason Wang"
],
"organization": "Red Hat Inc.",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2019-3900",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2019-04-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1698757"
}
],
"notes": [
{
"category": "description",
"text": "An infinite loop issue was found in the vhost_net kernel module while handling incoming packets in handle_rx(). The infinite loop could occur if one end sends packets faster than the other end can process them. A guest user, maybe a remote one, could use this flaw to stall the vhost_net kernel thread, resulting in a DoS scenario.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Kernel: vhost_net: infinite loop while receiving packets leads to DoS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue does not affect the versions of the kernel package as shipped with Red Hat Enterprise Linux 5 and Red Hat Enterprise MRG 2.\n\nThis issue affects the version of Linux kernel as shipped with Red Hat Enterprise Linux 6 and 7. Future kernel updates for Red Hat Enterprise Linux 6 and 7 may address this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Client-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Server-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-3900"
},
{
"category": "external",
"summary": "RHBZ#1698757",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1698757"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-3900",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3900"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-3900",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-3900"
}
],
"release_date": "2019-04-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-11-12T21:11:39+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Client-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Server-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:3836"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Client-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Server-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "Kernel: vhost_net: infinite loop while receiving packets leads to DoS"
},
{
"acknowledgments": [
{
"names": [
"Intel"
]
}
],
"cve": "CVE-2019-11135",
"cwe": {
"id": "CWE-203",
"name": "Observable Discrepancy"
},
"discovery_date": "2019-09-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1753062"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way Intel CPUs handle speculative execution of instructions when the TSX Asynchronous Abort (TAA) error occurs. A local authenticated attacker with the ability to monitor execution times could infer the TSX memory state by comparing abort execution times. This could allow information disclosure via this observed side-channel for any TSX transaction being executed while an attacker is able to observe abort timing.\r\n\r\nIntel\u0027s Transactional Synchronisation Extensions (TSX) are set of instructions which enable transactional memory support to improve performance of the multi-threaded applications, in the lock-protected critical sections. The CPU executes instructions in the critical-sections as transactions, while ensuring their atomic state. When such transaction execution is unsuccessful, the processor cannot ensure atomic updates to the transaction memory, so the processor rolls back or aborts such transaction execution.\r\n\r\nWhile TSX Asynchronous Abort (TAA) is pending, CPU may continue to read data from architectural buffers and pass it to the dependent speculative operations. This may cause information leakage via speculative side-channel means, which is quite similar to the Microarchitectural Data Sampling (MDS) issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: TSX Transaction Asynchronous Abort (TAA)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "libvirt and qemu-kvm on Red Hat Enterprise Linux 6 are not affected by this vulnerability as they do not support MSR-based CPU features.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Client-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Server-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11135"
},
{
"category": "external",
"summary": "RHBZ#1753062",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753062"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11135",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11135"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11135",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11135"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/tsx-asynchronousabort",
"url": "https://access.redhat.com/solutions/tsx-asynchronousabort"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00270.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00270.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-11-12T21:11:39+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Client-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Server-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:3836"
},
{
"category": "workaround",
"details": "For mitigation related information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/solutions/tsx-asynchronousabort",
"product_ids": [
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Client-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Server-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Client-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Client-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Client-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Client-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Client-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Client-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Client-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6ComputeNode-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6ComputeNode-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6ComputeNode-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Server-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Server-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Server-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Server-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Server-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Server-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Server-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Workstation-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.src",
"6Workstation-optional-6.10.z:kernel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-abi-whitelists-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-optional-6.10.z:kernel-bootwrapper-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debug-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-i686-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-ppc64-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-s390x-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-debuginfo-common-x86_64-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-devel-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-doc-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-optional-6.10.z:kernel-firmware-0:2.6.32-754.24.2.el6.noarch",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-headers-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:kernel-kdump-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:kernel-kdump-devel-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-0:2.6.32-754.24.2.el6.x86_64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.i686",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.ppc64",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.s390x",
"6Workstation-optional-6.10.z:python-perf-debuginfo-0:2.6.32-754.24.2.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: TSX Transaction Asynchronous Abort (TAA)"
}
]
}
RHSA-2020:0026
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kpatch-patch is now available for Red Hat Enterprise Linux 7.6 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.\n\nSecurity Fix(es):\n\n* hw: Machine Check Error on Page Size Change (IFU) (CVE-2018-12207)\n\n* hw: TSX Transaction Asynchronous Abort (TAA) (CVE-2019-11135)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgements, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2020:0026",
"url": "https://access.redhat.com/errata/RHSA-2020:0026"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce",
"url": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/tsx-asynchronousabort",
"url": "https://access.redhat.com/solutions/tsx-asynchronousabort"
},
{
"category": "external",
"summary": "1646768",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646768"
},
{
"category": "external",
"summary": "1753062",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753062"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_0026.json"
}
],
"title": "Red Hat Security Advisory: kpatch-patch security update",
"tracking": {
"current_release_date": "2025-10-09T18:15:59+00:00",
"generator": {
"date": "2025-10-09T18:15:59+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2020:0026",
"initial_release_date": "2020-01-06T14:16:53+00:00",
"revision_history": [
{
"date": "2020-01-06T14:16:53+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2020-01-06T14:16:53+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T18:15:59+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product": {
"name": "Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.6::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_35_2-0:1-4.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_35_2-0:1-4.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_35_2-0:1-4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_35_2@1-4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_35_2-debuginfo-0:1-4.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_35_2-debuginfo-0:1-4.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_35_2-debuginfo-0:1-4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_35_2-debuginfo@1-4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_38_1-0:1-3.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_38_1-0:1-3.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_38_1-0:1-3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_38_1@1-3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_38_1-debuginfo-0:1-3.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_38_1-debuginfo-0:1-3.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_38_1-debuginfo-0:1-3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_38_1-debuginfo@1-3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_35_1-0:1-5.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_35_1-0:1-5.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_35_1-0:1-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_35_1@1-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_35_1-debuginfo-0:1-5.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_35_1-debuginfo-0:1-5.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_35_1-debuginfo-0:1-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_35_1-debuginfo@1-5.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_35_2-0:1-4.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-957_35_2-0:1-4.el7.src",
"product_id": "kpatch-patch-3_10_0-957_35_2-0:1-4.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_35_2@1-4.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_38_1-0:1-3.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-957_38_1-0:1-3.el7.src",
"product_id": "kpatch-patch-3_10_0-957_38_1-0:1-3.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_38_1@1-3.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_35_1-0:1-5.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-957_35_1-0:1-5.el7.src",
"product_id": "kpatch-patch-3_10_0-957_35_1-0:1-5.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_35_1@1-5.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_35_1-0:1-5.el7.src as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_1-0:1-5.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-957_35_1-0:1-5.el7.src",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_35_1-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_1-0:1-5.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_35_1-0:1-5.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_35_1-debuginfo-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_1-debuginfo-0:1-5.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_35_1-debuginfo-0:1-5.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_35_2-0:1-4.el7.src as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_2-0:1-4.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-957_35_2-0:1-4.el7.src",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_35_2-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_2-0:1-4.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_35_2-0:1-4.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_35_2-debuginfo-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_2-debuginfo-0:1-4.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_35_2-debuginfo-0:1-4.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_38_1-0:1-3.el7.src as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kpatch-patch-3_10_0-957_38_1-0:1-3.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-957_38_1-0:1-3.el7.src",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_38_1-0:1-3.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kpatch-patch-3_10_0-957_38_1-0:1-3.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_38_1-0:1-3.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_38_1-debuginfo-0:1-3.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kpatch-patch-3_10_0-957_38_1-debuginfo-0:1-3.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_38_1-debuginfo-0:1-3.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Intel"
]
},
{
"names": [
"Deepak Gupta"
],
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2018-12207",
"cwe": {
"id": "CWE-226",
"name": "Sensitive Information in Resource Not Removed Before Reuse"
},
"discovery_date": "2018-11-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1646768"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way Intel CPUs handle inconsistency between, virtual to physical memory address translations in CPU\u0027s local cache and system software\u0027s Paging structure entries. A privileged guest user may use this flaw to induce a hardware Machine Check Error on the host processor, resulting in a severe DoS scenario by halting the processor.\r\n\r\nSystem software like OS OR Virtual Machine Monitor (VMM) use virtual memory system for storing program instructions and data in memory. Virtual Memory system uses Paging structures like Page Tables and Page Directories to manage system memory. The processor\u0027s Memory Management Unit (MMU) uses Paging structure entries to translate program\u0027s virtual memory addresses to physical memory addresses. The processor stores these address translations into its local cache buffer called - Translation Lookaside Buffer (TLB). TLB has two parts, one for instructions and other for data addresses.\r\n\r\nSystem software can modify its Paging structure entries to change address mappings OR certain attributes like page size etc. Upon such Paging structure alterations in memory, system software must invalidate the corresponding address translations in the processor\u0027s TLB cache. But before this TLB invalidation takes place, a privileged guest user may trigger an instruction fetch operation, which could use an already cached, but now invalid, virtual to physical address translation from Instruction TLB (ITLB). Thus accessing an invalid physical memory address and resulting in halting the processor due to the Machine Check Error (MCE) on Page Size Change.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: Machine Check Error on Page Size Change (IFU)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_1-0:1-5.el7.src",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_1-0:1-5.el7.x86_64",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_2-0:1-4.el7.src",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_2-0:1-4.el7.x86_64",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_2-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_38_1-0:1-3.el7.src",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_38_1-0:1-3.el7.x86_64",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_38_1-debuginfo-0:1-3.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-12207"
},
{
"category": "external",
"summary": "RHBZ#1646768",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646768"
},
{
"category": "external",
"summary": "RHSB-ifu-page-mce",
"url": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-12207",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12207"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-12207",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12207"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-01-06T14:16:53+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_1-0:1-5.el7.src",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_1-0:1-5.el7.x86_64",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_2-0:1-4.el7.src",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_2-0:1-4.el7.x86_64",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_2-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_38_1-0:1-3.el7.src",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_38_1-0:1-3.el7.x86_64",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_38_1-debuginfo-0:1-3.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2020:0026"
},
{
"category": "workaround",
"details": "For mitigation related information, please refer to the Red Hat vulnerability article: https://access.redhat.com/security/vulnerabilities/ifu-page-mce .",
"product_ids": [
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_1-0:1-5.el7.src",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_1-0:1-5.el7.x86_64",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_2-0:1-4.el7.src",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_2-0:1-4.el7.x86_64",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_2-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_38_1-0:1-3.el7.src",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_38_1-0:1-3.el7.x86_64",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_38_1-debuginfo-0:1-3.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_1-0:1-5.el7.src",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_1-0:1-5.el7.x86_64",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_2-0:1-4.el7.src",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_2-0:1-4.el7.x86_64",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_2-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_38_1-0:1-3.el7.src",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_38_1-0:1-3.el7.x86_64",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_38_1-debuginfo-0:1-3.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: Machine Check Error on Page Size Change (IFU)"
},
{
"acknowledgments": [
{
"names": [
"Intel"
]
}
],
"cve": "CVE-2019-11135",
"cwe": {
"id": "CWE-203",
"name": "Observable Discrepancy"
},
"discovery_date": "2019-09-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1753062"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way Intel CPUs handle speculative execution of instructions when the TSX Asynchronous Abort (TAA) error occurs. A local authenticated attacker with the ability to monitor execution times could infer the TSX memory state by comparing abort execution times. This could allow information disclosure via this observed side-channel for any TSX transaction being executed while an attacker is able to observe abort timing.\r\n\r\nIntel\u0027s Transactional Synchronisation Extensions (TSX) are set of instructions which enable transactional memory support to improve performance of the multi-threaded applications, in the lock-protected critical sections. The CPU executes instructions in the critical-sections as transactions, while ensuring their atomic state. When such transaction execution is unsuccessful, the processor cannot ensure atomic updates to the transaction memory, so the processor rolls back or aborts such transaction execution.\r\n\r\nWhile TSX Asynchronous Abort (TAA) is pending, CPU may continue to read data from architectural buffers and pass it to the dependent speculative operations. This may cause information leakage via speculative side-channel means, which is quite similar to the Microarchitectural Data Sampling (MDS) issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: TSX Transaction Asynchronous Abort (TAA)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "libvirt and qemu-kvm on Red Hat Enterprise Linux 6 are not affected by this vulnerability as they do not support MSR-based CPU features.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_1-0:1-5.el7.src",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_1-0:1-5.el7.x86_64",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_2-0:1-4.el7.src",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_2-0:1-4.el7.x86_64",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_2-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_38_1-0:1-3.el7.src",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_38_1-0:1-3.el7.x86_64",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_38_1-debuginfo-0:1-3.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11135"
},
{
"category": "external",
"summary": "RHBZ#1753062",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753062"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11135",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11135"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11135",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11135"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/tsx-asynchronousabort",
"url": "https://access.redhat.com/solutions/tsx-asynchronousabort"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00270.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00270.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-01-06T14:16:53+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_1-0:1-5.el7.src",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_1-0:1-5.el7.x86_64",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_2-0:1-4.el7.src",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_2-0:1-4.el7.x86_64",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_2-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_38_1-0:1-3.el7.src",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_38_1-0:1-3.el7.x86_64",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_38_1-debuginfo-0:1-3.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2020:0026"
},
{
"category": "workaround",
"details": "For mitigation related information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/solutions/tsx-asynchronousabort",
"product_ids": [
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_1-0:1-5.el7.src",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_1-0:1-5.el7.x86_64",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_2-0:1-4.el7.src",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_2-0:1-4.el7.x86_64",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_2-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_38_1-0:1-3.el7.src",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_38_1-0:1-3.el7.x86_64",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_38_1-debuginfo-0:1-3.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_1-0:1-5.el7.src",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_1-0:1-5.el7.x86_64",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_2-0:1-4.el7.src",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_2-0:1-4.el7.x86_64",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_2-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_38_1-0:1-3.el7.src",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_38_1-0:1-3.el7.x86_64",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_38_1-debuginfo-0:1-3.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: TSX Transaction Asynchronous Abort (TAA)"
}
]
}
rhsa-2019:3916
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for machine-os-content-container is now available for Red Hat OpenShift Container Platform 4.2.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments.\n\nThis is a text-only advisory for the machine-os-content container image, which includes RPM packages for Red Hat Enterprise Linux CoreOS.\n\nSecurity Fix(es):\n\n* A flaw was found in the way Intel CPUs handled inconsistency between virtual to physical memory address translations in the CPU\u0027s local cache and the system software\u0027s Paging structure entries. A privileged guest user can exploit this flaw to induce a hardware Machine Check Error (MCE) on the host processor, resulting in a severe DoS scenario by halting the processor. System software like the OS OR Virtual Machine Monitor (VMM) use the virtual memory system for storing program instructions and data in memory. The virtual memory system uses Paging structures like Page Tables and Page Directories to manage system memory. The processor\u0027s Memory Management Unit (MMU) uses Paging structure entries to translate a program\u0027s virtual memory addresses to physical memory addresses. The processor stores these address translations into its local cache buffer, called the Translation Lookaside Buffer (TLB). TLB has two parts, one for instructions and the other for data addresses. System software can modify its Paging structure entries to change address mappings or certain attributes like page size, etc. Upon such Paging structure alterations in memory, system software must invalidate the corresponding address translations in the processor\u0027s TLB cache. Before this TLB invalidation takes place, however, a privileged guest user could trigger an instruction fetch operation, which could use an already cached, but now invalid, virtual to physical address translation from Instruction TLB (ITLB). This would access an invalid physical memory address, resulting in halting the processor due to the MCE on Page Size Change. (CVE-2018-12207)\n\n* A flaw was found in the way sudo implemented running commands with an arbitrary user ID. If a sudoers entry is written to allow users to run a command as any user except root, this flaw can be used by an attacker to bypass that restriction. (CVE-2019-14287)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2019:3916",
"url": "https://access.redhat.com/errata/RHSA-2019:3916"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce",
"url": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1646768",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646768"
},
{
"category": "external",
"summary": "1760531",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1760531"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_3916.json"
}
],
"title": "Red Hat Security Advisory: OpenShift Container Platform 4.2.5 machine-os-content-container security update",
"tracking": {
"current_release_date": "2025-10-09T18:15:57+00:00",
"generator": {
"date": "2025-10-09T18:15:57+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2019:3916",
"initial_release_date": "2019-11-19T15:56:26+00:00",
"revision_history": [
{
"date": "2019-11-19T15:56:26+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2019-11-19T15:56:26+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T18:15:57+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenShift Container Platform 4",
"product": {
"name": "Red Hat OpenShift Container Platform 4",
"product_id": "Red Hat OpenShift Container Platform 4",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:4.2"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift Enterprise"
}
],
"category": "vendor",
"name": "Red Hat"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Intel"
]
},
{
"names": [
"Deepak Gupta"
],
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2018-12207",
"cwe": {
"id": "CWE-226",
"name": "Sensitive Information in Resource Not Removed Before Reuse"
},
"discovery_date": "2018-11-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1646768"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way Intel CPUs handle inconsistency between, virtual to physical memory address translations in CPU\u0027s local cache and system software\u0027s Paging structure entries. A privileged guest user may use this flaw to induce a hardware Machine Check Error on the host processor, resulting in a severe DoS scenario by halting the processor.\r\n\r\nSystem software like OS OR Virtual Machine Monitor (VMM) use virtual memory system for storing program instructions and data in memory. Virtual Memory system uses Paging structures like Page Tables and Page Directories to manage system memory. The processor\u0027s Memory Management Unit (MMU) uses Paging structure entries to translate program\u0027s virtual memory addresses to physical memory addresses. The processor stores these address translations into its local cache buffer called - Translation Lookaside Buffer (TLB). TLB has two parts, one for instructions and other for data addresses.\r\n\r\nSystem software can modify its Paging structure entries to change address mappings OR certain attributes like page size etc. Upon such Paging structure alterations in memory, system software must invalidate the corresponding address translations in the processor\u0027s TLB cache. But before this TLB invalidation takes place, a privileged guest user may trigger an instruction fetch operation, which could use an already cached, but now invalid, virtual to physical address translation from Instruction TLB (ITLB). Thus accessing an invalid physical memory address and resulting in halting the processor due to the Machine Check Error (MCE) on Page Size Change.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: Machine Check Error on Page Size Change (IFU)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Container Platform 4"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-12207"
},
{
"category": "external",
"summary": "RHBZ#1646768",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646768"
},
{
"category": "external",
"summary": "RHSB-ifu-page-mce",
"url": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-12207",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12207"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-12207",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12207"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-11-19T15:56:26+00:00",
"details": "See the following documentation, which will be updated shortly for release 4.2.5, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.2/release_notes/ocp-4-2-release-notes.html",
"product_ids": [
"Red Hat OpenShift Container Platform 4"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:3916"
},
{
"category": "workaround",
"details": "For mitigation related information, please refer to the Red Hat vulnerability article: https://access.redhat.com/security/vulnerabilities/ifu-page-mce .",
"product_ids": [
"Red Hat OpenShift Container Platform 4"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"Red Hat OpenShift Container Platform 4"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: Machine Check Error on Page Size Change (IFU)"
},
{
"acknowledgments": [
{
"names": [
"the Sudo project"
]
},
{
"names": [
"Joe Vennix"
],
"organization": "Apple Information Security",
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2019-14287",
"cwe": {
"id": "CWE-267",
"name": "Privilege Defined With Unsafe Actions"
},
"discovery_date": "2019-10-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1760531"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way sudo implemented running commands with arbitrary user ID. If a sudoers entry is written to allow the attacker to run a command as any user except root, this flaw can be used by the attacker to bypass that restriction.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "sudo: Privilege escalation via \u0027Runas\u0027 specification with \u0027ALL\u0027 keyword",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw only affects specific, non-default configurations of sudo, in which sudoers configuration entry allows a user to run a command as any user except root, for example:\n\nsomeuser myhost = (ALL, !root) /usr/bin/somecommand\n\nThis configuration allows user \"someuser\" to run somecommand as any other user except root. However, this flaw also allows someuser to run somecommand as root by specifying the target user using the numeric id of -1. Only the specified command can be run, this flaw does NOT allow user to run other commands that those specified in the sudoers configuration.\n\nAny other configurations of sudo (including configurations that allow user to run commands as any user including root and configurations that allow user to run command as a specific other user) are NOT affected by this flaw.\n\nRed Hat Virtualization Hypervisor includes an affected version of sudo, however the default configuration is not vulnerable to this flaw.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Container Platform 4"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-14287"
},
{
"category": "external",
"summary": "RHBZ#1760531",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1760531"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-14287",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14287"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14287",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14287"
},
{
"category": "external",
"summary": "https://www.sudo.ws/alerts/minus_1_uid.html",
"url": "https://www.sudo.ws/alerts/minus_1_uid.html"
}
],
"release_date": "2019-10-14T15:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-11-19T15:56:26+00:00",
"details": "See the following documentation, which will be updated shortly for release 4.2.5, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.2/release_notes/ocp-4-2-release-notes.html",
"product_ids": [
"Red Hat OpenShift Container Platform 4"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:3916"
},
{
"category": "workaround",
"details": "This vulnerability only affects configurations of sudo that have a runas user list that includes an exclusion of root. The most simple example is:\n\n~~~\nsomeuser ALL=(ALL, !root) /usr/bin/somecommand\n~~~\n\nThe exclusion is specified using an excalamation mark (!). In this example, the \"root\" user is specified by name. The root user may also be identified in other ways, such as by user id:\n\n~~~\nsomeuser ALL=(ALL, !#0) /usr/bin/somecommand\n~~~\n\nor by reference to a runas alias:\n\n~~~\nRunas_Alias MYGROUP = root, adminuser\nsomeuser ALL=(ALL, !MYGROUP) /usr/bin/somecommand\n~~~\n\nTo ensure your sudoers configuration is not affected by this vulnerability, we recommend examining each sudoers entry that includes the `!` character in the runas specification, to ensure that the root user is not among the exclusions. These can be found in the /etc/sudoers file or files under /etc/sudoers.d.",
"product_ids": [
"Red Hat OpenShift Container Platform 4"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"Red Hat OpenShift Container Platform 4"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "sudo: Privilege escalation via \u0027Runas\u0027 specification with \u0027ALL\u0027 keyword"
}
]
}
rhsa-2019:3832
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* hw: Machine Check Error on Page Size Change (IFU) (CVE-2018-12207)\n\n* hw: TSX Transaction Asynchronous Abort (TAA) (CVE-2019-11135)\n\n* hw: Intel GPU Denial Of Service while accessing MMIO in lower power state (CVE-2019-0154)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2019:3832",
"url": "https://access.redhat.com/errata/RHSA-2019:3832"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce",
"url": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/tsx-asynchronousabort",
"url": "https://access.redhat.com/solutions/tsx-asynchronousabort"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/i915-graphics",
"url": "https://access.redhat.com/solutions/i915-graphics"
},
{
"category": "external",
"summary": "1646768",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646768"
},
{
"category": "external",
"summary": "1724393",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1724393"
},
{
"category": "external",
"summary": "1753062",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753062"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_3832.json"
}
],
"title": "Red Hat Security Advisory: kernel security update",
"tracking": {
"current_release_date": "2025-10-09T18:15:53+00:00",
"generator": {
"date": "2025-10-09T18:15:53+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2019:3832",
"initial_release_date": "2019-11-12T20:48:43+00:00",
"revision_history": [
{
"date": "2019-11-12T20:48:43+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2019-11-12T20:48:43+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T18:15:53+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat CodeReady Linux Builder (v. 8)",
"product": {
"name": "Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::crb"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:8::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-147.0.2.el8_1.s390x",
"product": {
"name": "bpftool-0:4.18.0-147.0.2.el8_1.s390x",
"product_id": "bpftool-0:4.18.0-147.0.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-147.0.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-147.0.2.el8_1.s390x",
"product": {
"name": "kernel-0:4.18.0-147.0.2.el8_1.s390x",
"product_id": "kernel-0:4.18.0-147.0.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-147.0.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-147.0.2.el8_1.s390x",
"product": {
"name": "kernel-core-0:4.18.0-147.0.2.el8_1.s390x",
"product_id": "kernel-core-0:4.18.0-147.0.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-147.0.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-147.0.2.el8_1.s390x",
"product": {
"name": "kernel-cross-headers-0:4.18.0-147.0.2.el8_1.s390x",
"product_id": "kernel-cross-headers-0:4.18.0-147.0.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-147.0.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-147.0.2.el8_1.s390x",
"product": {
"name": "kernel-debug-0:4.18.0-147.0.2.el8_1.s390x",
"product_id": "kernel-debug-0:4.18.0-147.0.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-147.0.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-147.0.2.el8_1.s390x",
"product": {
"name": "kernel-debug-core-0:4.18.0-147.0.2.el8_1.s390x",
"product_id": "kernel-debug-core-0:4.18.0-147.0.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-147.0.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-147.0.2.el8_1.s390x",
"product": {
"name": "kernel-debug-devel-0:4.18.0-147.0.2.el8_1.s390x",
"product_id": "kernel-debug-devel-0:4.18.0-147.0.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-147.0.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-147.0.2.el8_1.s390x",
"product": {
"name": "kernel-debug-modules-0:4.18.0-147.0.2.el8_1.s390x",
"product_id": "kernel-debug-modules-0:4.18.0-147.0.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-147.0.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"product_id": "kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-147.0.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-147.0.2.el8_1.s390x",
"product": {
"name": "kernel-devel-0:4.18.0-147.0.2.el8_1.s390x",
"product_id": "kernel-devel-0:4.18.0-147.0.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-147.0.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-147.0.2.el8_1.s390x",
"product": {
"name": "kernel-headers-0:4.18.0-147.0.2.el8_1.s390x",
"product_id": "kernel-headers-0:4.18.0-147.0.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-147.0.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-147.0.2.el8_1.s390x",
"product": {
"name": "kernel-modules-0:4.18.0-147.0.2.el8_1.s390x",
"product_id": "kernel-modules-0:4.18.0-147.0.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-147.0.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"product": {
"name": "kernel-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"product_id": "kernel-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-147.0.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-147.0.2.el8_1.s390x",
"product": {
"name": "kernel-tools-0:4.18.0-147.0.2.el8_1.s390x",
"product_id": "kernel-tools-0:4.18.0-147.0.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-147.0.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-0:4.18.0-147.0.2.el8_1.s390x",
"product": {
"name": "kernel-zfcpdump-0:4.18.0-147.0.2.el8_1.s390x",
"product_id": "kernel-zfcpdump-0:4.18.0-147.0.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump@4.18.0-147.0.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-core-0:4.18.0-147.0.2.el8_1.s390x",
"product": {
"name": "kernel-zfcpdump-core-0:4.18.0-147.0.2.el8_1.s390x",
"product_id": "kernel-zfcpdump-core-0:4.18.0-147.0.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-core@4.18.0-147.0.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-devel-0:4.18.0-147.0.2.el8_1.s390x",
"product": {
"name": "kernel-zfcpdump-devel-0:4.18.0-147.0.2.el8_1.s390x",
"product_id": "kernel-zfcpdump-devel-0:4.18.0-147.0.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-devel@4.18.0-147.0.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-0:4.18.0-147.0.2.el8_1.s390x",
"product": {
"name": "kernel-zfcpdump-modules-0:4.18.0-147.0.2.el8_1.s390x",
"product_id": "kernel-zfcpdump-modules-0:4.18.0-147.0.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules@4.18.0-147.0.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"product": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"product_id": "kernel-zfcpdump-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-extra@4.18.0-147.0.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-147.0.2.el8_1.s390x",
"product": {
"name": "perf-0:4.18.0-147.0.2.el8_1.s390x",
"product_id": "perf-0:4.18.0-147.0.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-147.0.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-147.0.2.el8_1.s390x",
"product": {
"name": "python3-perf-0:4.18.0-147.0.2.el8_1.s390x",
"product_id": "python3-perf-0:4.18.0-147.0.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-147.0.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"product_id": "bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-147.0.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"product_id": "kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-147.0.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"product": {
"name": "kernel-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"product_id": "kernel-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-147.0.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:4.18.0-147.0.2.el8_1.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-147.0.2.el8_1.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:4.18.0-147.0.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@4.18.0-147.0.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"product_id": "kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-147.0.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"product": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"product_id": "kernel-zfcpdump-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-debuginfo@4.18.0-147.0.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"product": {
"name": "perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"product_id": "perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-147.0.2.el8_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"product_id": "python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-147.0.2.el8_1?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-147.0.2.el8_1.aarch64",
"product": {
"name": "bpftool-0:4.18.0-147.0.2.el8_1.aarch64",
"product_id": "bpftool-0:4.18.0-147.0.2.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-147.0.2.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-147.0.2.el8_1.aarch64",
"product": {
"name": "kernel-0:4.18.0-147.0.2.el8_1.aarch64",
"product_id": "kernel-0:4.18.0-147.0.2.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-147.0.2.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-147.0.2.el8_1.aarch64",
"product": {
"name": "kernel-core-0:4.18.0-147.0.2.el8_1.aarch64",
"product_id": "kernel-core-0:4.18.0-147.0.2.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-147.0.2.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"product_id": "kernel-cross-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-147.0.2.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-147.0.2.el8_1.aarch64",
"product": {
"name": "kernel-debug-0:4.18.0-147.0.2.el8_1.aarch64",
"product_id": "kernel-debug-0:4.18.0-147.0.2.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-147.0.2.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-147.0.2.el8_1.aarch64",
"product": {
"name": "kernel-debug-core-0:4.18.0-147.0.2.el8_1.aarch64",
"product_id": "kernel-debug-core-0:4.18.0-147.0.2.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-147.0.2.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"product_id": "kernel-debug-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-147.0.2.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"product_id": "kernel-debug-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-147.0.2.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-147.0.2.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"product": {
"name": "kernel-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"product_id": "kernel-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-147.0.2.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"product": {
"name": "kernel-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"product_id": "kernel-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-147.0.2.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"product": {
"name": "kernel-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"product_id": "kernel-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-147.0.2.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"product_id": "kernel-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-147.0.2.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-147.0.2.el8_1.aarch64",
"product": {
"name": "kernel-tools-0:4.18.0-147.0.2.el8_1.aarch64",
"product_id": "kernel-tools-0:4.18.0-147.0.2.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-147.0.2.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-147.0.2.el8_1.aarch64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-147.0.2.el8_1.aarch64",
"product_id": "kernel-tools-libs-0:4.18.0-147.0.2.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-147.0.2.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-147.0.2.el8_1.aarch64",
"product": {
"name": "perf-0:4.18.0-147.0.2.el8_1.aarch64",
"product_id": "perf-0:4.18.0-147.0.2.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-147.0.2.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-147.0.2.el8_1.aarch64",
"product": {
"name": "python3-perf-0:4.18.0-147.0.2.el8_1.aarch64",
"product_id": "python3-perf-0:4.18.0-147.0.2.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-147.0.2.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"product_id": "bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-147.0.2.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-147.0.2.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"product_id": "kernel-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-147.0.2.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-147.0.2.el8_1.aarch64",
"product": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-147.0.2.el8_1.aarch64",
"product_id": "kernel-debuginfo-common-aarch64-0:4.18.0-147.0.2.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-aarch64@4.18.0-147.0.2.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-147.0.2.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"product": {
"name": "perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"product_id": "perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-147.0.2.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"product_id": "python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-147.0.2.el8_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-147.0.2.el8_1?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-147.0.2.el8_1.ppc64le",
"product": {
"name": "bpftool-0:4.18.0-147.0.2.el8_1.ppc64le",
"product_id": "bpftool-0:4.18.0-147.0.2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-147.0.2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-147.0.2.el8_1.ppc64le",
"product": {
"name": "kernel-0:4.18.0-147.0.2.el8_1.ppc64le",
"product_id": "kernel-0:4.18.0-147.0.2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-147.0.2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"product": {
"name": "kernel-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"product_id": "kernel-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-147.0.2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"product": {
"name": "kernel-cross-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"product_id": "kernel-cross-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-147.0.2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-147.0.2.el8_1.ppc64le",
"product": {
"name": "kernel-debug-0:4.18.0-147.0.2.el8_1.ppc64le",
"product_id": "kernel-debug-0:4.18.0-147.0.2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-147.0.2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"product": {
"name": "kernel-debug-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"product_id": "kernel-debug-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-147.0.2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"product": {
"name": "kernel-debug-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"product_id": "kernel-debug-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-147.0.2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"product": {
"name": "kernel-debug-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"product_id": "kernel-debug-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-147.0.2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"product_id": "kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-147.0.2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"product": {
"name": "kernel-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"product_id": "kernel-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-147.0.2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"product": {
"name": "kernel-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"product_id": "kernel-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-147.0.2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"product": {
"name": "kernel-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"product_id": "kernel-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-147.0.2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"product": {
"name": "kernel-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"product_id": "kernel-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-147.0.2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-147.0.2.el8_1.ppc64le",
"product": {
"name": "kernel-tools-0:4.18.0-147.0.2.el8_1.ppc64le",
"product_id": "kernel-tools-0:4.18.0-147.0.2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-147.0.2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-147.0.2.el8_1.ppc64le",
"product": {
"name": "kernel-tools-libs-0:4.18.0-147.0.2.el8_1.ppc64le",
"product_id": "kernel-tools-libs-0:4.18.0-147.0.2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-147.0.2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"product": {
"name": "perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"product_id": "perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-147.0.2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"product": {
"name": "python3-perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"product_id": "python3-perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-147.0.2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"product_id": "bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-147.0.2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"product_id": "kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-147.0.2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"product": {
"name": "kernel-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"product_id": "kernel-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-147.0.2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.0.2.el8_1.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.0.2.el8_1.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.0.2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.18.0-147.0.2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"product_id": "kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-147.0.2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"product": {
"name": "perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"product_id": "perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-147.0.2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"product_id": "python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-147.0.2.el8_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"product_id": "kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-147.0.2.el8_1?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-147.0.2.el8_1.x86_64",
"product": {
"name": "bpftool-0:4.18.0-147.0.2.el8_1.x86_64",
"product_id": "bpftool-0:4.18.0-147.0.2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-147.0.2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-147.0.2.el8_1.x86_64",
"product": {
"name": "kernel-0:4.18.0-147.0.2.el8_1.x86_64",
"product_id": "kernel-0:4.18.0-147.0.2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-147.0.2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-147.0.2.el8_1.x86_64",
"product": {
"name": "kernel-core-0:4.18.0-147.0.2.el8_1.x86_64",
"product_id": "kernel-core-0:4.18.0-147.0.2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-147.0.2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"product_id": "kernel-cross-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-147.0.2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-147.0.2.el8_1.x86_64",
"product": {
"name": "kernel-debug-0:4.18.0-147.0.2.el8_1.x86_64",
"product_id": "kernel-debug-0:4.18.0-147.0.2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-147.0.2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-147.0.2.el8_1.x86_64",
"product": {
"name": "kernel-debug-core-0:4.18.0-147.0.2.el8_1.x86_64",
"product_id": "kernel-debug-core-0:4.18.0-147.0.2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-147.0.2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"product_id": "kernel-debug-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-147.0.2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"product_id": "kernel-debug-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-147.0.2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-147.0.2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"product": {
"name": "kernel-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"product_id": "kernel-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-147.0.2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"product": {
"name": "kernel-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"product_id": "kernel-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-147.0.2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"product": {
"name": "kernel-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"product_id": "kernel-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-147.0.2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"product_id": "kernel-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-147.0.2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-147.0.2.el8_1.x86_64",
"product": {
"name": "kernel-tools-0:4.18.0-147.0.2.el8_1.x86_64",
"product_id": "kernel-tools-0:4.18.0-147.0.2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-147.0.2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-147.0.2.el8_1.x86_64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-147.0.2.el8_1.x86_64",
"product_id": "kernel-tools-libs-0:4.18.0-147.0.2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-147.0.2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-147.0.2.el8_1.x86_64",
"product": {
"name": "perf-0:4.18.0-147.0.2.el8_1.x86_64",
"product_id": "perf-0:4.18.0-147.0.2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-147.0.2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-147.0.2.el8_1.x86_64",
"product": {
"name": "python3-perf-0:4.18.0-147.0.2.el8_1.x86_64",
"product_id": "python3-perf-0:4.18.0-147.0.2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-147.0.2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"product_id": "bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-147.0.2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-147.0.2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"product_id": "kernel-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-147.0.2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-147.0.2.el8_1.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-147.0.2.el8_1.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:4.18.0-147.0.2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@4.18.0-147.0.2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-147.0.2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"product": {
"name": "perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"product_id": "perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-147.0.2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"product_id": "python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-147.0.2.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-147.0.2.el8_1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:4.18.0-147.0.2.el8_1.src",
"product": {
"name": "kernel-0:4.18.0-147.0.2.el8_1.src",
"product_id": "kernel-0:4.18.0-147.0.2.el8_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-147.0.2.el8_1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:4.18.0-147.0.2.el8_1.noarch",
"product": {
"name": "kernel-abi-whitelists-0:4.18.0-147.0.2.el8_1.noarch",
"product_id": "kernel-abi-whitelists-0:4.18.0-147.0.2.el8_1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@4.18.0-147.0.2.el8_1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:4.18.0-147.0.2.el8_1.noarch",
"product": {
"name": "kernel-doc-0:4.18.0-147.0.2.el8_1.noarch",
"product_id": "kernel-doc-0:4.18.0-147.0.2.el8_1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@4.18.0-147.0.2.el8_1?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-147.0.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.aarch64"
},
"product_reference": "bpftool-0:4.18.0-147.0.2.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-147.0.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-147.0.2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "bpftool-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-147.0.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.x86_64"
},
"product_reference": "bpftool-0:4.18.0-147.0.2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-147.0.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.aarch64"
},
"product_reference": "kernel-0:4.18.0-147.0.2.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-147.0.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.ppc64le"
},
"product_reference": "kernel-0:4.18.0-147.0.2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "kernel-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-147.0.2.el8_1.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.src"
},
"product_reference": "kernel-0:4.18.0-147.0.2.el8_1.src",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-147.0.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.x86_64"
},
"product_reference": "kernel-0:4.18.0-147.0.2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:4.18.0-147.0.2.el8_1.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-147.0.2.el8_1.noarch"
},
"product_reference": "kernel-abi-whitelists-0:4.18.0-147.0.2.el8_1.noarch",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-147.0.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-147.0.2.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-147.0.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "kernel-core-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-147.0.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-147.0.2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-147.0.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-147.0.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-147.0.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-147.0.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-147.0.2.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-147.0.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-147.0.2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-147.0.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-147.0.2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-147.0.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-147.0.2.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-147.0.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-147.0.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-147.0.2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-147.0.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-147.0.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-147.0.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-147.0.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-147.0.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-147.0.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-147.0.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.0.2.el8_1.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-147.0.2.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.0.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.0.2.el8_1.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.0.2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-147.0.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.0.2.el8_1.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-147.0.2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-147.0.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-147.0.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-147.0.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-147.0.2.el8_1.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-147.0.2.el8_1.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-147.0.2.el8_1.noarch",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-147.0.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-147.0.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-147.0.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-147.0.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-147.0.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-147.0.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-147.0.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-147.0.2.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-147.0.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-147.0.2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-147.0.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-147.0.2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-147.0.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-147.0.2.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-147.0.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-147.0.2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-147.0.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-147.0.2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-147.0.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.aarch64"
},
"product_reference": "perf-0:4.18.0-147.0.2.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-147.0.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.ppc64le"
},
"product_reference": "perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "perf-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-147.0.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.x86_64"
},
"product_reference": "perf-0:4.18.0-147.0.2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-147.0.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-147.0.2.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-147.0.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "python3-perf-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-147.0.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-147.0.2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-147.0.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.aarch64"
},
"product_reference": "bpftool-0:4.18.0-147.0.2.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-147.0.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-147.0.2.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "bpftool-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-147.0.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.x86_64"
},
"product_reference": "bpftool-0:4.18.0-147.0.2.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-147.0.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.aarch64"
},
"product_reference": "kernel-0:4.18.0-147.0.2.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-147.0.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.ppc64le"
},
"product_reference": "kernel-0:4.18.0-147.0.2.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "kernel-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-147.0.2.el8_1.src as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.src"
},
"product_reference": "kernel-0:4.18.0-147.0.2.el8_1.src",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-147.0.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.x86_64"
},
"product_reference": "kernel-0:4.18.0-147.0.2.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:4.18.0-147.0.2.el8_1.noarch as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-147.0.2.el8_1.noarch"
},
"product_reference": "kernel-abi-whitelists-0:4.18.0-147.0.2.el8_1.noarch",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-147.0.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-147.0.2.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-147.0.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "kernel-core-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-147.0.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-147.0.2.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-147.0.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-147.0.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-147.0.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-147.0.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-147.0.2.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-147.0.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-147.0.2.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-147.0.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-147.0.2.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-147.0.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-147.0.2.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-147.0.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-147.0.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-147.0.2.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-147.0.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-147.0.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-147.0.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-147.0.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-147.0.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-147.0.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-147.0.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.0.2.el8_1.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-147.0.2.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.0.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.0.2.el8_1.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.0.2.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-147.0.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.0.2.el8_1.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-147.0.2.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-147.0.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-147.0.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-147.0.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-147.0.2.el8_1.noarch as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-147.0.2.el8_1.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-147.0.2.el8_1.noarch",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-147.0.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-147.0.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-147.0.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-147.0.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-147.0.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-147.0.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-147.0.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-147.0.2.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-147.0.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-147.0.2.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-147.0.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-147.0.2.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-147.0.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-147.0.2.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-147.0.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-147.0.2.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-147.0.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-147.0.2.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-147.0.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.aarch64"
},
"product_reference": "perf-0:4.18.0-147.0.2.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-147.0.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.ppc64le"
},
"product_reference": "perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "perf-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-147.0.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.x86_64"
},
"product_reference": "perf-0:4.18.0-147.0.2.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-147.0.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-147.0.2.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-147.0.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "python3-perf-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-147.0.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-147.0.2.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)",
"product_id": "CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"relates_to_product_reference": "CRB-8.1.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Intel"
]
},
{
"names": [
"Deepak Gupta"
],
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2018-12207",
"cwe": {
"id": "CWE-226",
"name": "Sensitive Information in Resource Not Removed Before Reuse"
},
"discovery_date": "2018-11-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1646768"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way Intel CPUs handle inconsistency between, virtual to physical memory address translations in CPU\u0027s local cache and system software\u0027s Paging structure entries. A privileged guest user may use this flaw to induce a hardware Machine Check Error on the host processor, resulting in a severe DoS scenario by halting the processor.\r\n\r\nSystem software like OS OR Virtual Machine Monitor (VMM) use virtual memory system for storing program instructions and data in memory. Virtual Memory system uses Paging structures like Page Tables and Page Directories to manage system memory. The processor\u0027s Memory Management Unit (MMU) uses Paging structure entries to translate program\u0027s virtual memory addresses to physical memory addresses. The processor stores these address translations into its local cache buffer called - Translation Lookaside Buffer (TLB). TLB has two parts, one for instructions and other for data addresses.\r\n\r\nSystem software can modify its Paging structure entries to change address mappings OR certain attributes like page size etc. Upon such Paging structure alterations in memory, system software must invalidate the corresponding address translations in the processor\u0027s TLB cache. But before this TLB invalidation takes place, a privileged guest user may trigger an instruction fetch operation, which could use an already cached, but now invalid, virtual to physical address translation from Instruction TLB (ITLB). Thus accessing an invalid physical memory address and resulting in halting the processor due to the Machine Check Error (MCE) on Page Size Change.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: Machine Check Error on Page Size Change (IFU)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.src",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-147.0.2.el8_1.noarch",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-147.0.2.el8_1.noarch",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.src",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-147.0.2.el8_1.noarch",
"CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-147.0.2.el8_1.noarch",
"CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-12207"
},
{
"category": "external",
"summary": "RHBZ#1646768",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646768"
},
{
"category": "external",
"summary": "RHSB-ifu-page-mce",
"url": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-12207",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12207"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-12207",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12207"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-11-12T20:48:43+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.src",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-147.0.2.el8_1.noarch",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-147.0.2.el8_1.noarch",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.src",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-147.0.2.el8_1.noarch",
"CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-147.0.2.el8_1.noarch",
"CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:3832"
},
{
"category": "workaround",
"details": "For mitigation related information, please refer to the Red Hat vulnerability article: https://access.redhat.com/security/vulnerabilities/ifu-page-mce .",
"product_ids": [
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.src",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-147.0.2.el8_1.noarch",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-147.0.2.el8_1.noarch",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.src",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-147.0.2.el8_1.noarch",
"CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-147.0.2.el8_1.noarch",
"CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.src",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-147.0.2.el8_1.noarch",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-147.0.2.el8_1.noarch",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.src",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-147.0.2.el8_1.noarch",
"CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-147.0.2.el8_1.noarch",
"CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: Machine Check Error on Page Size Change (IFU)"
},
{
"acknowledgments": [
{
"names": [
"Intel"
]
}
],
"cve": "CVE-2019-0154",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"discovery_date": "2019-06-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1724393"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Intel graphics hardware (GPU) where a local attacker with the ability to issue an ioctl could trigger a hardware level crash if MMIO registers were read while the graphics card was in a low-power state. This creates a denial of service situation and the GPU and connected displays will remain unusable until a reboot occurs.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: Intel GPU Denial Of Service while accessing MMIO in lower power state",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Intel plans to release BIOS firmware to correct this issue. Red Hat\u0027s kernel update should mitigate this vulnerability. Some older hardware will not have BIOS firmware update and will rely on operating system level protection to prevent access while the device is in low-power states. For more information see https://access.redhat.com/solutions/i915-graphics",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.src",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-147.0.2.el8_1.noarch",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-147.0.2.el8_1.noarch",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.src",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-147.0.2.el8_1.noarch",
"CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-147.0.2.el8_1.noarch",
"CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-0154"
},
{
"category": "external",
"summary": "RHBZ#1724393",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1724393"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-0154",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0154"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-0154",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0154"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/i915-graphics",
"url": "https://access.redhat.com/solutions/i915-graphics"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00260.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00260.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-11-12T20:48:43+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.src",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-147.0.2.el8_1.noarch",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-147.0.2.el8_1.noarch",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.src",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-147.0.2.el8_1.noarch",
"CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-147.0.2.el8_1.noarch",
"CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:3832"
},
{
"category": "workaround",
"details": "Preventing loading of the i915 kernel module will prevent attackers from using this exploit against the system however the power management functionality of the card will be disabled and the system may draw additional power. See this KCS article (https://access.redhat.com/solutions/41278) for instructions on how to disable a kernel module. Graphical displays may also be at low resolution or not work correctly. This mitigation may not be suitable if running graphical tools locally is required.",
"product_ids": [
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.src",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-147.0.2.el8_1.noarch",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-147.0.2.el8_1.noarch",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.src",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-147.0.2.el8_1.noarch",
"CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-147.0.2.el8_1.noarch",
"CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.src",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-147.0.2.el8_1.noarch",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-147.0.2.el8_1.noarch",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.src",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-147.0.2.el8_1.noarch",
"CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-147.0.2.el8_1.noarch",
"CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: Intel GPU Denial Of Service while accessing MMIO in lower power state"
},
{
"acknowledgments": [
{
"names": [
"Intel"
]
}
],
"cve": "CVE-2019-11135",
"cwe": {
"id": "CWE-203",
"name": "Observable Discrepancy"
},
"discovery_date": "2019-09-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1753062"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way Intel CPUs handle speculative execution of instructions when the TSX Asynchronous Abort (TAA) error occurs. A local authenticated attacker with the ability to monitor execution times could infer the TSX memory state by comparing abort execution times. This could allow information disclosure via this observed side-channel for any TSX transaction being executed while an attacker is able to observe abort timing.\r\n\r\nIntel\u0027s Transactional Synchronisation Extensions (TSX) are set of instructions which enable transactional memory support to improve performance of the multi-threaded applications, in the lock-protected critical sections. The CPU executes instructions in the critical-sections as transactions, while ensuring their atomic state. When such transaction execution is unsuccessful, the processor cannot ensure atomic updates to the transaction memory, so the processor rolls back or aborts such transaction execution.\r\n\r\nWhile TSX Asynchronous Abort (TAA) is pending, CPU may continue to read data from architectural buffers and pass it to the dependent speculative operations. This may cause information leakage via speculative side-channel means, which is quite similar to the Microarchitectural Data Sampling (MDS) issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: TSX Transaction Asynchronous Abort (TAA)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "libvirt and qemu-kvm on Red Hat Enterprise Linux 6 are not affected by this vulnerability as they do not support MSR-based CPU features.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.src",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-147.0.2.el8_1.noarch",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-147.0.2.el8_1.noarch",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.src",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-147.0.2.el8_1.noarch",
"CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-147.0.2.el8_1.noarch",
"CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11135"
},
{
"category": "external",
"summary": "RHBZ#1753062",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753062"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11135",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11135"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11135",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11135"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/tsx-asynchronousabort",
"url": "https://access.redhat.com/solutions/tsx-asynchronousabort"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00270.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00270.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-11-12T20:48:43+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.src",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-147.0.2.el8_1.noarch",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-147.0.2.el8_1.noarch",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.src",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-147.0.2.el8_1.noarch",
"CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-147.0.2.el8_1.noarch",
"CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:3832"
},
{
"category": "workaround",
"details": "For mitigation related information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/solutions/tsx-asynchronousabort",
"product_ids": [
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.src",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-147.0.2.el8_1.noarch",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-147.0.2.el8_1.noarch",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.src",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-147.0.2.el8_1.noarch",
"CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-147.0.2.el8_1.noarch",
"CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.src",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-147.0.2.el8_1.noarch",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-147.0.2.el8_1.noarch",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"BaseOS-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:bpftool-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.src",
"CRB-8.1.0.Z.MAIN.EUS:kernel-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-abi-whitelists-0:4.18.0-147.0.2.el8_1.noarch",
"CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-core-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-cross-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-core-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debug-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-aarch64-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-ppc64le-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-s390x-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-debuginfo-common-x86_64-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-doc-0:4.18.0-147.0.2.el8_1.noarch",
"CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-headers-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-modules-extra-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:kernel-tools-libs-devel-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-core-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-devel-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:kernel-zfcpdump-modules-extra-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:perf-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-0:4.18.0-147.0.2.el8_1.x86_64",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.aarch64",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.ppc64le",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.s390x",
"CRB-8.1.0.Z.MAIN.EUS:python3-perf-debuginfo-0:4.18.0-147.0.2.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: TSX Transaction Asynchronous Abort (TAA)"
}
]
}
rhsa-2019_3838
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 7.5 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* hw: Machine Check Error on Page Size Change (IFU) (CVE-2018-12207)\n\n* hw: TSX Transaction Asynchronous Abort (TAA) (CVE-2019-11135)\n\n* hw: Intel GPU Denial Of Service while accessing MMIO in lower power state (CVE-2019-0154)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2019:3838",
"url": "https://access.redhat.com/errata/RHSA-2019:3838"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce",
"url": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/tsx-asynchronousabort",
"url": "https://access.redhat.com/solutions/tsx-asynchronousabort"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/i915-graphics",
"url": "https://access.redhat.com/solutions/i915-graphics"
},
{
"category": "external",
"summary": "1646768",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646768"
},
{
"category": "external",
"summary": "1724393",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1724393"
},
{
"category": "external",
"summary": "1753062",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753062"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_3838.json"
}
],
"title": "Red Hat Security Advisory: kernel security update",
"tracking": {
"current_release_date": "2024-11-15T03:17:43+00:00",
"generator": {
"date": "2024-11-15T03:17:43+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2019:3838",
"initial_release_date": "2019-11-12T20:51:27+00:00",
"revision_history": [
{
"date": "2019-11-12T20:51:27+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2019-11-12T20:51:27+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-15T03:17:43+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.5::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.5::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product": {
"name": "Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.5::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.5::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-862.43.2.el7.x86_64",
"product": {
"name": "kernel-0:3.10.0-862.43.2.el7.x86_64",
"product_id": "kernel-0:3.10.0-862.43.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-862.43.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"product": {
"name": "kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"product_id": "kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-862.43.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"product_id": "kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-862.43.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"product": {
"name": "kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"product_id": "kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-862.43.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"product": {
"name": "kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"product_id": "kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-862.43.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"product": {
"name": "kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"product_id": "kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-862.43.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"product_id": "kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-862.43.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-862.43.2.el7.x86_64",
"product": {
"name": "perf-0:3.10.0-862.43.2.el7.x86_64",
"product_id": "perf-0:3.10.0-862.43.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-862.43.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-862.43.2.el7.x86_64",
"product": {
"name": "python-perf-0:3.10.0-862.43.2.el7.x86_64",
"product_id": "python-perf-0:3.10.0-862.43.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-862.43.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-862.43.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"product_id": "kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-862.43.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-862.43.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-862.43.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"product": {
"name": "perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"product_id": "perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-862.43.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"product_id": "python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-862.43.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-862.43.2.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-862.43.2.el7.src",
"product": {
"name": "kernel-0:3.10.0-862.43.2.el7.src",
"product_id": "kernel-0:3.10.0-862.43.2.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-862.43.2.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"product": {
"name": "kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"product_id": "kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-862.43.2.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"product": {
"name": "kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"product_id": "kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@3.10.0-862.43.2.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-862.43.2.el7.s390x",
"product": {
"name": "kernel-0:3.10.0-862.43.2.el7.s390x",
"product_id": "kernel-0:3.10.0-862.43.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-862.43.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"product": {
"name": "kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"product_id": "kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-862.43.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"product": {
"name": "kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"product_id": "kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-862.43.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"product": {
"name": "kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"product_id": "kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-862.43.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"product": {
"name": "kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"product_id": "kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-862.43.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"product": {
"name": "kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"product_id": "kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump@3.10.0-862.43.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"product": {
"name": "kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"product_id": "kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-devel@3.10.0-862.43.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-862.43.2.el7.s390x",
"product": {
"name": "perf-0:3.10.0-862.43.2.el7.s390x",
"product_id": "perf-0:3.10.0-862.43.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-862.43.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-862.43.2.el7.s390x",
"product": {
"name": "python-perf-0:3.10.0-862.43.2.el7.s390x",
"product_id": "python-perf-0:3.10.0-862.43.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-862.43.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"product_id": "kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-862.43.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"product": {
"name": "kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"product_id": "kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-862.43.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@3.10.0-862.43.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"product": {
"name": "kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"product_id": "kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@3.10.0-862.43.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"product": {
"name": "perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"product_id": "perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-862.43.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"product_id": "python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-862.43.2.el7?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-862.43.2.el7.ppc64",
"product": {
"name": "kernel-0:3.10.0-862.43.2.el7.ppc64",
"product_id": "kernel-0:3.10.0-862.43.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-862.43.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"product": {
"name": "kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"product_id": "kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-862.43.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"product": {
"name": "kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"product_id": "kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-862.43.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"product_id": "kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-862.43.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"product": {
"name": "kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"product_id": "kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-862.43.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"product": {
"name": "kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"product_id": "kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-862.43.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"product": {
"name": "kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"product_id": "kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-862.43.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"product_id": "kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-862.43.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-862.43.2.el7.ppc64",
"product": {
"name": "perf-0:3.10.0-862.43.2.el7.ppc64",
"product_id": "perf-0:3.10.0-862.43.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-862.43.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-862.43.2.el7.ppc64",
"product": {
"name": "python-perf-0:3.10.0-862.43.2.el7.ppc64",
"product_id": "python-perf-0:3.10.0-862.43.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-862.43.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-862.43.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"product_id": "kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-862.43.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"product": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"product_id": "kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64@3.10.0-862.43.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-862.43.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"product": {
"name": "perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"product_id": "perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-862.43.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"product_id": "python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-862.43.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-862.43.2.el7?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-862.43.2.el7.ppc64le",
"product": {
"name": "kernel-0:3.10.0-862.43.2.el7.ppc64le",
"product_id": "kernel-0:3.10.0-862.43.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-862.43.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"product": {
"name": "kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"product_id": "kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-862.43.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"product": {
"name": "kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"product_id": "kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-862.43.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"product": {
"name": "kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"product_id": "kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-862.43.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"product": {
"name": "kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"product_id": "kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-862.43.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"product": {
"name": "kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"product_id": "kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-862.43.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"product_id": "kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-862.43.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-862.43.2.el7.ppc64le",
"product": {
"name": "perf-0:3.10.0-862.43.2.el7.ppc64le",
"product_id": "perf-0:3.10.0-862.43.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-862.43.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"product": {
"name": "python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"product_id": "python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-862.43.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"product_id": "kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-862.43.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"product_id": "kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-862.43.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@3.10.0-862.43.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"product_id": "kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-862.43.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"product": {
"name": "perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"product_id": "perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-862.43.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"product_id": "python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-862.43.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"product": {
"name": "kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"product_id": "kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-862.43.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"product_id": "kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-862.43.2.el7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.43.2.el7.src as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-862.43.2.el7.src",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-862.43.2.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "perf-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.43.2.el7.src as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-862.43.2.el7.src",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-862.43.2.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "perf-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.43.2.el7.src as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-862.43.2.el7.src",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-862.43.2.el7.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "perf-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.43.2.el7.src as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-862.43.2.el7.src",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-862.43.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "perf-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Intel"
]
},
{
"names": [
"Deepak Gupta"
],
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2018-12207",
"cwe": {
"id": "CWE-226",
"name": "Sensitive Information in Resource Not Removed Before Reuse"
},
"discovery_date": "2018-11-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1646768"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way Intel CPUs handle inconsistency between, virtual to physical memory address translations in CPU\u0027s local cache and system software\u0027s Paging structure entries. A privileged guest user may use this flaw to induce a hardware Machine Check Error on the host processor, resulting in a severe DoS scenario by halting the processor.\r\n\r\nSystem software like OS OR Virtual Machine Monitor (VMM) use virtual memory system for storing program instructions and data in memory. Virtual Memory system uses Paging structures like Page Tables and Page Directories to manage system memory. The processor\u0027s Memory Management Unit (MMU) uses Paging structure entries to translate program\u0027s virtual memory addresses to physical memory addresses. The processor stores these address translations into its local cache buffer called - Translation Lookaside Buffer (TLB). TLB has two parts, one for instructions and other for data addresses.\r\n\r\nSystem software can modify its Paging structure entries to change address mappings OR certain attributes like page size etc. Upon such Paging structure alterations in memory, system software must invalidate the corresponding address translations in the processor\u0027s TLB cache. But before this TLB invalidation takes place, a privileged guest user may trigger an instruction fetch operation, which could use an already cached, but now invalid, virtual to physical address translation from Instruction TLB (ITLB). Thus accessing an invalid physical memory address and resulting in halting the processor due to the Machine Check Error (MCE) on Page Size Change.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: Machine Check Error on Page Size Change (IFU)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-12207"
},
{
"category": "external",
"summary": "RHBZ#1646768",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646768"
},
{
"category": "external",
"summary": "RHSB-ifu-page-mce",
"url": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-12207",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12207"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-12207",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12207"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-11-12T20:51:27+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:3838"
},
{
"category": "workaround",
"details": "For mitigation related information, please refer to the Red Hat vulnerability article: https://access.redhat.com/security/vulnerabilities/ifu-page-mce .",
"product_ids": [
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: Machine Check Error on Page Size Change (IFU)"
},
{
"acknowledgments": [
{
"names": [
"Intel"
]
}
],
"cve": "CVE-2019-0154",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"discovery_date": "2019-06-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1724393"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Intel graphics hardware (GPU) where a local attacker with the ability to issue an ioctl could trigger a hardware level crash if MMIO registers were read while the graphics card was in a low-power state. This creates a denial of service situation and the GPU and connected displays will remain unusable until a reboot occurs.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: Intel GPU Denial Of Service while accessing MMIO in lower power state",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Intel plans to release BIOS firmware to correct this issue. Red Hat\u0027s kernel update should mitigate this vulnerability. Some older hardware will not have BIOS firmware update and will rely on operating system level protection to prevent access while the device is in low-power states. For more information see https://access.redhat.com/solutions/i915-graphics",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-0154"
},
{
"category": "external",
"summary": "RHBZ#1724393",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1724393"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-0154",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0154"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-0154",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0154"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/i915-graphics",
"url": "https://access.redhat.com/solutions/i915-graphics"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00260.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00260.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-11-12T20:51:27+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:3838"
},
{
"category": "workaround",
"details": "Preventing loading of the i915 kernel module will prevent attackers from using this exploit against the system however the power management functionality of the card will be disabled and the system may draw additional power. See this KCS article (https://access.redhat.com/solutions/41278) for instructions on how to disable a kernel module. Graphical displays may also be at low resolution or not work correctly. This mitigation may not be suitable if running graphical tools locally is required.",
"product_ids": [
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: Intel GPU Denial Of Service while accessing MMIO in lower power state"
},
{
"acknowledgments": [
{
"names": [
"Intel"
]
}
],
"cve": "CVE-2019-11135",
"cwe": {
"id": "CWE-203",
"name": "Observable Discrepancy"
},
"discovery_date": "2019-09-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1753062"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way Intel CPUs handle speculative execution of instructions when the TSX Asynchronous Abort (TAA) error occurs. A local authenticated attacker with the ability to monitor execution times could infer the TSX memory state by comparing abort execution times. This could allow information disclosure via this observed side-channel for any TSX transaction being executed while an attacker is able to observe abort timing.\r\n\r\nIntel\u0027s Transactional Synchronisation Extensions (TSX) are set of instructions which enable transactional memory support to improve performance of the multi-threaded applications, in the lock-protected critical sections. The CPU executes instructions in the critical-sections as transactions, while ensuring their atomic state. When such transaction execution is unsuccessful, the processor cannot ensure atomic updates to the transaction memory, so the processor rolls back or aborts such transaction execution.\r\n\r\nWhile TSX Asynchronous Abort (TAA) is pending, CPU may continue to read data from architectural buffers and pass it to the dependent speculative operations. This may cause information leakage via speculative side-channel means, which is quite similar to the Microarchitectural Data Sampling (MDS) issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: TSX Transaction Asynchronous Abort (TAA)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "libvirt and qemu-kvm on Red Hat Enterprise Linux 6 are not affected by this vulnerability as they do not support MSR-based CPU features.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11135"
},
{
"category": "external",
"summary": "RHBZ#1753062",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753062"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11135",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11135"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11135",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11135"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/tsx-asynchronousabort",
"url": "https://access.redhat.com/solutions/tsx-asynchronousabort"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00270.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00270.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-11-12T20:51:27+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:3838"
},
{
"category": "workaround",
"details": "For mitigation related information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/solutions/tsx-asynchronousabort",
"product_ids": [
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: TSX Transaction Asynchronous Abort (TAA)"
}
]
}
RHSA-2019:3833
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* hw: Machine Check Error on Page Size Change (IFU) (CVE-2018-12207)\n\n* hw: TSX Transaction Asynchronous Abort (TAA) (CVE-2019-11135)\n\n* hw: Intel GPU Denial Of Service while accessing MMIO in lower power state (CVE-2019-0154)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2019:3833",
"url": "https://access.redhat.com/errata/RHSA-2019:3833"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce",
"url": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/tsx-asynchronousabort",
"url": "https://access.redhat.com/solutions/tsx-asynchronousabort"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/i915-graphics",
"url": "https://access.redhat.com/solutions/i915-graphics"
},
{
"category": "external",
"summary": "1646768",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646768"
},
{
"category": "external",
"summary": "1724393",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1724393"
},
{
"category": "external",
"summary": "1753062",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753062"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_3833.json"
}
],
"title": "Red Hat Security Advisory: kernel-rt security update",
"tracking": {
"current_release_date": "2025-10-09T18:15:53+00:00",
"generator": {
"date": "2025-10-09T18:15:53+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2019:3833",
"initial_release_date": "2019-11-12T20:49:30+00:00",
"revision_history": [
{
"date": "2019-11-12T20:49:30+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2019-11-12T20:49:30+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T18:15:53+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.1.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::nfv"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Real Time (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.1.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::realtime"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"product": {
"name": "kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"product_id": "kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@4.18.0-147.0.2.rt24.94.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"product": {
"name": "kernel-rt-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"product_id": "kernel-rt-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-core@4.18.0-147.0.2.rt24.94.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"product": {
"name": "kernel-rt-debug-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"product_id": "kernel-rt-debug-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug@4.18.0-147.0.2.rt24.94.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"product": {
"name": "kernel-rt-debug-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"product_id": "kernel-rt-debug-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-core@4.18.0-147.0.2.rt24.94.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"product": {
"name": "kernel-rt-debug-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"product_id": "kernel-rt-debug-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-devel@4.18.0-147.0.2.rt24.94.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"product": {
"name": "kernel-rt-debug-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"product_id": "kernel-rt-debug-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@4.18.0-147.0.2.rt24.94.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"product": {
"name": "kernel-rt-debug-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"product_id": "kernel-rt-debug-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules@4.18.0-147.0.2.rt24.94.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"product": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"product_id": "kernel-rt-debug-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules-extra@4.18.0-147.0.2.rt24.94.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"product": {
"name": "kernel-rt-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"product_id": "kernel-rt-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-devel@4.18.0-147.0.2.rt24.94.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"product": {
"name": "kernel-rt-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"product_id": "kernel-rt-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-kvm@4.18.0-147.0.2.rt24.94.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"product": {
"name": "kernel-rt-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"product_id": "kernel-rt-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules@4.18.0-147.0.2.rt24.94.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"product": {
"name": "kernel-rt-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"product_id": "kernel-rt-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules-extra@4.18.0-147.0.2.rt24.94.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"product": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"product_id": "kernel-rt-debug-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@4.18.0-147.0.2.rt24.94.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"product": {
"name": "kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"product_id": "kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-kvm-debuginfo@4.18.0-147.0.2.rt24.94.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"product": {
"name": "kernel-rt-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"product_id": "kernel-rt-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo@4.18.0-147.0.2.rt24.94.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"product": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"product_id": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@4.18.0-147.0.2.rt24.94.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"product": {
"name": "kernel-rt-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"product_id": "kernel-rt-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-kvm-debuginfo@4.18.0-147.0.2.rt24.94.el8_1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.src",
"product": {
"name": "kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.src",
"product_id": "kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@4.18.0-147.0.2.rt24.94.el8_1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.src as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.src"
},
"product_reference": "kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.src",
"relates_to_product_reference": "NFV-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64"
},
"product_reference": "kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"relates_to_product_reference": "NFV-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.1.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64"
},
"product_reference": "kernel-rt-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"relates_to_product_reference": "NFV-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64"
},
"product_reference": "kernel-rt-debug-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"relates_to_product_reference": "NFV-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"relates_to_product_reference": "NFV-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"relates_to_product_reference": "NFV-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"relates_to_product_reference": "NFV-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"relates_to_product_reference": "NFV-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"relates_to_product_reference": "NFV-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"relates_to_product_reference": "NFV-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"relates_to_product_reference": "NFV-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"relates_to_product_reference": "NFV-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"relates_to_product_reference": "NFV-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.1.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64"
},
"product_reference": "kernel-rt-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"relates_to_product_reference": "NFV-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64"
},
"product_reference": "kernel-rt-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"relates_to_product_reference": "NFV-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64"
},
"product_reference": "kernel-rt-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"relates_to_product_reference": "NFV-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.1.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64"
},
"product_reference": "kernel-rt-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"relates_to_product_reference": "NFV-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)",
"product_id": "NFV-8.1.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"relates_to_product_reference": "NFV-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.src as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.src"
},
"product_reference": "kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.src",
"relates_to_product_reference": "RT-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64"
},
"product_reference": "kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"relates_to_product_reference": "RT-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.1.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64"
},
"product_reference": "kernel-rt-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"relates_to_product_reference": "RT-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64"
},
"product_reference": "kernel-rt-debug-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"relates_to_product_reference": "RT-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"relates_to_product_reference": "RT-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"relates_to_product_reference": "RT-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"relates_to_product_reference": "RT-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"relates_to_product_reference": "RT-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"relates_to_product_reference": "RT-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"relates_to_product_reference": "RT-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"relates_to_product_reference": "RT-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"relates_to_product_reference": "RT-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"relates_to_product_reference": "RT-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.1.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64"
},
"product_reference": "kernel-rt-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"relates_to_product_reference": "RT-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64"
},
"product_reference": "kernel-rt-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"relates_to_product_reference": "RT-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64"
},
"product_reference": "kernel-rt-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"relates_to_product_reference": "RT-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.1.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64"
},
"product_reference": "kernel-rt-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"relates_to_product_reference": "RT-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)",
"product_id": "RT-8.1.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"relates_to_product_reference": "RT-8.1.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Intel"
]
},
{
"names": [
"Deepak Gupta"
],
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2018-12207",
"cwe": {
"id": "CWE-226",
"name": "Sensitive Information in Resource Not Removed Before Reuse"
},
"discovery_date": "2018-11-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1646768"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way Intel CPUs handle inconsistency between, virtual to physical memory address translations in CPU\u0027s local cache and system software\u0027s Paging structure entries. A privileged guest user may use this flaw to induce a hardware Machine Check Error on the host processor, resulting in a severe DoS scenario by halting the processor.\r\n\r\nSystem software like OS OR Virtual Machine Monitor (VMM) use virtual memory system for storing program instructions and data in memory. Virtual Memory system uses Paging structures like Page Tables and Page Directories to manage system memory. The processor\u0027s Memory Management Unit (MMU) uses Paging structure entries to translate program\u0027s virtual memory addresses to physical memory addresses. The processor stores these address translations into its local cache buffer called - Translation Lookaside Buffer (TLB). TLB has two parts, one for instructions and other for data addresses.\r\n\r\nSystem software can modify its Paging structure entries to change address mappings OR certain attributes like page size etc. Upon such Paging structure alterations in memory, system software must invalidate the corresponding address translations in the processor\u0027s TLB cache. But before this TLB invalidation takes place, a privileged guest user may trigger an instruction fetch operation, which could use an already cached, but now invalid, virtual to physical address translation from Instruction TLB (ITLB). Thus accessing an invalid physical memory address and resulting in halting the processor due to the Machine Check Error (MCE) on Page Size Change.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: Machine Check Error on Page Size Change (IFU)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.src",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.src",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-12207"
},
{
"category": "external",
"summary": "RHBZ#1646768",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646768"
},
{
"category": "external",
"summary": "RHSB-ifu-page-mce",
"url": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-12207",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12207"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-12207",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12207"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-11-12T20:49:30+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.src",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.src",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:3833"
},
{
"category": "workaround",
"details": "For mitigation related information, please refer to the Red Hat vulnerability article: https://access.redhat.com/security/vulnerabilities/ifu-page-mce .",
"product_ids": [
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.src",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.src",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.src",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.src",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: Machine Check Error on Page Size Change (IFU)"
},
{
"acknowledgments": [
{
"names": [
"Intel"
]
}
],
"cve": "CVE-2019-0154",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"discovery_date": "2019-06-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1724393"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Intel graphics hardware (GPU) where a local attacker with the ability to issue an ioctl could trigger a hardware level crash if MMIO registers were read while the graphics card was in a low-power state. This creates a denial of service situation and the GPU and connected displays will remain unusable until a reboot occurs.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: Intel GPU Denial Of Service while accessing MMIO in lower power state",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Intel plans to release BIOS firmware to correct this issue. Red Hat\u0027s kernel update should mitigate this vulnerability. Some older hardware will not have BIOS firmware update and will rely on operating system level protection to prevent access while the device is in low-power states. For more information see https://access.redhat.com/solutions/i915-graphics",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.src",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.src",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-0154"
},
{
"category": "external",
"summary": "RHBZ#1724393",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1724393"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-0154",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0154"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-0154",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0154"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/i915-graphics",
"url": "https://access.redhat.com/solutions/i915-graphics"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00260.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00260.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-11-12T20:49:30+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.src",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.src",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:3833"
},
{
"category": "workaround",
"details": "Preventing loading of the i915 kernel module will prevent attackers from using this exploit against the system however the power management functionality of the card will be disabled and the system may draw additional power. See this KCS article (https://access.redhat.com/solutions/41278) for instructions on how to disable a kernel module. Graphical displays may also be at low resolution or not work correctly. This mitigation may not be suitable if running graphical tools locally is required.",
"product_ids": [
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.src",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.src",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.src",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.src",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: Intel GPU Denial Of Service while accessing MMIO in lower power state"
},
{
"acknowledgments": [
{
"names": [
"Intel"
]
}
],
"cve": "CVE-2019-11135",
"cwe": {
"id": "CWE-203",
"name": "Observable Discrepancy"
},
"discovery_date": "2019-09-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1753062"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way Intel CPUs handle speculative execution of instructions when the TSX Asynchronous Abort (TAA) error occurs. A local authenticated attacker with the ability to monitor execution times could infer the TSX memory state by comparing abort execution times. This could allow information disclosure via this observed side-channel for any TSX transaction being executed while an attacker is able to observe abort timing.\r\n\r\nIntel\u0027s Transactional Synchronisation Extensions (TSX) are set of instructions which enable transactional memory support to improve performance of the multi-threaded applications, in the lock-protected critical sections. The CPU executes instructions in the critical-sections as transactions, while ensuring their atomic state. When such transaction execution is unsuccessful, the processor cannot ensure atomic updates to the transaction memory, so the processor rolls back or aborts such transaction execution.\r\n\r\nWhile TSX Asynchronous Abort (TAA) is pending, CPU may continue to read data from architectural buffers and pass it to the dependent speculative operations. This may cause information leakage via speculative side-channel means, which is quite similar to the Microarchitectural Data Sampling (MDS) issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: TSX Transaction Asynchronous Abort (TAA)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "libvirt and qemu-kvm on Red Hat Enterprise Linux 6 are not affected by this vulnerability as they do not support MSR-based CPU features.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.src",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.src",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11135"
},
{
"category": "external",
"summary": "RHBZ#1753062",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753062"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11135",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11135"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11135",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11135"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/tsx-asynchronousabort",
"url": "https://access.redhat.com/solutions/tsx-asynchronousabort"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00270.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00270.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-11-12T20:49:30+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.src",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.src",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:3833"
},
{
"category": "workaround",
"details": "For mitigation related information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/solutions/tsx-asynchronousabort",
"product_ids": [
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.src",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.src",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.src",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"NFV-8.1.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.src",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-core-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debug-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-debuginfo-common-x86_64-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-devel-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-kvm-debuginfo-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-modules-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64",
"RT-8.1.0.Z.MAIN.EUS:kernel-rt-modules-extra-0:4.18.0-147.0.2.rt24.94.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: TSX Transaction Asynchronous Abort (TAA)"
}
]
}
rhsa-2019_3860
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for redhat-release-virtualization-host and redhat-virtualization-host is now available for Red Hat Virtualization 4 for Red Hat Enterprise Linux 7 and Red Hat Virtualization 4.2 for Red Hat Enterprise Linux 7.6 EUS.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The redhat-virtualization-host packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts (RHVH) are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host\u0027s resources and performing administrative tasks. \n\nThe ovirt-node-ng packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts (RHVH) are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host\u0027s resources and performing administrative tasks.\n\nSecurity Fix(es):\n\n* hw: Machine Check Error on Page Size Change (IFU) (CVE-2018-12207)\n\n* hw: TSX Transaction Asynchronous Abort (TAA) (CVE-2019-11135)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2019:3860",
"url": "https://access.redhat.com/errata/RHSA-2019:3860"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce",
"url": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/tsx-asynchronousabort",
"url": "https://access.redhat.com/solutions/tsx-asynchronousabort"
},
{
"category": "external",
"summary": "1646768",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646768"
},
{
"category": "external",
"summary": "1753062",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753062"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_3860.json"
}
],
"title": "Red Hat Security Advisory: redhat-release-virtualization-host and redhat-virtualization-host update",
"tracking": {
"current_release_date": "2024-11-15T03:17:25+00:00",
"generator": {
"date": "2024-11-15T03:17:25+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2019:3860",
"initial_release_date": "2019-11-12T20:11:55+00:00",
"revision_history": [
{
"date": "2019-11-12T20:11:55+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2019-11-12T20:11:55+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-15T03:17:25+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product": {
"name": "Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::hypervisor"
}
}
},
{
"category": "product_name",
"name": "RHEL 7-based RHEV-H for RHEV 4.2 (build requirements)",
"product": {
"name": "RHEL 7-based RHEV-H for RHEV 4.2 (build requirements)",
"product_id": "7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::hypervisor"
}
}
},
{
"category": "product_name",
"name": "RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
"product": {
"name": "RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "7Server-RHEV-4-HypervisorBuild-7",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::hypervisor"
}
}
},
{
"category": "product_name",
"name": "Red Hat Virtualization 4 Hypervisor for RHEL 7",
"product": {
"name": "Red Hat Virtualization 4 Hypervisor for RHEL 7",
"product_id": "7Server-RHEV-4-Hypervisor-7",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::hypervisor"
}
}
}
],
"category": "product_family",
"name": "Red Hat Virtualization"
},
{
"branches": [
{
"category": "product_version",
"name": "redhat-release-virtualization-host-0:4.2-16.1.el7.x86_64",
"product": {
"name": "redhat-release-virtualization-host-0:4.2-16.1.el7.x86_64",
"product_id": "redhat-release-virtualization-host-0:4.2-16.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-release-virtualization-host@4.2-16.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "redhat-release-virtualization-host-content-0:4.2-16.1.el7.x86_64",
"product": {
"name": "redhat-release-virtualization-host-content-0:4.2-16.1.el7.x86_64",
"product_id": "redhat-release-virtualization-host-content-0:4.2-16.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-release-virtualization-host-content@4.2-16.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "redhat-release-virtualization-host-0:4.3.6-5.el7ev.x86_64",
"product": {
"name": "redhat-release-virtualization-host-0:4.3.6-5.el7ev.x86_64",
"product_id": "redhat-release-virtualization-host-0:4.3.6-5.el7ev.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-release-virtualization-host@4.3.6-5.el7ev?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "redhat-release-virtualization-host-0:4.2-16.1.el7.src",
"product": {
"name": "redhat-release-virtualization-host-0:4.2-16.1.el7.src",
"product_id": "redhat-release-virtualization-host-0:4.2-16.1.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-release-virtualization-host@4.2-16.1.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "redhat-virtualization-host-0:4.2-20191107.0.el7_6.src",
"product": {
"name": "redhat-virtualization-host-0:4.2-20191107.0.el7_6.src",
"product_id": "redhat-virtualization-host-0:4.2-20191107.0.el7_6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-virtualization-host@4.2-20191107.0.el7_6?arch=src"
}
}
},
{
"category": "product_version",
"name": "redhat-release-virtualization-host-0:4.3.6-5.el7ev.src",
"product": {
"name": "redhat-release-virtualization-host-0:4.3.6-5.el7ev.src",
"product_id": "redhat-release-virtualization-host-0:4.3.6-5.el7ev.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-release-virtualization-host@4.3.6-5.el7ev?arch=src"
}
}
},
{
"category": "product_version",
"name": "redhat-virtualization-host-0:4.3.6-20191108.0.el7_7.src",
"product": {
"name": "redhat-virtualization-host-0:4.3.6-20191108.0.el7_7.src",
"product_id": "redhat-virtualization-host-0:4.3.6-20191108.0.el7_7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-virtualization-host@4.3.6-20191108.0.el7_7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "redhat-virtualization-host-image-update-placeholder-0:4.2-16.1.el7.noarch",
"product": {
"name": "redhat-virtualization-host-image-update-placeholder-0:4.2-16.1.el7.noarch",
"product_id": "redhat-virtualization-host-image-update-placeholder-0:4.2-16.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-virtualization-host-image-update-placeholder@4.2-16.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "redhat-virtualization-host-image-update-0:4.2-20191107.0.el7_6.noarch",
"product": {
"name": "redhat-virtualization-host-image-update-0:4.2-20191107.0.el7_6.noarch",
"product_id": "redhat-virtualization-host-image-update-0:4.2-20191107.0.el7_6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-virtualization-host-image-update@4.2-20191107.0.el7_6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "redhat-virtualization-host-image-update-placeholder-0:4.3.6-5.el7ev.noarch",
"product": {
"name": "redhat-virtualization-host-image-update-placeholder-0:4.3.6-5.el7ev.noarch",
"product_id": "redhat-virtualization-host-image-update-placeholder-0:4.3.6-5.el7ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-virtualization-host-image-update-placeholder@4.3.6-5.el7ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "redhat-virtualization-host-image-update-0:4.3.6-20191108.0.el7_7.noarch",
"product": {
"name": "redhat-virtualization-host-image-update-0:4.3.6-20191108.0.el7_7.noarch",
"product_id": "redhat-virtualization-host-image-update-0:4.3.6-20191108.0.el7_7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-virtualization-host-image-update@4.3.6-20191108.0.el7_7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-virtualization-host-0:4.2-16.1.el7.src as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-0:4.2-16.1.el7.src"
},
"product_reference": "redhat-release-virtualization-host-0:4.2-16.1.el7.src",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-virtualization-host-0:4.2-16.1.el7.x86_64 as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-0:4.2-16.1.el7.x86_64"
},
"product_reference": "redhat-release-virtualization-host-0:4.2-16.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-virtualization-host-content-0:4.2-16.1.el7.x86_64 as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-content-0:4.2-16.1.el7.x86_64"
},
"product_reference": "redhat-release-virtualization-host-content-0:4.2-16.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-0:4.2-20191107.0.el7_6.src as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-0:4.2-20191107.0.el7_6.src"
},
"product_reference": "redhat-virtualization-host-0:4.2-20191107.0.el7_6.src",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-image-update-0:4.2-20191107.0.el7_6.noarch as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-image-update-0:4.2-20191107.0.el7_6.noarch"
},
"product_reference": "redhat-virtualization-host-image-update-0:4.2-20191107.0.el7_6.noarch",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-image-update-placeholder-0:4.2-16.1.el7.noarch as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-image-update-placeholder-0:4.2-16.1.el7.noarch"
},
"product_reference": "redhat-virtualization-host-image-update-placeholder-0:4.2-16.1.el7.noarch",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-virtualization-host-0:4.2-16.1.el7.src as a component of RHEL 7-based RHEV-H for RHEV 4.2 (build requirements)",
"product_id": "7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-0:4.2-16.1.el7.src"
},
"product_reference": "redhat-release-virtualization-host-0:4.2-16.1.el7.src",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-virtualization-host-0:4.2-16.1.el7.x86_64 as a component of RHEL 7-based RHEV-H for RHEV 4.2 (build requirements)",
"product_id": "7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-0:4.2-16.1.el7.x86_64"
},
"product_reference": "redhat-release-virtualization-host-0:4.2-16.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-virtualization-host-content-0:4.2-16.1.el7.x86_64 as a component of RHEL 7-based RHEV-H for RHEV 4.2 (build requirements)",
"product_id": "7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-content-0:4.2-16.1.el7.x86_64"
},
"product_reference": "redhat-release-virtualization-host-content-0:4.2-16.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-image-update-placeholder-0:4.2-16.1.el7.noarch as a component of RHEL 7-based RHEV-H for RHEV 4.2 (build requirements)",
"product_id": "7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-virtualization-host-image-update-placeholder-0:4.2-16.1.el7.noarch"
},
"product_reference": "redhat-virtualization-host-image-update-placeholder-0:4.2-16.1.el7.noarch",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-0:4.3.6-20191108.0.el7_7.src as a component of Red Hat Virtualization 4 Hypervisor for RHEL 7",
"product_id": "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.6-20191108.0.el7_7.src"
},
"product_reference": "redhat-virtualization-host-0:4.3.6-20191108.0.el7_7.src",
"relates_to_product_reference": "7Server-RHEV-4-Hypervisor-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-image-update-0:4.3.6-20191108.0.el7_7.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 7",
"product_id": "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.6-20191108.0.el7_7.noarch"
},
"product_reference": "redhat-virtualization-host-image-update-0:4.3.6-20191108.0.el7_7.noarch",
"relates_to_product_reference": "7Server-RHEV-4-Hypervisor-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-virtualization-host-0:4.3.6-5.el7ev.src as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.6-5.el7ev.src"
},
"product_reference": "redhat-release-virtualization-host-0:4.3.6-5.el7ev.src",
"relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-virtualization-host-0:4.3.6-5.el7ev.x86_64 as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.6-5.el7ev.x86_64"
},
"product_reference": "redhat-release-virtualization-host-0:4.3.6-5.el7ev.x86_64",
"relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-0:4.3.6-20191108.0.el7_7.src as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.6-20191108.0.el7_7.src"
},
"product_reference": "redhat-virtualization-host-0:4.3.6-20191108.0.el7_7.src",
"relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-image-update-0:4.3.6-20191108.0.el7_7.noarch as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.6-20191108.0.el7_7.noarch"
},
"product_reference": "redhat-virtualization-host-image-update-0:4.3.6-20191108.0.el7_7.noarch",
"relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-image-update-placeholder-0:4.3.6-5.el7ev.noarch as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.6-5.el7ev.noarch"
},
"product_reference": "redhat-virtualization-host-image-update-placeholder-0:4.3.6-5.el7ev.noarch",
"relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Intel"
]
},
{
"names": [
"Deepak Gupta"
],
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2018-12207",
"cwe": {
"id": "CWE-226",
"name": "Sensitive Information in Resource Not Removed Before Reuse"
},
"discovery_date": "2018-11-06T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-0:4.2-16.1.el7.src",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-0:4.2-16.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-content-0:4.2-16.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-image-update-placeholder-0:4.2-16.1.el7.noarch",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-0:4.2-16.1.el7.src",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-0:4.2-16.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-content-0:4.2-16.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-virtualization-host-image-update-placeholder-0:4.2-16.1.el7.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.6-5.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.6-5.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.6-5.el7ev.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1646768"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way Intel CPUs handle inconsistency between, virtual to physical memory address translations in CPU\u0027s local cache and system software\u0027s Paging structure entries. A privileged guest user may use this flaw to induce a hardware Machine Check Error on the host processor, resulting in a severe DoS scenario by halting the processor.\r\n\r\nSystem software like OS OR Virtual Machine Monitor (VMM) use virtual memory system for storing program instructions and data in memory. Virtual Memory system uses Paging structures like Page Tables and Page Directories to manage system memory. The processor\u0027s Memory Management Unit (MMU) uses Paging structure entries to translate program\u0027s virtual memory addresses to physical memory addresses. The processor stores these address translations into its local cache buffer called - Translation Lookaside Buffer (TLB). TLB has two parts, one for instructions and other for data addresses.\r\n\r\nSystem software can modify its Paging structure entries to change address mappings OR certain attributes like page size etc. Upon such Paging structure alterations in memory, system software must invalidate the corresponding address translations in the processor\u0027s TLB cache. But before this TLB invalidation takes place, a privileged guest user may trigger an instruction fetch operation, which could use an already cached, but now invalid, virtual to physical address translation from Instruction TLB (ITLB). Thus accessing an invalid physical memory address and resulting in halting the processor due to the Machine Check Error (MCE) on Page Size Change.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: Machine Check Error on Page Size Change (IFU)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-0:4.2-20191107.0.el7_6.src",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-image-update-0:4.2-20191107.0.el7_6.noarch",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.6-20191108.0.el7_7.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.6-20191108.0.el7_7.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.6-20191108.0.el7_7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.6-20191108.0.el7_7.noarch"
],
"known_not_affected": [
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-0:4.2-16.1.el7.src",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-0:4.2-16.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-content-0:4.2-16.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-image-update-placeholder-0:4.2-16.1.el7.noarch",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-0:4.2-16.1.el7.src",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-0:4.2-16.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-content-0:4.2-16.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-virtualization-host-image-update-placeholder-0:4.2-16.1.el7.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.6-5.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.6-5.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.6-5.el7ev.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-12207"
},
{
"category": "external",
"summary": "RHBZ#1646768",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646768"
},
{
"category": "external",
"summary": "RHSB-ifu-page-mce",
"url": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-12207",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12207"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-12207",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12207"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-11-12T20:11:55+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-0:4.2-20191107.0.el7_6.src",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-image-update-0:4.2-20191107.0.el7_6.noarch",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.6-20191108.0.el7_7.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.6-20191108.0.el7_7.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.6-20191108.0.el7_7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.6-20191108.0.el7_7.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:3860"
},
{
"category": "workaround",
"details": "For mitigation related information, please refer to the Red Hat vulnerability article: https://access.redhat.com/security/vulnerabilities/ifu-page-mce .",
"product_ids": [
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-0:4.2-16.1.el7.src",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-0:4.2-16.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-content-0:4.2-16.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-0:4.2-20191107.0.el7_6.src",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-image-update-0:4.2-20191107.0.el7_6.noarch",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-image-update-placeholder-0:4.2-16.1.el7.noarch",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-0:4.2-16.1.el7.src",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-0:4.2-16.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-content-0:4.2-16.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-virtualization-host-image-update-placeholder-0:4.2-16.1.el7.noarch",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.6-20191108.0.el7_7.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.6-20191108.0.el7_7.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.6-5.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.6-5.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.6-20191108.0.el7_7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.6-20191108.0.el7_7.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.6-5.el7ev.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-0:4.2-20191107.0.el7_6.src",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-image-update-0:4.2-20191107.0.el7_6.noarch",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.6-20191108.0.el7_7.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.6-20191108.0.el7_7.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.6-20191108.0.el7_7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.6-20191108.0.el7_7.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: Machine Check Error on Page Size Change (IFU)"
},
{
"acknowledgments": [
{
"names": [
"Intel"
]
}
],
"cve": "CVE-2019-11135",
"cwe": {
"id": "CWE-203",
"name": "Observable Discrepancy"
},
"discovery_date": "2019-09-18T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-0:4.2-16.1.el7.src",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-0:4.2-16.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-content-0:4.2-16.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-image-update-placeholder-0:4.2-16.1.el7.noarch",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-0:4.2-16.1.el7.src",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-0:4.2-16.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-content-0:4.2-16.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-virtualization-host-image-update-placeholder-0:4.2-16.1.el7.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.6-5.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.6-5.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.6-5.el7ev.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1753062"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way Intel CPUs handle speculative execution of instructions when the TSX Asynchronous Abort (TAA) error occurs. A local authenticated attacker with the ability to monitor execution times could infer the TSX memory state by comparing abort execution times. This could allow information disclosure via this observed side-channel for any TSX transaction being executed while an attacker is able to observe abort timing.\r\n\r\nIntel\u0027s Transactional Synchronisation Extensions (TSX) are set of instructions which enable transactional memory support to improve performance of the multi-threaded applications, in the lock-protected critical sections. The CPU executes instructions in the critical-sections as transactions, while ensuring their atomic state. When such transaction execution is unsuccessful, the processor cannot ensure atomic updates to the transaction memory, so the processor rolls back or aborts such transaction execution.\r\n\r\nWhile TSX Asynchronous Abort (TAA) is pending, CPU may continue to read data from architectural buffers and pass it to the dependent speculative operations. This may cause information leakage via speculative side-channel means, which is quite similar to the Microarchitectural Data Sampling (MDS) issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: TSX Transaction Asynchronous Abort (TAA)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "libvirt and qemu-kvm on Red Hat Enterprise Linux 6 are not affected by this vulnerability as they do not support MSR-based CPU features.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-0:4.2-20191107.0.el7_6.src",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-image-update-0:4.2-20191107.0.el7_6.noarch",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.6-20191108.0.el7_7.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.6-20191108.0.el7_7.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.6-20191108.0.el7_7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.6-20191108.0.el7_7.noarch"
],
"known_not_affected": [
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-0:4.2-16.1.el7.src",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-0:4.2-16.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-content-0:4.2-16.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-image-update-placeholder-0:4.2-16.1.el7.noarch",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-0:4.2-16.1.el7.src",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-0:4.2-16.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-content-0:4.2-16.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-virtualization-host-image-update-placeholder-0:4.2-16.1.el7.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.6-5.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.6-5.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.6-5.el7ev.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11135"
},
{
"category": "external",
"summary": "RHBZ#1753062",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753062"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11135",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11135"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11135",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11135"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/tsx-asynchronousabort",
"url": "https://access.redhat.com/solutions/tsx-asynchronousabort"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00270.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00270.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-11-12T20:11:55+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-0:4.2-20191107.0.el7_6.src",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-image-update-0:4.2-20191107.0.el7_6.noarch",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.6-20191108.0.el7_7.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.6-20191108.0.el7_7.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.6-20191108.0.el7_7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.6-20191108.0.el7_7.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:3860"
},
{
"category": "workaround",
"details": "For mitigation related information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/solutions/tsx-asynchronousabort",
"product_ids": [
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-0:4.2-16.1.el7.src",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-0:4.2-16.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-content-0:4.2-16.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-0:4.2-20191107.0.el7_6.src",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-image-update-0:4.2-20191107.0.el7_6.noarch",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-image-update-placeholder-0:4.2-16.1.el7.noarch",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-0:4.2-16.1.el7.src",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-0:4.2-16.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-content-0:4.2-16.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-virtualization-host-image-update-placeholder-0:4.2-16.1.el7.noarch",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.6-20191108.0.el7_7.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.6-20191108.0.el7_7.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.6-5.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.6-5.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.6-20191108.0.el7_7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.6-20191108.0.el7_7.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.6-5.el7ev.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-0:4.2-20191107.0.el7_6.src",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-image-update-0:4.2-20191107.0.el7_6.noarch",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.6-20191108.0.el7_7.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.6-20191108.0.el7_7.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.6-20191108.0.el7_7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.6-20191108.0.el7_7.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: TSX Transaction Asynchronous Abort (TAA)"
}
]
}
rhsa-2020:0026
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kpatch-patch is now available for Red Hat Enterprise Linux 7.6 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.\n\nSecurity Fix(es):\n\n* hw: Machine Check Error on Page Size Change (IFU) (CVE-2018-12207)\n\n* hw: TSX Transaction Asynchronous Abort (TAA) (CVE-2019-11135)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgements, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2020:0026",
"url": "https://access.redhat.com/errata/RHSA-2020:0026"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce",
"url": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/tsx-asynchronousabort",
"url": "https://access.redhat.com/solutions/tsx-asynchronousabort"
},
{
"category": "external",
"summary": "1646768",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646768"
},
{
"category": "external",
"summary": "1753062",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753062"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_0026.json"
}
],
"title": "Red Hat Security Advisory: kpatch-patch security update",
"tracking": {
"current_release_date": "2025-10-09T18:15:59+00:00",
"generator": {
"date": "2025-10-09T18:15:59+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2020:0026",
"initial_release_date": "2020-01-06T14:16:53+00:00",
"revision_history": [
{
"date": "2020-01-06T14:16:53+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2020-01-06T14:16:53+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T18:15:59+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product": {
"name": "Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.6::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_35_2-0:1-4.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_35_2-0:1-4.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_35_2-0:1-4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_35_2@1-4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_35_2-debuginfo-0:1-4.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_35_2-debuginfo-0:1-4.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_35_2-debuginfo-0:1-4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_35_2-debuginfo@1-4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_38_1-0:1-3.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_38_1-0:1-3.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_38_1-0:1-3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_38_1@1-3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_38_1-debuginfo-0:1-3.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_38_1-debuginfo-0:1-3.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_38_1-debuginfo-0:1-3.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_38_1-debuginfo@1-3.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_35_1-0:1-5.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_35_1-0:1-5.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_35_1-0:1-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_35_1@1-5.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_35_1-debuginfo-0:1-5.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-957_35_1-debuginfo-0:1-5.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-957_35_1-debuginfo-0:1-5.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_35_1-debuginfo@1-5.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_35_2-0:1-4.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-957_35_2-0:1-4.el7.src",
"product_id": "kpatch-patch-3_10_0-957_35_2-0:1-4.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_35_2@1-4.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_38_1-0:1-3.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-957_38_1-0:1-3.el7.src",
"product_id": "kpatch-patch-3_10_0-957_38_1-0:1-3.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_38_1@1-3.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-957_35_1-0:1-5.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-957_35_1-0:1-5.el7.src",
"product_id": "kpatch-patch-3_10_0-957_35_1-0:1-5.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-957_35_1@1-5.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_35_1-0:1-5.el7.src as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_1-0:1-5.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-957_35_1-0:1-5.el7.src",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_35_1-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_1-0:1-5.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_35_1-0:1-5.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_35_1-debuginfo-0:1-5.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_1-debuginfo-0:1-5.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_35_1-debuginfo-0:1-5.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_35_2-0:1-4.el7.src as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_2-0:1-4.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-957_35_2-0:1-4.el7.src",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_35_2-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_2-0:1-4.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_35_2-0:1-4.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_35_2-debuginfo-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_2-debuginfo-0:1-4.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_35_2-debuginfo-0:1-4.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_38_1-0:1-3.el7.src as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kpatch-patch-3_10_0-957_38_1-0:1-3.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-957_38_1-0:1-3.el7.src",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_38_1-0:1-3.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kpatch-patch-3_10_0-957_38_1-0:1-3.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_38_1-0:1-3.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-957_38_1-debuginfo-0:1-3.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-7.6.EUS:kpatch-patch-3_10_0-957_38_1-debuginfo-0:1-3.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-957_38_1-debuginfo-0:1-3.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Intel"
]
},
{
"names": [
"Deepak Gupta"
],
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2018-12207",
"cwe": {
"id": "CWE-226",
"name": "Sensitive Information in Resource Not Removed Before Reuse"
},
"discovery_date": "2018-11-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1646768"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way Intel CPUs handle inconsistency between, virtual to physical memory address translations in CPU\u0027s local cache and system software\u0027s Paging structure entries. A privileged guest user may use this flaw to induce a hardware Machine Check Error on the host processor, resulting in a severe DoS scenario by halting the processor.\r\n\r\nSystem software like OS OR Virtual Machine Monitor (VMM) use virtual memory system for storing program instructions and data in memory. Virtual Memory system uses Paging structures like Page Tables and Page Directories to manage system memory. The processor\u0027s Memory Management Unit (MMU) uses Paging structure entries to translate program\u0027s virtual memory addresses to physical memory addresses. The processor stores these address translations into its local cache buffer called - Translation Lookaside Buffer (TLB). TLB has two parts, one for instructions and other for data addresses.\r\n\r\nSystem software can modify its Paging structure entries to change address mappings OR certain attributes like page size etc. Upon such Paging structure alterations in memory, system software must invalidate the corresponding address translations in the processor\u0027s TLB cache. But before this TLB invalidation takes place, a privileged guest user may trigger an instruction fetch operation, which could use an already cached, but now invalid, virtual to physical address translation from Instruction TLB (ITLB). Thus accessing an invalid physical memory address and resulting in halting the processor due to the Machine Check Error (MCE) on Page Size Change.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: Machine Check Error on Page Size Change (IFU)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_1-0:1-5.el7.src",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_1-0:1-5.el7.x86_64",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_2-0:1-4.el7.src",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_2-0:1-4.el7.x86_64",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_2-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_38_1-0:1-3.el7.src",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_38_1-0:1-3.el7.x86_64",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_38_1-debuginfo-0:1-3.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-12207"
},
{
"category": "external",
"summary": "RHBZ#1646768",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646768"
},
{
"category": "external",
"summary": "RHSB-ifu-page-mce",
"url": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-12207",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12207"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-12207",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12207"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-01-06T14:16:53+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_1-0:1-5.el7.src",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_1-0:1-5.el7.x86_64",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_2-0:1-4.el7.src",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_2-0:1-4.el7.x86_64",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_2-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_38_1-0:1-3.el7.src",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_38_1-0:1-3.el7.x86_64",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_38_1-debuginfo-0:1-3.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2020:0026"
},
{
"category": "workaround",
"details": "For mitigation related information, please refer to the Red Hat vulnerability article: https://access.redhat.com/security/vulnerabilities/ifu-page-mce .",
"product_ids": [
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_1-0:1-5.el7.src",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_1-0:1-5.el7.x86_64",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_2-0:1-4.el7.src",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_2-0:1-4.el7.x86_64",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_2-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_38_1-0:1-3.el7.src",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_38_1-0:1-3.el7.x86_64",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_38_1-debuginfo-0:1-3.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_1-0:1-5.el7.src",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_1-0:1-5.el7.x86_64",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_2-0:1-4.el7.src",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_2-0:1-4.el7.x86_64",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_2-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_38_1-0:1-3.el7.src",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_38_1-0:1-3.el7.x86_64",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_38_1-debuginfo-0:1-3.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: Machine Check Error on Page Size Change (IFU)"
},
{
"acknowledgments": [
{
"names": [
"Intel"
]
}
],
"cve": "CVE-2019-11135",
"cwe": {
"id": "CWE-203",
"name": "Observable Discrepancy"
},
"discovery_date": "2019-09-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1753062"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way Intel CPUs handle speculative execution of instructions when the TSX Asynchronous Abort (TAA) error occurs. A local authenticated attacker with the ability to monitor execution times could infer the TSX memory state by comparing abort execution times. This could allow information disclosure via this observed side-channel for any TSX transaction being executed while an attacker is able to observe abort timing.\r\n\r\nIntel\u0027s Transactional Synchronisation Extensions (TSX) are set of instructions which enable transactional memory support to improve performance of the multi-threaded applications, in the lock-protected critical sections. The CPU executes instructions in the critical-sections as transactions, while ensuring their atomic state. When such transaction execution is unsuccessful, the processor cannot ensure atomic updates to the transaction memory, so the processor rolls back or aborts such transaction execution.\r\n\r\nWhile TSX Asynchronous Abort (TAA) is pending, CPU may continue to read data from architectural buffers and pass it to the dependent speculative operations. This may cause information leakage via speculative side-channel means, which is quite similar to the Microarchitectural Data Sampling (MDS) issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: TSX Transaction Asynchronous Abort (TAA)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "libvirt and qemu-kvm on Red Hat Enterprise Linux 6 are not affected by this vulnerability as they do not support MSR-based CPU features.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_1-0:1-5.el7.src",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_1-0:1-5.el7.x86_64",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_2-0:1-4.el7.src",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_2-0:1-4.el7.x86_64",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_2-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_38_1-0:1-3.el7.src",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_38_1-0:1-3.el7.x86_64",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_38_1-debuginfo-0:1-3.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11135"
},
{
"category": "external",
"summary": "RHBZ#1753062",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753062"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11135",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11135"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11135",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11135"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/tsx-asynchronousabort",
"url": "https://access.redhat.com/solutions/tsx-asynchronousabort"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00270.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00270.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-01-06T14:16:53+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_1-0:1-5.el7.src",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_1-0:1-5.el7.x86_64",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_2-0:1-4.el7.src",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_2-0:1-4.el7.x86_64",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_2-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_38_1-0:1-3.el7.src",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_38_1-0:1-3.el7.x86_64",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_38_1-debuginfo-0:1-3.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2020:0026"
},
{
"category": "workaround",
"details": "For mitigation related information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/solutions/tsx-asynchronousabort",
"product_ids": [
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_1-0:1-5.el7.src",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_1-0:1-5.el7.x86_64",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_2-0:1-4.el7.src",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_2-0:1-4.el7.x86_64",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_2-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_38_1-0:1-3.el7.src",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_38_1-0:1-3.el7.x86_64",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_38_1-debuginfo-0:1-3.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_1-0:1-5.el7.src",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_1-0:1-5.el7.x86_64",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_1-debuginfo-0:1-5.el7.x86_64",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_2-0:1-4.el7.src",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_2-0:1-4.el7.x86_64",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_35_2-debuginfo-0:1-4.el7.x86_64",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_38_1-0:1-3.el7.src",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_38_1-0:1-3.el7.x86_64",
"7Server-7.6.EUS:kpatch-patch-3_10_0-957_38_1-debuginfo-0:1-3.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: TSX Transaction Asynchronous Abort (TAA)"
}
]
}
rhsa-2019_3843
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 6.5 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* hw: Machine Check Error on Page Size Change (IFU) (CVE-2018-12207)\n\n* hw: TSX Transaction Asynchronous Abort (TAA) (CVE-2019-11135)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2019:3843",
"url": "https://access.redhat.com/errata/RHSA-2019:3843"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce",
"url": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/tsx-asynchronousabort",
"url": "https://access.redhat.com/solutions/tsx-asynchronousabort"
},
{
"category": "external",
"summary": "1646768",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646768"
},
{
"category": "external",
"summary": "1753062",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753062"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_3843.json"
}
],
"title": "Red Hat Security Advisory: kernel security update",
"tracking": {
"current_release_date": "2024-11-15T03:17:50+00:00",
"generator": {
"date": "2024-11-15T03:17:50+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2019:3843",
"initial_release_date": "2019-11-12T21:12:23+00:00",
"revision_history": [
{
"date": "2019-11-12T21:12:23+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2019-11-12T21:12:23+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-15T03:17:50+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product": {
"name": "Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:6.5::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:6.5::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.32-431.96.3.el6.x86_64",
"product": {
"name": "kernel-0:2.6.32-431.96.3.el6.x86_64",
"product_id": "kernel-0:2.6.32-431.96.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-431.96.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-431.96.3.el6.x86_64",
"product": {
"name": "kernel-debug-0:2.6.32-431.96.3.el6.x86_64",
"product_id": "kernel-debug-0:2.6.32-431.96.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-431.96.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-431.96.3.el6.x86_64",
"product": {
"name": "kernel-debug-devel-0:2.6.32-431.96.3.el6.x86_64",
"product_id": "kernel-debug-devel-0:2.6.32-431.96.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-431.96.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-431.96.3.el6.x86_64",
"product": {
"name": "kernel-devel-0:2.6.32-431.96.3.el6.x86_64",
"product_id": "kernel-devel-0:2.6.32-431.96.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-431.96.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.32-431.96.3.el6.x86_64",
"product": {
"name": "kernel-headers-0:2.6.32-431.96.3.el6.x86_64",
"product_id": "kernel-headers-0:2.6.32-431.96.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.32-431.96.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:2.6.32-431.96.3.el6.x86_64",
"product": {
"name": "perf-0:2.6.32-431.96.3.el6.x86_64",
"product_id": "perf-0:2.6.32-431.96.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-431.96.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"product_id": "kernel-debug-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-431.96.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"product": {
"name": "kernel-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"product_id": "kernel-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-431.96.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-431.96.3.el6.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-431.96.3.el6.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:2.6.32-431.96.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@2.6.32-431.96.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"product": {
"name": "perf-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"product_id": "perf-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-431.96.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"product": {
"name": "python-perf-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"product_id": "python-perf-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-431.96.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:2.6.32-431.96.3.el6.x86_64",
"product": {
"name": "python-perf-0:2.6.32-431.96.3.el6.x86_64",
"product_id": "python-perf-0:2.6.32-431.96.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@2.6.32-431.96.3.el6?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.32-431.96.3.el6.src",
"product": {
"name": "kernel-0:2.6.32-431.96.3.el6.src",
"product_id": "kernel-0:2.6.32-431.96.3.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-431.96.3.el6?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:2.6.32-431.96.3.el6.noarch",
"product": {
"name": "kernel-abi-whitelists-0:2.6.32-431.96.3.el6.noarch",
"product_id": "kernel-abi-whitelists-0:2.6.32-431.96.3.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@2.6.32-431.96.3.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:2.6.32-431.96.3.el6.noarch",
"product": {
"name": "kernel-doc-0:2.6.32-431.96.3.el6.noarch",
"product_id": "kernel-doc-0:2.6.32-431.96.3.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@2.6.32-431.96.3.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-firmware-0:2.6.32-431.96.3.el6.noarch",
"product": {
"name": "kernel-firmware-0:2.6.32-431.96.3.el6.noarch",
"product_id": "kernel-firmware-0:2.6.32-431.96.3.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-firmware@2.6.32-431.96.3.el6?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-431.96.3.el6.src as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:kernel-0:2.6.32-431.96.3.el6.src"
},
"product_reference": "kernel-0:2.6.32-431.96.3.el6.src",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-431.96.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:kernel-0:2.6.32-431.96.3.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-431.96.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-431.96.3.el6.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.96.3.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-431.96.3.el6.noarch",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-431.96.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:kernel-debug-0:2.6.32-431.96.3.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-431.96.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-431.96.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.96.3.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-431.96.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.96.3.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-431.96.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-431.96.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.96.3.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-431.96.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.96.3.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-431.96.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-431.96.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:kernel-devel-0:2.6.32-431.96.3.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-431.96.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-431.96.3.el6.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:kernel-doc-0:2.6.32-431.96.3.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-431.96.3.el6.noarch",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-431.96.3.el6.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.96.3.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-431.96.3.el6.noarch",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-431.96.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:kernel-headers-0:2.6.32-431.96.3.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-431.96.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-431.96.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:perf-0:2.6.32-431.96.3.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-431.96.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-431.96.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.96.3.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-431.96.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:python-perf-0:2.6.32-431.96.3.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-431.96.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-431.96.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.96.3.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-431.96.3.el6.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:kernel-0:2.6.32-431.96.3.el6.src"
},
"product_reference": "kernel-0:2.6.32-431.96.3.el6.src",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-431.96.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:kernel-0:2.6.32-431.96.3.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-431.96.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-431.96.3.el6.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.96.3.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-431.96.3.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-431.96.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.96.3.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-431.96.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-431.96.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.96.3.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-431.96.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.96.3.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-431.96.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-431.96.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.96.3.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-431.96.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.96.3.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-431.96.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-431.96.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.96.3.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-431.96.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-431.96.3.el6.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.96.3.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-431.96.3.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-431.96.3.el6.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.96.3.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-431.96.3.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-431.96.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.96.3.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-431.96.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-431.96.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:perf-0:2.6.32-431.96.3.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-431.96.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-431.96.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.96.3.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-431.96.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.96.3.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-431.96.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-431.96.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.96.3.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Intel"
]
},
{
"names": [
"Deepak Gupta"
],
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2018-12207",
"cwe": {
"id": "CWE-226",
"name": "Sensitive Information in Resource Not Removed Before Reuse"
},
"discovery_date": "2018-11-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1646768"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way Intel CPUs handle inconsistency between, virtual to physical memory address translations in CPU\u0027s local cache and system software\u0027s Paging structure entries. A privileged guest user may use this flaw to induce a hardware Machine Check Error on the host processor, resulting in a severe DoS scenario by halting the processor.\r\n\r\nSystem software like OS OR Virtual Machine Monitor (VMM) use virtual memory system for storing program instructions and data in memory. Virtual Memory system uses Paging structures like Page Tables and Page Directories to manage system memory. The processor\u0027s Memory Management Unit (MMU) uses Paging structure entries to translate program\u0027s virtual memory addresses to physical memory addresses. The processor stores these address translations into its local cache buffer called - Translation Lookaside Buffer (TLB). TLB has two parts, one for instructions and other for data addresses.\r\n\r\nSystem software can modify its Paging structure entries to change address mappings OR certain attributes like page size etc. Upon such Paging structure alterations in memory, system software must invalidate the corresponding address translations in the processor\u0027s TLB cache. But before this TLB invalidation takes place, a privileged guest user may trigger an instruction fetch operation, which could use an already cached, but now invalid, virtual to physical address translation from Instruction TLB (ITLB). Thus accessing an invalid physical memory address and resulting in halting the processor due to the Machine Check Error (MCE) on Page Size Change.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: Machine Check Error on Page Size Change (IFU)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-6.5.AUS:kernel-0:2.6.32-431.96.3.el6.src",
"6Server-6.5.AUS:kernel-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.96.3.el6.noarch",
"6Server-6.5.AUS:kernel-debug-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-devel-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-doc-0:2.6.32-431.96.3.el6.noarch",
"6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.96.3.el6.noarch",
"6Server-6.5.AUS:kernel-headers-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:perf-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:python-perf-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.96.3.el6.src",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.96.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.96.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.96.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:perf-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.96.3.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-12207"
},
{
"category": "external",
"summary": "RHBZ#1646768",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646768"
},
{
"category": "external",
"summary": "RHSB-ifu-page-mce",
"url": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-12207",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12207"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-12207",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12207"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-11-12T21:12:23+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Server-6.5.AUS:kernel-0:2.6.32-431.96.3.el6.src",
"6Server-6.5.AUS:kernel-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.96.3.el6.noarch",
"6Server-6.5.AUS:kernel-debug-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-devel-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-doc-0:2.6.32-431.96.3.el6.noarch",
"6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.96.3.el6.noarch",
"6Server-6.5.AUS:kernel-headers-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:perf-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:python-perf-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.96.3.el6.src",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.96.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.96.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.96.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:perf-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.96.3.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:3843"
},
{
"category": "workaround",
"details": "For mitigation related information, please refer to the Red Hat vulnerability article: https://access.redhat.com/security/vulnerabilities/ifu-page-mce .",
"product_ids": [
"6Server-6.5.AUS:kernel-0:2.6.32-431.96.3.el6.src",
"6Server-6.5.AUS:kernel-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.96.3.el6.noarch",
"6Server-6.5.AUS:kernel-debug-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-devel-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-doc-0:2.6.32-431.96.3.el6.noarch",
"6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.96.3.el6.noarch",
"6Server-6.5.AUS:kernel-headers-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:perf-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:python-perf-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.96.3.el6.src",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.96.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.96.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.96.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:perf-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.96.3.el6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"6Server-6.5.AUS:kernel-0:2.6.32-431.96.3.el6.src",
"6Server-6.5.AUS:kernel-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.96.3.el6.noarch",
"6Server-6.5.AUS:kernel-debug-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-devel-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-doc-0:2.6.32-431.96.3.el6.noarch",
"6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.96.3.el6.noarch",
"6Server-6.5.AUS:kernel-headers-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:perf-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:python-perf-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.96.3.el6.src",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.96.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.96.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.96.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:perf-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.96.3.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: Machine Check Error on Page Size Change (IFU)"
},
{
"acknowledgments": [
{
"names": [
"Intel"
]
}
],
"cve": "CVE-2019-11135",
"cwe": {
"id": "CWE-203",
"name": "Observable Discrepancy"
},
"discovery_date": "2019-09-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1753062"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way Intel CPUs handle speculative execution of instructions when the TSX Asynchronous Abort (TAA) error occurs. A local authenticated attacker with the ability to monitor execution times could infer the TSX memory state by comparing abort execution times. This could allow information disclosure via this observed side-channel for any TSX transaction being executed while an attacker is able to observe abort timing.\r\n\r\nIntel\u0027s Transactional Synchronisation Extensions (TSX) are set of instructions which enable transactional memory support to improve performance of the multi-threaded applications, in the lock-protected critical sections. The CPU executes instructions in the critical-sections as transactions, while ensuring their atomic state. When such transaction execution is unsuccessful, the processor cannot ensure atomic updates to the transaction memory, so the processor rolls back or aborts such transaction execution.\r\n\r\nWhile TSX Asynchronous Abort (TAA) is pending, CPU may continue to read data from architectural buffers and pass it to the dependent speculative operations. This may cause information leakage via speculative side-channel means, which is quite similar to the Microarchitectural Data Sampling (MDS) issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: TSX Transaction Asynchronous Abort (TAA)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "libvirt and qemu-kvm on Red Hat Enterprise Linux 6 are not affected by this vulnerability as they do not support MSR-based CPU features.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-6.5.AUS:kernel-0:2.6.32-431.96.3.el6.src",
"6Server-6.5.AUS:kernel-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.96.3.el6.noarch",
"6Server-6.5.AUS:kernel-debug-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-devel-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-doc-0:2.6.32-431.96.3.el6.noarch",
"6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.96.3.el6.noarch",
"6Server-6.5.AUS:kernel-headers-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:perf-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:python-perf-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.96.3.el6.src",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.96.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.96.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.96.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:perf-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.96.3.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11135"
},
{
"category": "external",
"summary": "RHBZ#1753062",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753062"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11135",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11135"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11135",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11135"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/tsx-asynchronousabort",
"url": "https://access.redhat.com/solutions/tsx-asynchronousabort"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00270.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00270.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-11-12T21:12:23+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Server-6.5.AUS:kernel-0:2.6.32-431.96.3.el6.src",
"6Server-6.5.AUS:kernel-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.96.3.el6.noarch",
"6Server-6.5.AUS:kernel-debug-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-devel-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-doc-0:2.6.32-431.96.3.el6.noarch",
"6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.96.3.el6.noarch",
"6Server-6.5.AUS:kernel-headers-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:perf-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:python-perf-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.96.3.el6.src",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.96.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.96.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.96.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:perf-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.96.3.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:3843"
},
{
"category": "workaround",
"details": "For mitigation related information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/solutions/tsx-asynchronousabort",
"product_ids": [
"6Server-6.5.AUS:kernel-0:2.6.32-431.96.3.el6.src",
"6Server-6.5.AUS:kernel-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.96.3.el6.noarch",
"6Server-6.5.AUS:kernel-debug-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-devel-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-doc-0:2.6.32-431.96.3.el6.noarch",
"6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.96.3.el6.noarch",
"6Server-6.5.AUS:kernel-headers-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:perf-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:python-perf-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.96.3.el6.src",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.96.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.96.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.96.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:perf-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.96.3.el6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"6Server-6.5.AUS:kernel-0:2.6.32-431.96.3.el6.src",
"6Server-6.5.AUS:kernel-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.96.3.el6.noarch",
"6Server-6.5.AUS:kernel-debug-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-devel-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-doc-0:2.6.32-431.96.3.el6.noarch",
"6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.96.3.el6.noarch",
"6Server-6.5.AUS:kernel-headers-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:perf-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:python-perf-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.96.3.el6.src",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.96.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.96.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.96.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:perf-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.96.3.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: TSX Transaction Asynchronous Abort (TAA)"
}
]
}
RHSA-2019:3843
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 6.5 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* hw: Machine Check Error on Page Size Change (IFU) (CVE-2018-12207)\n\n* hw: TSX Transaction Asynchronous Abort (TAA) (CVE-2019-11135)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2019:3843",
"url": "https://access.redhat.com/errata/RHSA-2019:3843"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce",
"url": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/tsx-asynchronousabort",
"url": "https://access.redhat.com/solutions/tsx-asynchronousabort"
},
{
"category": "external",
"summary": "1646768",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646768"
},
{
"category": "external",
"summary": "1753062",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753062"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_3843.json"
}
],
"title": "Red Hat Security Advisory: kernel security update",
"tracking": {
"current_release_date": "2025-10-09T18:15:58+00:00",
"generator": {
"date": "2025-10-09T18:15:58+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2019:3843",
"initial_release_date": "2019-11-12T21:12:23+00:00",
"revision_history": [
{
"date": "2019-11-12T21:12:23+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2019-11-12T21:12:23+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T18:15:58+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product": {
"name": "Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:6.5::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:6.5::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.32-431.96.3.el6.x86_64",
"product": {
"name": "kernel-0:2.6.32-431.96.3.el6.x86_64",
"product_id": "kernel-0:2.6.32-431.96.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-431.96.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-431.96.3.el6.x86_64",
"product": {
"name": "kernel-debug-0:2.6.32-431.96.3.el6.x86_64",
"product_id": "kernel-debug-0:2.6.32-431.96.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-431.96.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-431.96.3.el6.x86_64",
"product": {
"name": "kernel-debug-devel-0:2.6.32-431.96.3.el6.x86_64",
"product_id": "kernel-debug-devel-0:2.6.32-431.96.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-431.96.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-431.96.3.el6.x86_64",
"product": {
"name": "kernel-devel-0:2.6.32-431.96.3.el6.x86_64",
"product_id": "kernel-devel-0:2.6.32-431.96.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-431.96.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.32-431.96.3.el6.x86_64",
"product": {
"name": "kernel-headers-0:2.6.32-431.96.3.el6.x86_64",
"product_id": "kernel-headers-0:2.6.32-431.96.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.32-431.96.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:2.6.32-431.96.3.el6.x86_64",
"product": {
"name": "perf-0:2.6.32-431.96.3.el6.x86_64",
"product_id": "perf-0:2.6.32-431.96.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-431.96.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"product_id": "kernel-debug-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-431.96.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"product": {
"name": "kernel-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"product_id": "kernel-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-431.96.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-431.96.3.el6.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-431.96.3.el6.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:2.6.32-431.96.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@2.6.32-431.96.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"product": {
"name": "perf-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"product_id": "perf-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-431.96.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"product": {
"name": "python-perf-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"product_id": "python-perf-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-431.96.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:2.6.32-431.96.3.el6.x86_64",
"product": {
"name": "python-perf-0:2.6.32-431.96.3.el6.x86_64",
"product_id": "python-perf-0:2.6.32-431.96.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@2.6.32-431.96.3.el6?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.32-431.96.3.el6.src",
"product": {
"name": "kernel-0:2.6.32-431.96.3.el6.src",
"product_id": "kernel-0:2.6.32-431.96.3.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-431.96.3.el6?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:2.6.32-431.96.3.el6.noarch",
"product": {
"name": "kernel-abi-whitelists-0:2.6.32-431.96.3.el6.noarch",
"product_id": "kernel-abi-whitelists-0:2.6.32-431.96.3.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@2.6.32-431.96.3.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:2.6.32-431.96.3.el6.noarch",
"product": {
"name": "kernel-doc-0:2.6.32-431.96.3.el6.noarch",
"product_id": "kernel-doc-0:2.6.32-431.96.3.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@2.6.32-431.96.3.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-firmware-0:2.6.32-431.96.3.el6.noarch",
"product": {
"name": "kernel-firmware-0:2.6.32-431.96.3.el6.noarch",
"product_id": "kernel-firmware-0:2.6.32-431.96.3.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-firmware@2.6.32-431.96.3.el6?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-431.96.3.el6.src as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:kernel-0:2.6.32-431.96.3.el6.src"
},
"product_reference": "kernel-0:2.6.32-431.96.3.el6.src",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-431.96.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:kernel-0:2.6.32-431.96.3.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-431.96.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-431.96.3.el6.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.96.3.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-431.96.3.el6.noarch",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-431.96.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:kernel-debug-0:2.6.32-431.96.3.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-431.96.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-431.96.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.96.3.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-431.96.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.96.3.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-431.96.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-431.96.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.96.3.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-431.96.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.96.3.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-431.96.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-431.96.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:kernel-devel-0:2.6.32-431.96.3.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-431.96.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-431.96.3.el6.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:kernel-doc-0:2.6.32-431.96.3.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-431.96.3.el6.noarch",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-431.96.3.el6.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.96.3.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-431.96.3.el6.noarch",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-431.96.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:kernel-headers-0:2.6.32-431.96.3.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-431.96.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-431.96.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:perf-0:2.6.32-431.96.3.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-431.96.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-431.96.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.96.3.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-431.96.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:python-perf-0:2.6.32-431.96.3.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-431.96.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-431.96.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)",
"product_id": "6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.96.3.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-431.96.3.el6.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:kernel-0:2.6.32-431.96.3.el6.src"
},
"product_reference": "kernel-0:2.6.32-431.96.3.el6.src",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-431.96.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:kernel-0:2.6.32-431.96.3.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-431.96.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-431.96.3.el6.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.96.3.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-431.96.3.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-431.96.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.96.3.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-431.96.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-431.96.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.96.3.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-431.96.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.96.3.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-431.96.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-431.96.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.96.3.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-431.96.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.96.3.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-431.96.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-431.96.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.96.3.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-431.96.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-431.96.3.el6.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.96.3.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-431.96.3.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-431.96.3.el6.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.96.3.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-431.96.3.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-431.96.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.96.3.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-431.96.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-431.96.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:perf-0:2.6.32-431.96.3.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-431.96.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-431.96.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.96.3.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-431.96.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.96.3.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-431.96.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-431.96.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)",
"product_id": "6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.96.3.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.AUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Intel"
]
},
{
"names": [
"Deepak Gupta"
],
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2018-12207",
"cwe": {
"id": "CWE-226",
"name": "Sensitive Information in Resource Not Removed Before Reuse"
},
"discovery_date": "2018-11-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1646768"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way Intel CPUs handle inconsistency between, virtual to physical memory address translations in CPU\u0027s local cache and system software\u0027s Paging structure entries. A privileged guest user may use this flaw to induce a hardware Machine Check Error on the host processor, resulting in a severe DoS scenario by halting the processor.\r\n\r\nSystem software like OS OR Virtual Machine Monitor (VMM) use virtual memory system for storing program instructions and data in memory. Virtual Memory system uses Paging structures like Page Tables and Page Directories to manage system memory. The processor\u0027s Memory Management Unit (MMU) uses Paging structure entries to translate program\u0027s virtual memory addresses to physical memory addresses. The processor stores these address translations into its local cache buffer called - Translation Lookaside Buffer (TLB). TLB has two parts, one for instructions and other for data addresses.\r\n\r\nSystem software can modify its Paging structure entries to change address mappings OR certain attributes like page size etc. Upon such Paging structure alterations in memory, system software must invalidate the corresponding address translations in the processor\u0027s TLB cache. But before this TLB invalidation takes place, a privileged guest user may trigger an instruction fetch operation, which could use an already cached, but now invalid, virtual to physical address translation from Instruction TLB (ITLB). Thus accessing an invalid physical memory address and resulting in halting the processor due to the Machine Check Error (MCE) on Page Size Change.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: Machine Check Error on Page Size Change (IFU)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-6.5.AUS:kernel-0:2.6.32-431.96.3.el6.src",
"6Server-6.5.AUS:kernel-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.96.3.el6.noarch",
"6Server-6.5.AUS:kernel-debug-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-devel-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-doc-0:2.6.32-431.96.3.el6.noarch",
"6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.96.3.el6.noarch",
"6Server-6.5.AUS:kernel-headers-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:perf-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:python-perf-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.96.3.el6.src",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.96.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.96.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.96.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:perf-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.96.3.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-12207"
},
{
"category": "external",
"summary": "RHBZ#1646768",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646768"
},
{
"category": "external",
"summary": "RHSB-ifu-page-mce",
"url": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-12207",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12207"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-12207",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12207"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-11-12T21:12:23+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Server-6.5.AUS:kernel-0:2.6.32-431.96.3.el6.src",
"6Server-6.5.AUS:kernel-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.96.3.el6.noarch",
"6Server-6.5.AUS:kernel-debug-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-devel-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-doc-0:2.6.32-431.96.3.el6.noarch",
"6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.96.3.el6.noarch",
"6Server-6.5.AUS:kernel-headers-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:perf-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:python-perf-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.96.3.el6.src",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.96.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.96.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.96.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:perf-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.96.3.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:3843"
},
{
"category": "workaround",
"details": "For mitigation related information, please refer to the Red Hat vulnerability article: https://access.redhat.com/security/vulnerabilities/ifu-page-mce .",
"product_ids": [
"6Server-6.5.AUS:kernel-0:2.6.32-431.96.3.el6.src",
"6Server-6.5.AUS:kernel-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.96.3.el6.noarch",
"6Server-6.5.AUS:kernel-debug-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-devel-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-doc-0:2.6.32-431.96.3.el6.noarch",
"6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.96.3.el6.noarch",
"6Server-6.5.AUS:kernel-headers-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:perf-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:python-perf-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.96.3.el6.src",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.96.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.96.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.96.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:perf-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.96.3.el6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"6Server-6.5.AUS:kernel-0:2.6.32-431.96.3.el6.src",
"6Server-6.5.AUS:kernel-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.96.3.el6.noarch",
"6Server-6.5.AUS:kernel-debug-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-devel-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-doc-0:2.6.32-431.96.3.el6.noarch",
"6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.96.3.el6.noarch",
"6Server-6.5.AUS:kernel-headers-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:perf-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:python-perf-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.96.3.el6.src",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.96.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.96.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.96.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:perf-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.96.3.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: Machine Check Error on Page Size Change (IFU)"
},
{
"acknowledgments": [
{
"names": [
"Intel"
]
}
],
"cve": "CVE-2019-11135",
"cwe": {
"id": "CWE-203",
"name": "Observable Discrepancy"
},
"discovery_date": "2019-09-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1753062"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way Intel CPUs handle speculative execution of instructions when the TSX Asynchronous Abort (TAA) error occurs. A local authenticated attacker with the ability to monitor execution times could infer the TSX memory state by comparing abort execution times. This could allow information disclosure via this observed side-channel for any TSX transaction being executed while an attacker is able to observe abort timing.\r\n\r\nIntel\u0027s Transactional Synchronisation Extensions (TSX) are set of instructions which enable transactional memory support to improve performance of the multi-threaded applications, in the lock-protected critical sections. The CPU executes instructions in the critical-sections as transactions, while ensuring their atomic state. When such transaction execution is unsuccessful, the processor cannot ensure atomic updates to the transaction memory, so the processor rolls back or aborts such transaction execution.\r\n\r\nWhile TSX Asynchronous Abort (TAA) is pending, CPU may continue to read data from architectural buffers and pass it to the dependent speculative operations. This may cause information leakage via speculative side-channel means, which is quite similar to the Microarchitectural Data Sampling (MDS) issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: TSX Transaction Asynchronous Abort (TAA)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "libvirt and qemu-kvm on Red Hat Enterprise Linux 6 are not affected by this vulnerability as they do not support MSR-based CPU features.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-6.5.AUS:kernel-0:2.6.32-431.96.3.el6.src",
"6Server-6.5.AUS:kernel-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.96.3.el6.noarch",
"6Server-6.5.AUS:kernel-debug-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-devel-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-doc-0:2.6.32-431.96.3.el6.noarch",
"6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.96.3.el6.noarch",
"6Server-6.5.AUS:kernel-headers-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:perf-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:python-perf-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.96.3.el6.src",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.96.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.96.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.96.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:perf-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.96.3.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11135"
},
{
"category": "external",
"summary": "RHBZ#1753062",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753062"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11135",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11135"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11135",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11135"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/tsx-asynchronousabort",
"url": "https://access.redhat.com/solutions/tsx-asynchronousabort"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00270.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00270.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-11-12T21:12:23+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Server-6.5.AUS:kernel-0:2.6.32-431.96.3.el6.src",
"6Server-6.5.AUS:kernel-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.96.3.el6.noarch",
"6Server-6.5.AUS:kernel-debug-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-devel-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-doc-0:2.6.32-431.96.3.el6.noarch",
"6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.96.3.el6.noarch",
"6Server-6.5.AUS:kernel-headers-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:perf-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:python-perf-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.96.3.el6.src",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.96.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.96.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.96.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:perf-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.96.3.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:3843"
},
{
"category": "workaround",
"details": "For mitigation related information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/solutions/tsx-asynchronousabort",
"product_ids": [
"6Server-6.5.AUS:kernel-0:2.6.32-431.96.3.el6.src",
"6Server-6.5.AUS:kernel-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.96.3.el6.noarch",
"6Server-6.5.AUS:kernel-debug-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-devel-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-doc-0:2.6.32-431.96.3.el6.noarch",
"6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.96.3.el6.noarch",
"6Server-6.5.AUS:kernel-headers-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:perf-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:python-perf-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.96.3.el6.src",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.96.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.96.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.96.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:perf-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.96.3.el6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"6Server-6.5.AUS:kernel-0:2.6.32-431.96.3.el6.src",
"6Server-6.5.AUS:kernel-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.96.3.el6.noarch",
"6Server-6.5.AUS:kernel-debug-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-devel-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:kernel-doc-0:2.6.32-431.96.3.el6.noarch",
"6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.96.3.el6.noarch",
"6Server-6.5.AUS:kernel-headers-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:perf-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:python-perf-0:2.6.32-431.96.3.el6.x86_64",
"6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.96.3.el6.src",
"6Server-optional-6.5.AUS:kernel-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.96.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.96.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.96.3.el6.noarch",
"6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:perf-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.96.3.el6.x86_64",
"6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.96.3.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: TSX Transaction Asynchronous Abort (TAA)"
}
]
}
RHSA-2019:3841
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 7.2 Advanced Update Support, Red Hat Enterprise Linux 7.2 Telco Extended Update Support, and Red Hat Enterprise Linux 7.2 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* hw: Machine Check Error on Page Size Change (IFU) (CVE-2018-12207)\n\n* hw: TSX Transaction Asynchronous Abort (TAA) (CVE-2019-11135)\n\n* hw: Intel GPU Denial Of Service while accessing MMIO in lower power state (CVE-2019-0154)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2019:3841",
"url": "https://access.redhat.com/errata/RHSA-2019:3841"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce",
"url": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/tsx-asynchronousabort",
"url": "https://access.redhat.com/solutions/tsx-asynchronousabort"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/i915-graphics",
"url": "https://access.redhat.com/solutions/i915-graphics"
},
{
"category": "external",
"summary": "1646768",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646768"
},
{
"category": "external",
"summary": "1724393",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1724393"
},
{
"category": "external",
"summary": "1753062",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753062"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_3841.json"
}
],
"title": "Red Hat Security Advisory: kernel security update",
"tracking": {
"current_release_date": "2025-10-09T18:15:56+00:00",
"generator": {
"date": "2025-10-09T18:15:56+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2019:3841",
"initial_release_date": "2019-11-12T21:02:11+00:00",
"revision_history": [
{
"date": "2019-11-12T21:02:11+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2019-11-12T21:02:11+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T18:15:56+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product": {
"name": "Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.2::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:7.2::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product": {
"name": "Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:7.2::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:7.2::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product": {
"name": "Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_tus:7.2::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_tus:7.2::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-327.82.2.el7.x86_64",
"product": {
"name": "kernel-0:3.10.0-327.82.2.el7.x86_64",
"product_id": "kernel-0:3.10.0-327.82.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-327.82.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"product": {
"name": "kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"product_id": "kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-327.82.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"product_id": "kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-327.82.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"product": {
"name": "kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"product_id": "kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-327.82.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"product": {
"name": "kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"product_id": "kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-327.82.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"product": {
"name": "kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"product_id": "kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-327.82.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"product_id": "kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-327.82.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-327.82.2.el7.x86_64",
"product": {
"name": "perf-0:3.10.0-327.82.2.el7.x86_64",
"product_id": "perf-0:3.10.0-327.82.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-327.82.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-327.82.2.el7.x86_64",
"product": {
"name": "python-perf-0:3.10.0-327.82.2.el7.x86_64",
"product_id": "python-perf-0:3.10.0-327.82.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-327.82.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-327.82.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"product_id": "kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-327.82.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-327.82.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-327.82.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"product": {
"name": "perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"product_id": "perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-327.82.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"product_id": "python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-327.82.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-327.82.2.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-327.82.2.el7.src",
"product": {
"name": "kernel-0:3.10.0-327.82.2.el7.src",
"product_id": "kernel-0:3.10.0-327.82.2.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-327.82.2.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"product": {
"name": "kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"product_id": "kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-327.82.2.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"product": {
"name": "kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"product_id": "kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@3.10.0-327.82.2.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.82.2.el7.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-327.82.2.el7.src",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-327.82.2.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:perf-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:python-perf-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)",
"product_id": "7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.82.2.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-327.82.2.el7.src",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:kernel-debug-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:kernel-devel-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-327.82.2.el7.noarch as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:kernel-doc-0:3.10.0-327.82.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:kernel-headers-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:kernel-tools-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:perf-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:python-perf-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)",
"product_id": "7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.82.2.el7.src as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-327.82.2.el7.src",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-327.82.2.el7.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:perf-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:python-perf-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)",
"product_id": "7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.82.2.el7.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-327.82.2.el7.src",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-327.82.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:perf-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 7.2)",
"product_id": "7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.82.2.el7.src as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-327.82.2.el7.src",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-327.82.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.82.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:perf-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional E4S (v. 7.2)",
"product_id": "7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.82.2.el7.src as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-327.82.2.el7.src",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-327.82.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:perf-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 7.2)",
"product_id": "7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.2.TUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Intel"
]
},
{
"names": [
"Deepak Gupta"
],
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2018-12207",
"cwe": {
"id": "CWE-226",
"name": "Sensitive Information in Resource Not Removed Before Reuse"
},
"discovery_date": "2018-11-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1646768"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way Intel CPUs handle inconsistency between, virtual to physical memory address translations in CPU\u0027s local cache and system software\u0027s Paging structure entries. A privileged guest user may use this flaw to induce a hardware Machine Check Error on the host processor, resulting in a severe DoS scenario by halting the processor.\r\n\r\nSystem software like OS OR Virtual Machine Monitor (VMM) use virtual memory system for storing program instructions and data in memory. Virtual Memory system uses Paging structures like Page Tables and Page Directories to manage system memory. The processor\u0027s Memory Management Unit (MMU) uses Paging structure entries to translate program\u0027s virtual memory addresses to physical memory addresses. The processor stores these address translations into its local cache buffer called - Translation Lookaside Buffer (TLB). TLB has two parts, one for instructions and other for data addresses.\r\n\r\nSystem software can modify its Paging structure entries to change address mappings OR certain attributes like page size etc. Upon such Paging structure alterations in memory, system software must invalidate the corresponding address translations in the processor\u0027s TLB cache. But before this TLB invalidation takes place, a privileged guest user may trigger an instruction fetch operation, which could use an already cached, but now invalid, virtual to physical address translation from Instruction TLB (ITLB). Thus accessing an invalid physical memory address and resulting in halting the processor due to the Machine Check Error (MCE) on Page Size Change.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: Machine Check Error on Page Size Change (IFU)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.E4S:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.E4S:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.TUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.TUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-12207"
},
{
"category": "external",
"summary": "RHBZ#1646768",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646768"
},
{
"category": "external",
"summary": "RHSB-ifu-page-mce",
"url": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-12207",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12207"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-12207",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12207"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-11-12T21:02:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.E4S:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.E4S:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.TUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.TUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:3841"
},
{
"category": "workaround",
"details": "For mitigation related information, please refer to the Red Hat vulnerability article: https://access.redhat.com/security/vulnerabilities/ifu-page-mce .",
"product_ids": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.E4S:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.E4S:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.TUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.TUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.E4S:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.E4S:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.TUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.TUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: Machine Check Error on Page Size Change (IFU)"
},
{
"acknowledgments": [
{
"names": [
"Intel"
]
}
],
"cve": "CVE-2019-0154",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"discovery_date": "2019-06-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1724393"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Intel graphics hardware (GPU) where a local attacker with the ability to issue an ioctl could trigger a hardware level crash if MMIO registers were read while the graphics card was in a low-power state. This creates a denial of service situation and the GPU and connected displays will remain unusable until a reboot occurs.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: Intel GPU Denial Of Service while accessing MMIO in lower power state",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Intel plans to release BIOS firmware to correct this issue. Red Hat\u0027s kernel update should mitigate this vulnerability. Some older hardware will not have BIOS firmware update and will rely on operating system level protection to prevent access while the device is in low-power states. For more information see https://access.redhat.com/solutions/i915-graphics",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.E4S:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.E4S:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.TUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.TUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-0154"
},
{
"category": "external",
"summary": "RHBZ#1724393",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1724393"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-0154",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0154"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-0154",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0154"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/i915-graphics",
"url": "https://access.redhat.com/solutions/i915-graphics"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00260.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00260.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-11-12T21:02:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.E4S:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.E4S:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.TUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.TUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:3841"
},
{
"category": "workaround",
"details": "Preventing loading of the i915 kernel module will prevent attackers from using this exploit against the system however the power management functionality of the card will be disabled and the system may draw additional power. See this KCS article (https://access.redhat.com/solutions/41278) for instructions on how to disable a kernel module. Graphical displays may also be at low resolution or not work correctly. This mitigation may not be suitable if running graphical tools locally is required.",
"product_ids": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.E4S:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.E4S:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.TUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.TUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.E4S:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.E4S:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.TUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.TUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: Intel GPU Denial Of Service while accessing MMIO in lower power state"
},
{
"acknowledgments": [
{
"names": [
"Intel"
]
}
],
"cve": "CVE-2019-0155",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"discovery_date": "2019-06-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1724398"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Intel graphics hardware (GPU), where a local attacker with the ability to issue commands to the GPU could inadvertently lead to memory corruption and possible privilege escalation. The attacker could use the GPU blitter to perform privilege MMIO operations, not limited to the address space required to function correctly.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: Intel GPU blitter manipulation can allow for arbitrary kernel memory write",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/solutions/i915-graphics",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.E4S:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.E4S:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.TUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.TUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-0155"
},
{
"category": "external",
"summary": "RHBZ#1724398",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1724398"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-0155",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0155"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-0155",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0155"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/i915-graphics",
"url": "https://access.redhat.com/solutions/i915-graphics"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00242.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00242.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-11-12T21:02:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.E4S:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.E4S:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.TUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.TUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:3841"
},
{
"category": "workaround",
"details": "Preventing loading of the i915 kernel module will prevent attackers from using this exploit against the system however the power management functionality of the card will be disabled and the system may draw additional power. See this KCS article( https://access.redhat.com/solutions/41278 ) for instructions on how to disable a kernel module. Graphical displays may also be at low resolution or not work correctly. This mitigation may not be suitable if running graphical tools locally is required.",
"product_ids": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.E4S:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.E4S:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.TUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.TUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.E4S:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.E4S:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.TUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.TUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: Intel GPU blitter manipulation can allow for arbitrary kernel memory write"
},
{
"acknowledgments": [
{
"names": [
"Intel"
]
}
],
"cve": "CVE-2019-11135",
"cwe": {
"id": "CWE-203",
"name": "Observable Discrepancy"
},
"discovery_date": "2019-09-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1753062"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way Intel CPUs handle speculative execution of instructions when the TSX Asynchronous Abort (TAA) error occurs. A local authenticated attacker with the ability to monitor execution times could infer the TSX memory state by comparing abort execution times. This could allow information disclosure via this observed side-channel for any TSX transaction being executed while an attacker is able to observe abort timing.\r\n\r\nIntel\u0027s Transactional Synchronisation Extensions (TSX) are set of instructions which enable transactional memory support to improve performance of the multi-threaded applications, in the lock-protected critical sections. The CPU executes instructions in the critical-sections as transactions, while ensuring their atomic state. When such transaction execution is unsuccessful, the processor cannot ensure atomic updates to the transaction memory, so the processor rolls back or aborts such transaction execution.\r\n\r\nWhile TSX Asynchronous Abort (TAA) is pending, CPU may continue to read data from architectural buffers and pass it to the dependent speculative operations. This may cause information leakage via speculative side-channel means, which is quite similar to the Microarchitectural Data Sampling (MDS) issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: TSX Transaction Asynchronous Abort (TAA)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "libvirt and qemu-kvm on Red Hat Enterprise Linux 6 are not affected by this vulnerability as they do not support MSR-based CPU features.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.E4S:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.E4S:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.TUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.TUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11135"
},
{
"category": "external",
"summary": "RHBZ#1753062",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753062"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11135",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11135"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11135",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11135"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/tsx-asynchronousabort",
"url": "https://access.redhat.com/solutions/tsx-asynchronousabort"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00270.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00270.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-11-12T21:02:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.E4S:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.E4S:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.TUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.TUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:3841"
},
{
"category": "workaround",
"details": "For mitigation related information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/solutions/tsx-asynchronousabort",
"product_ids": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.E4S:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.E4S:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.TUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.TUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"7Server-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.AUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.AUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.E4S:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.E4S:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.TUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-7.2.TUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-optional-7.2.AUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.AUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-optional-7.2.E4S:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.E4S:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.src",
"7Server-optional-7.2.TUS:kernel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-debug-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debug-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-doc-0:3.10.0-327.82.2.el7.noarch",
"7Server-optional-7.2.TUS:kernel-headers-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-0:3.10.0-327.82.2.el7.x86_64",
"7Server-optional-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.82.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: TSX Transaction Asynchronous Abort (TAA)"
}
]
}
RHSA-2019:3936
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kpatch-patch is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.\n\nSecurity Fix(es):\n\n* hw: Machine Check Error on Page Size Change (IFU) (CVE-2018-12207)\n\n* hw: TSX Transaction Asynchronous Abort (TAA) (CVE-2019-11135)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2019:3936",
"url": "https://access.redhat.com/errata/RHSA-2019:3936"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce",
"url": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/tsx-asynchronousabort",
"url": "https://access.redhat.com/solutions/tsx-asynchronousabort"
},
{
"category": "external",
"summary": "1646768",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646768"
},
{
"category": "external",
"summary": "1753062",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753062"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_3936.json"
}
],
"title": "Red Hat Security Advisory: kpatch-patch security update",
"tracking": {
"current_release_date": "2025-10-09T18:15:57+00:00",
"generator": {
"date": "2025-10-09T18:15:57+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2019:3936",
"initial_release_date": "2019-11-22T08:52:34+00:00",
"revision_history": [
{
"date": "2019-11-22T08:52:34+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2019-11-22T08:52:34+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T18:15:57+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:8::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147-0:1-3.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147-0:1-3.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147-0:1-3.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147@1-3.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147-debugsource-0:1-3.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147-debugsource-0:1-3.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147-debugsource-0:1-3.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147-debugsource@1-3.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147-debuginfo-0:1-3.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147-debuginfo-0:1-3.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147-debuginfo-0:1-3.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147-debuginfo@1-3.el8_1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147-0:1-3.el8_1.src",
"product": {
"name": "kpatch-patch-4_18_0-147-0:1-3.el8_1.src",
"product_id": "kpatch-patch-4_18_0-147-0:1-3.el8_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147@1-3.el8_1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147-0:1-3.el8_1.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kpatch-patch-4_18_0-147-0:1-3.el8_1.src"
},
"product_reference": "kpatch-patch-4_18_0-147-0:1-3.el8_1.src",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147-0:1-3.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kpatch-patch-4_18_0-147-0:1-3.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147-0:1-3.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147-debuginfo-0:1-3.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kpatch-patch-4_18_0-147-debuginfo-0:1-3.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147-debuginfo-0:1-3.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147-debugsource-0:1-3.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kpatch-patch-4_18_0-147-debugsource-0:1-3.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147-debugsource-0:1-3.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Intel"
]
},
{
"names": [
"Deepak Gupta"
],
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2018-12207",
"cwe": {
"id": "CWE-226",
"name": "Sensitive Information in Resource Not Removed Before Reuse"
},
"discovery_date": "2018-11-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1646768"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way Intel CPUs handle inconsistency between, virtual to physical memory address translations in CPU\u0027s local cache and system software\u0027s Paging structure entries. A privileged guest user may use this flaw to induce a hardware Machine Check Error on the host processor, resulting in a severe DoS scenario by halting the processor.\r\n\r\nSystem software like OS OR Virtual Machine Monitor (VMM) use virtual memory system for storing program instructions and data in memory. Virtual Memory system uses Paging structures like Page Tables and Page Directories to manage system memory. The processor\u0027s Memory Management Unit (MMU) uses Paging structure entries to translate program\u0027s virtual memory addresses to physical memory addresses. The processor stores these address translations into its local cache buffer called - Translation Lookaside Buffer (TLB). TLB has two parts, one for instructions and other for data addresses.\r\n\r\nSystem software can modify its Paging structure entries to change address mappings OR certain attributes like page size etc. Upon such Paging structure alterations in memory, system software must invalidate the corresponding address translations in the processor\u0027s TLB cache. But before this TLB invalidation takes place, a privileged guest user may trigger an instruction fetch operation, which could use an already cached, but now invalid, virtual to physical address translation from Instruction TLB (ITLB). Thus accessing an invalid physical memory address and resulting in halting the processor due to the Machine Check Error (MCE) on Page Size Change.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: Machine Check Error on Page Size Change (IFU)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.1.0.Z.MAIN.EUS:kpatch-patch-4_18_0-147-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.MAIN.EUS:kpatch-patch-4_18_0-147-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kpatch-patch-4_18_0-147-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kpatch-patch-4_18_0-147-debugsource-0:1-3.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-12207"
},
{
"category": "external",
"summary": "RHBZ#1646768",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646768"
},
{
"category": "external",
"summary": "RHSB-ifu-page-mce",
"url": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-12207",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12207"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-12207",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12207"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-11-22T08:52:34+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.1.0.Z.MAIN.EUS:kpatch-patch-4_18_0-147-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.MAIN.EUS:kpatch-patch-4_18_0-147-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kpatch-patch-4_18_0-147-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kpatch-patch-4_18_0-147-debugsource-0:1-3.el8_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:3936"
},
{
"category": "workaround",
"details": "For mitigation related information, please refer to the Red Hat vulnerability article: https://access.redhat.com/security/vulnerabilities/ifu-page-mce .",
"product_ids": [
"BaseOS-8.1.0.Z.MAIN.EUS:kpatch-patch-4_18_0-147-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.MAIN.EUS:kpatch-patch-4_18_0-147-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kpatch-patch-4_18_0-147-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kpatch-patch-4_18_0-147-debugsource-0:1-3.el8_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"BaseOS-8.1.0.Z.MAIN.EUS:kpatch-patch-4_18_0-147-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.MAIN.EUS:kpatch-patch-4_18_0-147-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kpatch-patch-4_18_0-147-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kpatch-patch-4_18_0-147-debugsource-0:1-3.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: Machine Check Error on Page Size Change (IFU)"
},
{
"acknowledgments": [
{
"names": [
"Intel"
]
}
],
"cve": "CVE-2019-11135",
"cwe": {
"id": "CWE-203",
"name": "Observable Discrepancy"
},
"discovery_date": "2019-09-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1753062"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way Intel CPUs handle speculative execution of instructions when the TSX Asynchronous Abort (TAA) error occurs. A local authenticated attacker with the ability to monitor execution times could infer the TSX memory state by comparing abort execution times. This could allow information disclosure via this observed side-channel for any TSX transaction being executed while an attacker is able to observe abort timing.\r\n\r\nIntel\u0027s Transactional Synchronisation Extensions (TSX) are set of instructions which enable transactional memory support to improve performance of the multi-threaded applications, in the lock-protected critical sections. The CPU executes instructions in the critical-sections as transactions, while ensuring their atomic state. When such transaction execution is unsuccessful, the processor cannot ensure atomic updates to the transaction memory, so the processor rolls back or aborts such transaction execution.\r\n\r\nWhile TSX Asynchronous Abort (TAA) is pending, CPU may continue to read data from architectural buffers and pass it to the dependent speculative operations. This may cause information leakage via speculative side-channel means, which is quite similar to the Microarchitectural Data Sampling (MDS) issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: TSX Transaction Asynchronous Abort (TAA)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "libvirt and qemu-kvm on Red Hat Enterprise Linux 6 are not affected by this vulnerability as they do not support MSR-based CPU features.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.1.0.Z.MAIN.EUS:kpatch-patch-4_18_0-147-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.MAIN.EUS:kpatch-patch-4_18_0-147-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kpatch-patch-4_18_0-147-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kpatch-patch-4_18_0-147-debugsource-0:1-3.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11135"
},
{
"category": "external",
"summary": "RHBZ#1753062",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753062"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11135",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11135"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11135",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11135"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/tsx-asynchronousabort",
"url": "https://access.redhat.com/solutions/tsx-asynchronousabort"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00270.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00270.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-11-22T08:52:34+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.1.0.Z.MAIN.EUS:kpatch-patch-4_18_0-147-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.MAIN.EUS:kpatch-patch-4_18_0-147-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kpatch-patch-4_18_0-147-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kpatch-patch-4_18_0-147-debugsource-0:1-3.el8_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:3936"
},
{
"category": "workaround",
"details": "For mitigation related information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/solutions/tsx-asynchronousabort",
"product_ids": [
"BaseOS-8.1.0.Z.MAIN.EUS:kpatch-patch-4_18_0-147-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.MAIN.EUS:kpatch-patch-4_18_0-147-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kpatch-patch-4_18_0-147-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kpatch-patch-4_18_0-147-debugsource-0:1-3.el8_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"BaseOS-8.1.0.Z.MAIN.EUS:kpatch-patch-4_18_0-147-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.MAIN.EUS:kpatch-patch-4_18_0-147-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kpatch-patch-4_18_0-147-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kpatch-patch-4_18_0-147-debugsource-0:1-3.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: TSX Transaction Asynchronous Abort (TAA)"
}
]
}
rhsa-2019_3842
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 6.6 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* hw: Machine Check Error on Page Size Change (IFU) (CVE-2018-12207)\n\n* hw: TSX Transaction Asynchronous Abort (TAA) (CVE-2019-11135)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2019:3842",
"url": "https://access.redhat.com/errata/RHSA-2019:3842"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce",
"url": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/tsx-asynchronousabort",
"url": "https://access.redhat.com/solutions/tsx-asynchronousabort"
},
{
"category": "external",
"summary": "1646768",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646768"
},
{
"category": "external",
"summary": "1753062",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753062"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_3842.json"
}
],
"title": "Red Hat Security Advisory: kernel security update",
"tracking": {
"current_release_date": "2024-11-15T03:17:43+00:00",
"generator": {
"date": "2024-11-15T03:17:43+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2019:3842",
"initial_release_date": "2019-11-12T21:11:25+00:00",
"revision_history": [
{
"date": "2019-11-12T21:11:25+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2019-11-12T21:11:25+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-15T03:17:43+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product": {
"name": "Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:6.6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:6.6::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "python-perf-0:2.6.32-504.81.3.el6.x86_64",
"product": {
"name": "python-perf-0:2.6.32-504.81.3.el6.x86_64",
"product_id": "python-perf-0:2.6.32-504.81.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@2.6.32-504.81.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"product_id": "kernel-debug-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-504.81.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"product": {
"name": "kernel-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"product_id": "kernel-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-504.81.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-504.81.3.el6.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-504.81.3.el6.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:2.6.32-504.81.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@2.6.32-504.81.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"product": {
"name": "perf-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"product_id": "perf-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-504.81.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"product": {
"name": "python-perf-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"product_id": "python-perf-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-504.81.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.32-504.81.3.el6.x86_64",
"product": {
"name": "kernel-0:2.6.32-504.81.3.el6.x86_64",
"product_id": "kernel-0:2.6.32-504.81.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-504.81.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-504.81.3.el6.x86_64",
"product": {
"name": "kernel-debug-0:2.6.32-504.81.3.el6.x86_64",
"product_id": "kernel-debug-0:2.6.32-504.81.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-504.81.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-504.81.3.el6.x86_64",
"product": {
"name": "kernel-debug-devel-0:2.6.32-504.81.3.el6.x86_64",
"product_id": "kernel-debug-devel-0:2.6.32-504.81.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-504.81.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-504.81.3.el6.x86_64",
"product": {
"name": "kernel-devel-0:2.6.32-504.81.3.el6.x86_64",
"product_id": "kernel-devel-0:2.6.32-504.81.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-504.81.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.32-504.81.3.el6.x86_64",
"product": {
"name": "kernel-headers-0:2.6.32-504.81.3.el6.x86_64",
"product_id": "kernel-headers-0:2.6.32-504.81.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.32-504.81.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:2.6.32-504.81.3.el6.x86_64",
"product": {
"name": "perf-0:2.6.32-504.81.3.el6.x86_64",
"product_id": "perf-0:2.6.32-504.81.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-504.81.3.el6?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.32-504.81.3.el6.src",
"product": {
"name": "kernel-0:2.6.32-504.81.3.el6.src",
"product_id": "kernel-0:2.6.32-504.81.3.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-504.81.3.el6?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:2.6.32-504.81.3.el6.noarch",
"product": {
"name": "kernel-abi-whitelists-0:2.6.32-504.81.3.el6.noarch",
"product_id": "kernel-abi-whitelists-0:2.6.32-504.81.3.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@2.6.32-504.81.3.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:2.6.32-504.81.3.el6.noarch",
"product": {
"name": "kernel-doc-0:2.6.32-504.81.3.el6.noarch",
"product_id": "kernel-doc-0:2.6.32-504.81.3.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@2.6.32-504.81.3.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-firmware-0:2.6.32-504.81.3.el6.noarch",
"product": {
"name": "kernel-firmware-0:2.6.32-504.81.3.el6.noarch",
"product_id": "kernel-firmware-0:2.6.32-504.81.3.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-firmware@2.6.32-504.81.3.el6?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-504.81.3.el6.src as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:kernel-0:2.6.32-504.81.3.el6.src"
},
"product_reference": "kernel-0:2.6.32-504.81.3.el6.src",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-504.81.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:kernel-0:2.6.32-504.81.3.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-504.81.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-504.81.3.el6.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.81.3.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-504.81.3.el6.noarch",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-504.81.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:kernel-debug-0:2.6.32-504.81.3.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-504.81.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-504.81.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.81.3.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-504.81.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.81.3.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-504.81.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-504.81.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.81.3.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-504.81.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.81.3.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-504.81.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-504.81.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:kernel-devel-0:2.6.32-504.81.3.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-504.81.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-504.81.3.el6.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:kernel-doc-0:2.6.32-504.81.3.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-504.81.3.el6.noarch",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-504.81.3.el6.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.81.3.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-504.81.3.el6.noarch",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-504.81.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:kernel-headers-0:2.6.32-504.81.3.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-504.81.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-504.81.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:perf-0:2.6.32-504.81.3.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-504.81.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-504.81.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.81.3.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-504.81.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:python-perf-0:2.6.32-504.81.3.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-504.81.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-504.81.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.81.3.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-504.81.3.el6.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:kernel-0:2.6.32-504.81.3.el6.src"
},
"product_reference": "kernel-0:2.6.32-504.81.3.el6.src",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-504.81.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:kernel-0:2.6.32-504.81.3.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-504.81.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-504.81.3.el6.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.81.3.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-504.81.3.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-504.81.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.81.3.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-504.81.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-504.81.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.81.3.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-504.81.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.81.3.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-504.81.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-504.81.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.81.3.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-504.81.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.81.3.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-504.81.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-504.81.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.81.3.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-504.81.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-504.81.3.el6.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.81.3.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-504.81.3.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-504.81.3.el6.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.81.3.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-504.81.3.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-504.81.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.81.3.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-504.81.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-504.81.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:perf-0:2.6.32-504.81.3.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-504.81.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-504.81.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.81.3.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-504.81.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.81.3.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-504.81.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-504.81.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.81.3.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Intel"
]
},
{
"names": [
"Deepak Gupta"
],
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2018-12207",
"cwe": {
"id": "CWE-226",
"name": "Sensitive Information in Resource Not Removed Before Reuse"
},
"discovery_date": "2018-11-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1646768"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way Intel CPUs handle inconsistency between, virtual to physical memory address translations in CPU\u0027s local cache and system software\u0027s Paging structure entries. A privileged guest user may use this flaw to induce a hardware Machine Check Error on the host processor, resulting in a severe DoS scenario by halting the processor.\r\n\r\nSystem software like OS OR Virtual Machine Monitor (VMM) use virtual memory system for storing program instructions and data in memory. Virtual Memory system uses Paging structures like Page Tables and Page Directories to manage system memory. The processor\u0027s Memory Management Unit (MMU) uses Paging structure entries to translate program\u0027s virtual memory addresses to physical memory addresses. The processor stores these address translations into its local cache buffer called - Translation Lookaside Buffer (TLB). TLB has two parts, one for instructions and other for data addresses.\r\n\r\nSystem software can modify its Paging structure entries to change address mappings OR certain attributes like page size etc. Upon such Paging structure alterations in memory, system software must invalidate the corresponding address translations in the processor\u0027s TLB cache. But before this TLB invalidation takes place, a privileged guest user may trigger an instruction fetch operation, which could use an already cached, but now invalid, virtual to physical address translation from Instruction TLB (ITLB). Thus accessing an invalid physical memory address and resulting in halting the processor due to the Machine Check Error (MCE) on Page Size Change.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: Machine Check Error on Page Size Change (IFU)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-6.6.AUS:kernel-0:2.6.32-504.81.3.el6.src",
"6Server-6.6.AUS:kernel-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.81.3.el6.noarch",
"6Server-6.6.AUS:kernel-debug-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-devel-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-doc-0:2.6.32-504.81.3.el6.noarch",
"6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.81.3.el6.noarch",
"6Server-6.6.AUS:kernel-headers-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:perf-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:python-perf-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.81.3.el6.src",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.81.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.81.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.81.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:perf-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.81.3.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-12207"
},
{
"category": "external",
"summary": "RHBZ#1646768",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646768"
},
{
"category": "external",
"summary": "RHSB-ifu-page-mce",
"url": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-12207",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12207"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-12207",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12207"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-11-12T21:11:25+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Server-6.6.AUS:kernel-0:2.6.32-504.81.3.el6.src",
"6Server-6.6.AUS:kernel-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.81.3.el6.noarch",
"6Server-6.6.AUS:kernel-debug-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-devel-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-doc-0:2.6.32-504.81.3.el6.noarch",
"6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.81.3.el6.noarch",
"6Server-6.6.AUS:kernel-headers-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:perf-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:python-perf-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.81.3.el6.src",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.81.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.81.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.81.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:perf-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.81.3.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:3842"
},
{
"category": "workaround",
"details": "For mitigation related information, please refer to the Red Hat vulnerability article: https://access.redhat.com/security/vulnerabilities/ifu-page-mce .",
"product_ids": [
"6Server-6.6.AUS:kernel-0:2.6.32-504.81.3.el6.src",
"6Server-6.6.AUS:kernel-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.81.3.el6.noarch",
"6Server-6.6.AUS:kernel-debug-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-devel-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-doc-0:2.6.32-504.81.3.el6.noarch",
"6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.81.3.el6.noarch",
"6Server-6.6.AUS:kernel-headers-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:perf-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:python-perf-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.81.3.el6.src",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.81.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.81.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.81.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:perf-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.81.3.el6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"6Server-6.6.AUS:kernel-0:2.6.32-504.81.3.el6.src",
"6Server-6.6.AUS:kernel-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.81.3.el6.noarch",
"6Server-6.6.AUS:kernel-debug-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-devel-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-doc-0:2.6.32-504.81.3.el6.noarch",
"6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.81.3.el6.noarch",
"6Server-6.6.AUS:kernel-headers-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:perf-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:python-perf-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.81.3.el6.src",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.81.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.81.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.81.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:perf-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.81.3.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: Machine Check Error on Page Size Change (IFU)"
},
{
"acknowledgments": [
{
"names": [
"Intel"
]
}
],
"cve": "CVE-2019-11135",
"cwe": {
"id": "CWE-203",
"name": "Observable Discrepancy"
},
"discovery_date": "2019-09-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1753062"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way Intel CPUs handle speculative execution of instructions when the TSX Asynchronous Abort (TAA) error occurs. A local authenticated attacker with the ability to monitor execution times could infer the TSX memory state by comparing abort execution times. This could allow information disclosure via this observed side-channel for any TSX transaction being executed while an attacker is able to observe abort timing.\r\n\r\nIntel\u0027s Transactional Synchronisation Extensions (TSX) are set of instructions which enable transactional memory support to improve performance of the multi-threaded applications, in the lock-protected critical sections. The CPU executes instructions in the critical-sections as transactions, while ensuring their atomic state. When such transaction execution is unsuccessful, the processor cannot ensure atomic updates to the transaction memory, so the processor rolls back or aborts such transaction execution.\r\n\r\nWhile TSX Asynchronous Abort (TAA) is pending, CPU may continue to read data from architectural buffers and pass it to the dependent speculative operations. This may cause information leakage via speculative side-channel means, which is quite similar to the Microarchitectural Data Sampling (MDS) issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: TSX Transaction Asynchronous Abort (TAA)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "libvirt and qemu-kvm on Red Hat Enterprise Linux 6 are not affected by this vulnerability as they do not support MSR-based CPU features.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-6.6.AUS:kernel-0:2.6.32-504.81.3.el6.src",
"6Server-6.6.AUS:kernel-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.81.3.el6.noarch",
"6Server-6.6.AUS:kernel-debug-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-devel-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-doc-0:2.6.32-504.81.3.el6.noarch",
"6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.81.3.el6.noarch",
"6Server-6.6.AUS:kernel-headers-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:perf-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:python-perf-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.81.3.el6.src",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.81.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.81.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.81.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:perf-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.81.3.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11135"
},
{
"category": "external",
"summary": "RHBZ#1753062",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753062"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11135",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11135"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11135",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11135"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/tsx-asynchronousabort",
"url": "https://access.redhat.com/solutions/tsx-asynchronousabort"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00270.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00270.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-11-12T21:11:25+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Server-6.6.AUS:kernel-0:2.6.32-504.81.3.el6.src",
"6Server-6.6.AUS:kernel-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.81.3.el6.noarch",
"6Server-6.6.AUS:kernel-debug-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-devel-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-doc-0:2.6.32-504.81.3.el6.noarch",
"6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.81.3.el6.noarch",
"6Server-6.6.AUS:kernel-headers-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:perf-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:python-perf-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.81.3.el6.src",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.81.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.81.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.81.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:perf-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.81.3.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:3842"
},
{
"category": "workaround",
"details": "For mitigation related information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/solutions/tsx-asynchronousabort",
"product_ids": [
"6Server-6.6.AUS:kernel-0:2.6.32-504.81.3.el6.src",
"6Server-6.6.AUS:kernel-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.81.3.el6.noarch",
"6Server-6.6.AUS:kernel-debug-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-devel-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-doc-0:2.6.32-504.81.3.el6.noarch",
"6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.81.3.el6.noarch",
"6Server-6.6.AUS:kernel-headers-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:perf-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:python-perf-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.81.3.el6.src",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.81.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.81.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.81.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:perf-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.81.3.el6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"6Server-6.6.AUS:kernel-0:2.6.32-504.81.3.el6.src",
"6Server-6.6.AUS:kernel-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.81.3.el6.noarch",
"6Server-6.6.AUS:kernel-debug-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-devel-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-doc-0:2.6.32-504.81.3.el6.noarch",
"6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.81.3.el6.noarch",
"6Server-6.6.AUS:kernel-headers-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:perf-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:python-perf-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.81.3.el6.src",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.81.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.81.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.81.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:perf-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.81.3.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: TSX Transaction Asynchronous Abort (TAA)"
}
]
}
rhsa-2019_3941
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat OpenShift Container Platform release 4.1.24 is now available with updates to packages and images that fix several bugs and add enhancements.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments.\n\nThis is a text-only advisory for the machine-os-content container image, which includes RPM packages for Red Hat Enterprise Linux CoreOS.\n\nSecurity Fix(es):\n\n* A flaw was found in the way Intel CPUs handle inconsistency between, virtual to physical memory address translations in CPU\u0027s local cache and system software\u0027s Paging structure entries. A privileged guest user may use this flaw to induce a hardware Machine Check Error on the host processor, resulting in a severe DoS scenario by halting the processor.\n\nSystem software like OS OR Virtual Machine Monitor (VMM) use virtual memory system for storing program instructions and data in memory. Virtual Memory system uses Paging structures like Page Tables and Page Directories to manage system memory. The processor\u0027s Memory Management Unit (MMU) uses Paging structure entries to translate program\u0027s virtual memory addresses to physical memory addresses. The processor stores these address translations into its local cache buffer called - Translation Lookaside Buffer (TLB). TLB has two parts, one for instructions and other for data addresses.\n\nSystem software can modify its Paging structure entries to change address mappings OR certain attributes like page size etc. Upon such Paging structure alterations in memory, system software must invalidate the corresponding address translations in the processor\u0027s TLB cache. But before this TLB invalidation takes place, a privileged guest user may trigger an instruction fetch operation, which could use an already cached, but now invalid, virtual to physical address translation from Instruction TLB (ITLB). Thus accessing an invalid physical memory address and resulting in halting the processor due to the Machine Check Error (MCE) on Page Size Change. (CVE-2018-12207)\n\n* A flaw was found in the way sudo implemented running commands with an arbitrary user ID. If a sudoers entry is written to allow users to run a command as any user except root, this flaw can be used by an attacker to bypass that restriction. (CVE-2019-14287)\n\n* An improper authorization flaw was discovered in systemd-resolved in the way it configures the exposed DBus interface org.freedesktop.resolve1. An unprivileged local user could call all DBus methods, even when marked as privileged operations. An attacker could abuse this flaw by changing the DNS, Search Domain, LLMNR, DNSSEC, and other network link settings without any authorization, giving them control of the network names resolution process and causing the system to communicate with wrong or malicious servers. (CVE-2019-15718)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2019:3941",
"url": "https://access.redhat.com/errata/RHSA-2019:3941"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce",
"url": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce"
},
{
"category": "external",
"summary": "1646768",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646768"
},
{
"category": "external",
"summary": "1746057",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1746057"
},
{
"category": "external",
"summary": "1760531",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1760531"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_3941.json"
}
],
"title": "Red Hat Security Advisory: OpenShift Container Platform 4.1.24 machine-os-content-container security update",
"tracking": {
"current_release_date": "2024-11-22T13:21:06+00:00",
"generator": {
"date": "2024-11-22T13:21:06+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2019:3941",
"initial_release_date": "2019-11-21T09:55:18+00:00",
"revision_history": [
{
"date": "2019-11-21T09:55:18+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2019-11-21T09:55:18+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T13:21:06+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenShift Container Platform 4",
"product": {
"name": "Red Hat OpenShift Container Platform 4",
"product_id": "Red Hat OpenShift Container Platform 4",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:4.1"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift Enterprise"
}
],
"category": "vendor",
"name": "Red Hat"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Intel"
]
},
{
"names": [
"Deepak Gupta"
],
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2018-12207",
"cwe": {
"id": "CWE-226",
"name": "Sensitive Information in Resource Not Removed Before Reuse"
},
"discovery_date": "2018-11-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1646768"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way Intel CPUs handle inconsistency between, virtual to physical memory address translations in CPU\u0027s local cache and system software\u0027s Paging structure entries. A privileged guest user may use this flaw to induce a hardware Machine Check Error on the host processor, resulting in a severe DoS scenario by halting the processor.\r\n\r\nSystem software like OS OR Virtual Machine Monitor (VMM) use virtual memory system for storing program instructions and data in memory. Virtual Memory system uses Paging structures like Page Tables and Page Directories to manage system memory. The processor\u0027s Memory Management Unit (MMU) uses Paging structure entries to translate program\u0027s virtual memory addresses to physical memory addresses. The processor stores these address translations into its local cache buffer called - Translation Lookaside Buffer (TLB). TLB has two parts, one for instructions and other for data addresses.\r\n\r\nSystem software can modify its Paging structure entries to change address mappings OR certain attributes like page size etc. Upon such Paging structure alterations in memory, system software must invalidate the corresponding address translations in the processor\u0027s TLB cache. But before this TLB invalidation takes place, a privileged guest user may trigger an instruction fetch operation, which could use an already cached, but now invalid, virtual to physical address translation from Instruction TLB (ITLB). Thus accessing an invalid physical memory address and resulting in halting the processor due to the Machine Check Error (MCE) on Page Size Change.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: Machine Check Error on Page Size Change (IFU)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Container Platform 4"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-12207"
},
{
"category": "external",
"summary": "RHBZ#1646768",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646768"
},
{
"category": "external",
"summary": "RHSB-ifu-page-mce",
"url": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-12207",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12207"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-12207",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12207"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-11-21T09:55:18+00:00",
"details": "For OpenShift Container Platform 4.1 see the following documentation, which\nwill be updated shortly for release 4.1.24, for important instructions on\nhow to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/4.1/release_notes/ocp-4-1-release-notes.html",
"product_ids": [
"Red Hat OpenShift Container Platform 4"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:3941"
},
{
"category": "workaround",
"details": "For mitigation related information, please refer to the Red Hat vulnerability article: https://access.redhat.com/security/vulnerabilities/ifu-page-mce .",
"product_ids": [
"Red Hat OpenShift Container Platform 4"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"Red Hat OpenShift Container Platform 4"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: Machine Check Error on Page Size Change (IFU)"
},
{
"acknowledgments": [
{
"names": [
"the Sudo project"
]
},
{
"names": [
"Joe Vennix"
],
"organization": "Apple Information Security",
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2019-14287",
"cwe": {
"id": "CWE-267",
"name": "Privilege Defined With Unsafe Actions"
},
"discovery_date": "2019-10-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1760531"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way sudo implemented running commands with arbitrary user ID. If a sudoers entry is written to allow the attacker to run a command as any user except root, this flaw can be used by the attacker to bypass that restriction.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "sudo: Privilege escalation via \u0027Runas\u0027 specification with \u0027ALL\u0027 keyword",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw only affects specific, non-default configurations of sudo, in which sudoers configuration entry allows a user to run a command as any user except root, for example:\n\nsomeuser myhost = (ALL, !root) /usr/bin/somecommand\n\nThis configuration allows user \"someuser\" to run somecommand as any other user except root. However, this flaw also allows someuser to run somecommand as root by specifying the target user using the numeric id of -1. Only the specified command can be run, this flaw does NOT allow user to run other commands that those specified in the sudoers configuration.\n\nAny other configurations of sudo (including configurations that allow user to run commands as any user including root and configurations that allow user to run command as a specific other user) are NOT affected by this flaw.\n\nRed Hat Virtualization Hypervisor includes an affected version of sudo, however the default configuration is not vulnerable to this flaw.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Container Platform 4"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-14287"
},
{
"category": "external",
"summary": "RHBZ#1760531",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1760531"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-14287",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14287"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14287",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14287"
},
{
"category": "external",
"summary": "https://www.sudo.ws/alerts/minus_1_uid.html",
"url": "https://www.sudo.ws/alerts/minus_1_uid.html"
}
],
"release_date": "2019-10-14T15:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-11-21T09:55:18+00:00",
"details": "For OpenShift Container Platform 4.1 see the following documentation, which\nwill be updated shortly for release 4.1.24, for important instructions on\nhow to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/4.1/release_notes/ocp-4-1-release-notes.html",
"product_ids": [
"Red Hat OpenShift Container Platform 4"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:3941"
},
{
"category": "workaround",
"details": "This vulnerability only affects configurations of sudo that have a runas user list that includes an exclusion of root. The most simple example is:\n\n~~~\nsomeuser ALL=(ALL, !root) /usr/bin/somecommand\n~~~\n\nThe exclusion is specified using an excalamation mark (!). In this example, the \"root\" user is specified by name. The root user may also be identified in other ways, such as by user id:\n\n~~~\nsomeuser ALL=(ALL, !#0) /usr/bin/somecommand\n~~~\n\nor by reference to a runas alias:\n\n~~~\nRunas_Alias MYGROUP = root, adminuser\nsomeuser ALL=(ALL, !MYGROUP) /usr/bin/somecommand\n~~~\n\nTo ensure your sudoers configuration is not affected by this vulnerability, we recommend examining each sudoers entry that includes the `!` character in the runas specification, to ensure that the root user is not among the exclusions. These can be found in the /etc/sudoers file or files under /etc/sudoers.d.",
"product_ids": [
"Red Hat OpenShift Container Platform 4"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"Red Hat OpenShift Container Platform 4"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "sudo: Privilege escalation via \u0027Runas\u0027 specification with \u0027ALL\u0027 keyword"
},
{
"cve": "CVE-2019-15718",
"cwe": {
"id": "CWE-285",
"name": "Improper Authorization"
},
"discovery_date": "2019-08-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1746057"
}
],
"notes": [
{
"category": "description",
"text": "An improper authorization flaw was discovered in systemd-resolved in the way it configures the exposed DBus interface org.freedesktop.resolve1. An unprivileged local attacker could call all DBus methods, even when marked as privileged operations. An attacker could abuse this flaw by changing the DNS, Search Domain, LLMNR, DNSSEC and other network link settings without any authorization, allowing control of the network names resolution process and cause the system to communicate with wrong or malicious servers.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "systemd: systemd-resolved allows unprivileged users to configure DNS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue does not affect the versions of systemd as shipped with Red Hat Enterprise Linux 7 as the shipped systemd-resolved does not provide any privileged DBus method.\nThis issue does affect the versions of systemd as shipped with Red Hat Enterprise Linux 8, however the systemd-resolved service is not enabled by default, so the flaw cannot be exploited unless the service was manually enabled.\n\nThe flaw was rated as Moderate as it requires a local attacker and changing the DNS servers cannot compromise the system by itself, though it could be used for phishing attacks or to redirect the users to malicious websites. Moreover, on Red Hat Enterprise Linux 8 systemd-resolved needs to be manually enabled by an administrator to make the system vulnerable.\n\nOpenShift Container Platform 4 includes a vulnerable version of systemd on RHEL CoreOS nodes. However, the systemd-resolved service is removed from RHEL CoreOS instances, making this vulnerability not exploitable. This flaw is rated Low for OpenShift Container Platform 4.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Container Platform 4"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-15718"
},
{
"category": "external",
"summary": "RHBZ#1746057",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1746057"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-15718",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15718"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-15718",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-15718"
}
],
"release_date": "2019-09-03T15:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-11-21T09:55:18+00:00",
"details": "For OpenShift Container Platform 4.1 see the following documentation, which\nwill be updated shortly for release 4.1.24, for important instructions on\nhow to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/4.1/release_notes/ocp-4-1-release-notes.html",
"product_ids": [
"Red Hat OpenShift Container Platform 4"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:3941"
},
{
"category": "workaround",
"details": "Disable systemd-resolved service by using `sudo systemctl disable systemd-resolved`.",
"product_ids": [
"Red Hat OpenShift Container Platform 4"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"Red Hat OpenShift Container Platform 4"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "systemd: systemd-resolved allows unprivileged users to configure DNS"
}
]
}
rhsa-2019:3844
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel-rt is now available for Red Hat Enterprise MRG 2.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* hw: Machine Check Error on Page Size Change (IFU) (CVE-2018-12207)\n\n* hw: TSX Transaction Asynchronous Abort (TAA) (CVE-2019-11135)\n\n* hw: Intel GPU Denial Of Service while accessing MMIO in lower power state (CVE-2019-0154)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2019:3844",
"url": "https://access.redhat.com/errata/RHSA-2019:3844"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce",
"url": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/tsx-asynchronousabort",
"url": "https://access.redhat.com/solutions/tsx-asynchronousabort"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/i915-graphics",
"url": "https://access.redhat.com/solutions/i915-graphics"
},
{
"category": "external",
"summary": "1646768",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646768"
},
{
"category": "external",
"summary": "1724393",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1724393"
},
{
"category": "external",
"summary": "1753062",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753062"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_3844.json"
}
],
"title": "Red Hat Security Advisory: kernel-rt security update",
"tracking": {
"current_release_date": "2025-10-09T18:15:57+00:00",
"generator": {
"date": "2025-10-09T18:15:57+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2019:3844",
"initial_release_date": "2019-11-12T21:08:54+00:00",
"revision_history": [
{
"date": "2019-11-12T21:08:54+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2019-11-12T21:08:54+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T18:15:57+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat MRG Realtime for RHEL 6 Server v.2",
"product": {
"name": "Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_mrg:2:server:el6"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise MRG for RHEL-6"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"product": {
"name": "kernel-rt-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"product_id": "kernel-rt-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@3.10.0-693.60.2.rt56.655.el6rt?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"product": {
"name": "kernel-rt-debug-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"product_id": "kernel-rt-debug-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug@3.10.0-693.60.2.rt56.655.el6rt?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"product": {
"name": "kernel-rt-debug-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"product_id": "kernel-rt-debug-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-devel@3.10.0-693.60.2.rt56.655.el6rt?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"product": {
"name": "kernel-rt-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"product_id": "kernel-rt-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-devel@3.10.0-693.60.2.rt56.655.el6rt?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"product": {
"name": "kernel-rt-trace-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"product_id": "kernel-rt-trace-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace@3.10.0-693.60.2.rt56.655.el6rt?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"product": {
"name": "kernel-rt-trace-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"product_id": "kernel-rt-trace-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace-devel@3.10.0-693.60.2.rt56.655.el6rt?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-vanilla-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"product": {
"name": "kernel-rt-vanilla-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"product_id": "kernel-rt-vanilla-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-vanilla@3.10.0-693.60.2.rt56.655.el6rt?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-vanilla-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"product": {
"name": "kernel-rt-vanilla-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"product_id": "kernel-rt-vanilla-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-vanilla-devel@3.10.0-693.60.2.rt56.655.el6rt?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"product": {
"name": "kernel-rt-debug-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"product_id": "kernel-rt-debug-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@3.10.0-693.60.2.rt56.655.el6rt?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"product": {
"name": "kernel-rt-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"product_id": "kernel-rt-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo@3.10.0-693.60.2.rt56.655.el6rt?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"product": {
"name": "kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"product_id": "kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@3.10.0-693.60.2.rt56.655.el6rt?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-trace-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"product": {
"name": "kernel-rt-trace-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"product_id": "kernel-rt-trace-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-trace-debuginfo@3.10.0-693.60.2.rt56.655.el6rt?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-vanilla-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"product": {
"name": "kernel-rt-vanilla-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"product_id": "kernel-rt-vanilla-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-vanilla-debuginfo@3.10.0-693.60.2.rt56.655.el6rt?arch=x86_64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-1:3.10.0-693.60.2.rt56.655.el6rt.src",
"product": {
"name": "kernel-rt-1:3.10.0-693.60.2.rt56.655.el6rt.src",
"product_id": "kernel-rt-1:3.10.0-693.60.2.rt56.655.el6rt.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@3.10.0-693.60.2.rt56.655.el6rt?arch=src\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-doc-1:3.10.0-693.60.2.rt56.655.el6rt.noarch",
"product": {
"name": "kernel-rt-doc-1:3.10.0-693.60.2.rt56.655.el6rt.noarch",
"product_id": "kernel-rt-doc-1:3.10.0-693.60.2.rt56.655.el6rt.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-doc@3.10.0-693.60.2.rt56.655.el6rt?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-firmware-1:3.10.0-693.60.2.rt56.655.el6rt.noarch",
"product": {
"name": "kernel-rt-firmware-1:3.10.0-693.60.2.rt56.655.el6rt.noarch",
"product_id": "kernel-rt-firmware-1:3.10.0-693.60.2.rt56.655.el6rt.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-firmware@3.10.0-693.60.2.rt56.655.el6rt?arch=noarch\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-1:3.10.0-693.60.2.rt56.655.el6rt.src as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.60.2.rt56.655.el6rt.src"
},
"product_reference": "kernel-rt-1:3.10.0-693.60.2.rt56.655.el6rt.src",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64"
},
"product_reference": "kernel-rt-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64"
},
"product_reference": "kernel-rt-debug-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64"
},
"product_reference": "kernel-rt-debug-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64"
},
"product_reference": "kernel-rt-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64"
},
"product_reference": "kernel-rt-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-doc-1:3.10.0-693.60.2.rt56.655.el6rt.noarch as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.60.2.rt56.655.el6rt.noarch"
},
"product_reference": "kernel-rt-doc-1:3.10.0-693.60.2.rt56.655.el6rt.noarch",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-firmware-1:3.10.0-693.60.2.rt56.655.el6rt.noarch as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.60.2.rt56.655.el6rt.noarch"
},
"product_reference": "kernel-rt-firmware-1:3.10.0-693.60.2.rt56.655.el6rt.noarch",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64"
},
"product_reference": "kernel-rt-trace-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64"
},
"product_reference": "kernel-rt-trace-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-trace-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64"
},
"product_reference": "kernel-rt-trace-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-vanilla-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64"
},
"product_reference": "kernel-rt-vanilla-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-vanilla-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64"
},
"product_reference": "kernel-rt-vanilla-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-vanilla-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2",
"product_id": "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64"
},
"product_reference": "kernel-rt-vanilla-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"relates_to_product_reference": "6Server-MRG-Realtime-2"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Intel"
]
},
{
"names": [
"Deepak Gupta"
],
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2018-12207",
"cwe": {
"id": "CWE-226",
"name": "Sensitive Information in Resource Not Removed Before Reuse"
},
"discovery_date": "2018-11-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1646768"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way Intel CPUs handle inconsistency between, virtual to physical memory address translations in CPU\u0027s local cache and system software\u0027s Paging structure entries. A privileged guest user may use this flaw to induce a hardware Machine Check Error on the host processor, resulting in a severe DoS scenario by halting the processor.\r\n\r\nSystem software like OS OR Virtual Machine Monitor (VMM) use virtual memory system for storing program instructions and data in memory. Virtual Memory system uses Paging structures like Page Tables and Page Directories to manage system memory. The processor\u0027s Memory Management Unit (MMU) uses Paging structure entries to translate program\u0027s virtual memory addresses to physical memory addresses. The processor stores these address translations into its local cache buffer called - Translation Lookaside Buffer (TLB). TLB has two parts, one for instructions and other for data addresses.\r\n\r\nSystem software can modify its Paging structure entries to change address mappings OR certain attributes like page size etc. Upon such Paging structure alterations in memory, system software must invalidate the corresponding address translations in the processor\u0027s TLB cache. But before this TLB invalidation takes place, a privileged guest user may trigger an instruction fetch operation, which could use an already cached, but now invalid, virtual to physical address translation from Instruction TLB (ITLB). Thus accessing an invalid physical memory address and resulting in halting the processor due to the Machine Check Error (MCE) on Page Size Change.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: Machine Check Error on Page Size Change (IFU)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.60.2.rt56.655.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.60.2.rt56.655.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.60.2.rt56.655.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-12207"
},
{
"category": "external",
"summary": "RHBZ#1646768",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646768"
},
{
"category": "external",
"summary": "RHSB-ifu-page-mce",
"url": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-12207",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12207"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-12207",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12207"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-11-12T21:08:54+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.60.2.rt56.655.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.60.2.rt56.655.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.60.2.rt56.655.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:3844"
},
{
"category": "workaround",
"details": "For mitigation related information, please refer to the Red Hat vulnerability article: https://access.redhat.com/security/vulnerabilities/ifu-page-mce .",
"product_ids": [
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.60.2.rt56.655.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.60.2.rt56.655.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.60.2.rt56.655.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.60.2.rt56.655.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.60.2.rt56.655.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.60.2.rt56.655.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: Machine Check Error on Page Size Change (IFU)"
},
{
"acknowledgments": [
{
"names": [
"Intel"
]
}
],
"cve": "CVE-2019-0154",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"discovery_date": "2019-06-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1724393"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Intel graphics hardware (GPU) where a local attacker with the ability to issue an ioctl could trigger a hardware level crash if MMIO registers were read while the graphics card was in a low-power state. This creates a denial of service situation and the GPU and connected displays will remain unusable until a reboot occurs.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: Intel GPU Denial Of Service while accessing MMIO in lower power state",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Intel plans to release BIOS firmware to correct this issue. Red Hat\u0027s kernel update should mitigate this vulnerability. Some older hardware will not have BIOS firmware update and will rely on operating system level protection to prevent access while the device is in low-power states. For more information see https://access.redhat.com/solutions/i915-graphics",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.60.2.rt56.655.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.60.2.rt56.655.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.60.2.rt56.655.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-0154"
},
{
"category": "external",
"summary": "RHBZ#1724393",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1724393"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-0154",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0154"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-0154",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0154"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/i915-graphics",
"url": "https://access.redhat.com/solutions/i915-graphics"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00260.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00260.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-11-12T21:08:54+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.60.2.rt56.655.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.60.2.rt56.655.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.60.2.rt56.655.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:3844"
},
{
"category": "workaround",
"details": "Preventing loading of the i915 kernel module will prevent attackers from using this exploit against the system however the power management functionality of the card will be disabled and the system may draw additional power. See this KCS article (https://access.redhat.com/solutions/41278) for instructions on how to disable a kernel module. Graphical displays may also be at low resolution or not work correctly. This mitigation may not be suitable if running graphical tools locally is required.",
"product_ids": [
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.60.2.rt56.655.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.60.2.rt56.655.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.60.2.rt56.655.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.60.2.rt56.655.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.60.2.rt56.655.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.60.2.rt56.655.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: Intel GPU Denial Of Service while accessing MMIO in lower power state"
},
{
"acknowledgments": [
{
"names": [
"Intel"
]
}
],
"cve": "CVE-2019-11135",
"cwe": {
"id": "CWE-203",
"name": "Observable Discrepancy"
},
"discovery_date": "2019-09-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1753062"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way Intel CPUs handle speculative execution of instructions when the TSX Asynchronous Abort (TAA) error occurs. A local authenticated attacker with the ability to monitor execution times could infer the TSX memory state by comparing abort execution times. This could allow information disclosure via this observed side-channel for any TSX transaction being executed while an attacker is able to observe abort timing.\r\n\r\nIntel\u0027s Transactional Synchronisation Extensions (TSX) are set of instructions which enable transactional memory support to improve performance of the multi-threaded applications, in the lock-protected critical sections. The CPU executes instructions in the critical-sections as transactions, while ensuring their atomic state. When such transaction execution is unsuccessful, the processor cannot ensure atomic updates to the transaction memory, so the processor rolls back or aborts such transaction execution.\r\n\r\nWhile TSX Asynchronous Abort (TAA) is pending, CPU may continue to read data from architectural buffers and pass it to the dependent speculative operations. This may cause information leakage via speculative side-channel means, which is quite similar to the Microarchitectural Data Sampling (MDS) issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: TSX Transaction Asynchronous Abort (TAA)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "libvirt and qemu-kvm on Red Hat Enterprise Linux 6 are not affected by this vulnerability as they do not support MSR-based CPU features.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.60.2.rt56.655.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.60.2.rt56.655.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.60.2.rt56.655.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11135"
},
{
"category": "external",
"summary": "RHBZ#1753062",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753062"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11135",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11135"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11135",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11135"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/tsx-asynchronousabort",
"url": "https://access.redhat.com/solutions/tsx-asynchronousabort"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00270.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00270.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-11-12T21:08:54+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.60.2.rt56.655.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.60.2.rt56.655.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.60.2.rt56.655.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:3844"
},
{
"category": "workaround",
"details": "For mitigation related information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/solutions/tsx-asynchronousabort",
"product_ids": [
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.60.2.rt56.655.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.60.2.rt56.655.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.60.2.rt56.655.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.60.2.rt56.655.el6rt.src",
"6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.60.2.rt56.655.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.60.2.rt56.655.el6rt.noarch",
"6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64",
"6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.60.2.rt56.655.el6rt.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: TSX Transaction Asynchronous Abort (TAA)"
}
]
}
RHSA-2020:0028
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kpatch-patch is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.\n\nSecurity Fix(es):\n\n* hw: Machine Check Error on Page Size Change (IFU) (CVE-2018-12207)\n\n* hw: TSX Transaction Asynchronous Abort (TAA) (CVE-2019-11135)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2020:0028",
"url": "https://access.redhat.com/errata/RHSA-2020:0028"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce",
"url": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/tsx-asynchronousabort",
"url": "https://access.redhat.com/solutions/tsx-asynchronousabort"
},
{
"category": "external",
"summary": "1646768",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646768"
},
{
"category": "external",
"summary": "1753062",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753062"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_0028.json"
}
],
"title": "Red Hat Security Advisory: kpatch-patch security update",
"tracking": {
"current_release_date": "2025-10-09T18:16:00+00:00",
"generator": {
"date": "2025-10-09T18:16:00+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2020:0028",
"initial_release_date": "2020-01-06T14:46:13+00:00",
"revision_history": [
{
"date": "2020-01-06T14:46:13+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2020-01-06T14:46:13+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T18:16:00+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_4_1-0:1-4.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_4_1-0:1-4.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_4_1-0:1-4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_4_1@1-4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_4_1-debuginfo-0:1-4.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_4_1-debuginfo-0:1-4.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_4_1-debuginfo-0:1-4.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_4_1-debuginfo@1-4.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_1_2-0:1-7.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_1_2-0:1-7.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_1_2-0:1-7.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_1_2@1-7.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_1_2-debuginfo-0:1-7.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_1_2-debuginfo-0:1-7.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_1_2-debuginfo-0:1-7.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_1_2-debuginfo@1-7.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_1_1-0:1-8.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_1_1-0:1-8.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_1_1-0:1-8.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_1_1@1-8.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_1_1-debuginfo-0:1-8.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062_1_1-debuginfo-0:1-8.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062_1_1-debuginfo-0:1-8.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_1_1-debuginfo@1-8.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062-0:1-9.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062-0:1-9.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062-0:1-9.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062@1-9.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062-debuginfo-0:1-9.el7.x86_64",
"product": {
"name": "kpatch-patch-3_10_0-1062-debuginfo-0:1-9.el7.x86_64",
"product_id": "kpatch-patch-3_10_0-1062-debuginfo-0:1-9.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062-debuginfo@1-9.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_4_1-0:1-4.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1062_4_1-0:1-4.el7.src",
"product_id": "kpatch-patch-3_10_0-1062_4_1-0:1-4.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_4_1@1-4.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_1_2-0:1-7.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1062_1_2-0:1-7.el7.src",
"product_id": "kpatch-patch-3_10_0-1062_1_2-0:1-7.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_1_2@1-7.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062_1_1-0:1-8.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1062_1_1-0:1-8.el7.src",
"product_id": "kpatch-patch-3_10_0-1062_1_1-0:1-8.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062_1_1@1-8.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-3_10_0-1062-0:1-9.el7.src",
"product": {
"name": "kpatch-patch-3_10_0-1062-0:1-9.el7.src",
"product_id": "kpatch-patch-3_10_0-1062-0:1-9.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-3_10_0-1062@1-9.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062-0:1-9.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kpatch-patch-3_10_0-1062-0:1-9.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1062-0:1-9.el7.src",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062-0:1-9.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kpatch-patch-3_10_0-1062-0:1-9.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062-0:1-9.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062-debuginfo-0:1-9.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kpatch-patch-3_10_0-1062-debuginfo-0:1-9.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062-debuginfo-0:1-9.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_1_1-0:1-8.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_1-0:1-8.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1062_1_1-0:1-8.el7.src",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_1_1-0:1-8.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_1-0:1-8.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_1_1-0:1-8.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_1_1-debuginfo-0:1-8.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_1-debuginfo-0:1-8.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_1_1-debuginfo-0:1-8.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_1_2-0:1-7.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_2-0:1-7.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1062_1_2-0:1-7.el7.src",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_1_2-0:1-7.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_2-0:1-7.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_1_2-0:1-7.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_1_2-debuginfo-0:1-7.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_2-debuginfo-0:1-7.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_1_2-debuginfo-0:1-7.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_4_1-0:1-4.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kpatch-patch-3_10_0-1062_4_1-0:1-4.el7.src"
},
"product_reference": "kpatch-patch-3_10_0-1062_4_1-0:1-4.el7.src",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_4_1-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kpatch-patch-3_10_0-1062_4_1-0:1-4.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_4_1-0:1-4.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-3_10_0-1062_4_1-debuginfo-0:1-4.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kpatch-patch-3_10_0-1062_4_1-debuginfo-0:1-4.el7.x86_64"
},
"product_reference": "kpatch-patch-3_10_0-1062_4_1-debuginfo-0:1-4.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.Z"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Intel"
]
},
{
"names": [
"Deepak Gupta"
],
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2018-12207",
"cwe": {
"id": "CWE-226",
"name": "Sensitive Information in Resource Not Removed Before Reuse"
},
"discovery_date": "2018-11-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1646768"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way Intel CPUs handle inconsistency between, virtual to physical memory address translations in CPU\u0027s local cache and system software\u0027s Paging structure entries. A privileged guest user may use this flaw to induce a hardware Machine Check Error on the host processor, resulting in a severe DoS scenario by halting the processor.\r\n\r\nSystem software like OS OR Virtual Machine Monitor (VMM) use virtual memory system for storing program instructions and data in memory. Virtual Memory system uses Paging structures like Page Tables and Page Directories to manage system memory. The processor\u0027s Memory Management Unit (MMU) uses Paging structure entries to translate program\u0027s virtual memory addresses to physical memory addresses. The processor stores these address translations into its local cache buffer called - Translation Lookaside Buffer (TLB). TLB has two parts, one for instructions and other for data addresses.\r\n\r\nSystem software can modify its Paging structure entries to change address mappings OR certain attributes like page size etc. Upon such Paging structure alterations in memory, system software must invalidate the corresponding address translations in the processor\u0027s TLB cache. But before this TLB invalidation takes place, a privileged guest user may trigger an instruction fetch operation, which could use an already cached, but now invalid, virtual to physical address translation from Instruction TLB (ITLB). Thus accessing an invalid physical memory address and resulting in halting the processor due to the Machine Check Error (MCE) on Page Size Change.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: Machine Check Error on Page Size Change (IFU)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.7.Z:kpatch-patch-3_10_0-1062-0:1-9.el7.src",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062-0:1-9.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062-debuginfo-0:1-9.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_1-0:1-8.el7.src",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_1-0:1-8.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_1-debuginfo-0:1-8.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_2-0:1-7.el7.src",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_2-0:1-7.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_2-debuginfo-0:1-7.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_4_1-0:1-4.el7.src",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_4_1-0:1-4.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_4_1-debuginfo-0:1-4.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-12207"
},
{
"category": "external",
"summary": "RHBZ#1646768",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646768"
},
{
"category": "external",
"summary": "RHSB-ifu-page-mce",
"url": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-12207",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12207"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-12207",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12207"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-01-06T14:46:13+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-7.7.Z:kpatch-patch-3_10_0-1062-0:1-9.el7.src",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062-0:1-9.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062-debuginfo-0:1-9.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_1-0:1-8.el7.src",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_1-0:1-8.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_1-debuginfo-0:1-8.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_2-0:1-7.el7.src",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_2-0:1-7.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_2-debuginfo-0:1-7.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_4_1-0:1-4.el7.src",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_4_1-0:1-4.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_4_1-debuginfo-0:1-4.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2020:0028"
},
{
"category": "workaround",
"details": "For mitigation related information, please refer to the Red Hat vulnerability article: https://access.redhat.com/security/vulnerabilities/ifu-page-mce .",
"product_ids": [
"7Server-7.7.Z:kpatch-patch-3_10_0-1062-0:1-9.el7.src",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062-0:1-9.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062-debuginfo-0:1-9.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_1-0:1-8.el7.src",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_1-0:1-8.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_1-debuginfo-0:1-8.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_2-0:1-7.el7.src",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_2-0:1-7.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_2-debuginfo-0:1-7.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_4_1-0:1-4.el7.src",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_4_1-0:1-4.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_4_1-debuginfo-0:1-4.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7Server-7.7.Z:kpatch-patch-3_10_0-1062-0:1-9.el7.src",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062-0:1-9.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062-debuginfo-0:1-9.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_1-0:1-8.el7.src",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_1-0:1-8.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_1-debuginfo-0:1-8.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_2-0:1-7.el7.src",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_2-0:1-7.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_2-debuginfo-0:1-7.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_4_1-0:1-4.el7.src",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_4_1-0:1-4.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_4_1-debuginfo-0:1-4.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: Machine Check Error on Page Size Change (IFU)"
},
{
"acknowledgments": [
{
"names": [
"Intel"
]
}
],
"cve": "CVE-2019-11135",
"cwe": {
"id": "CWE-203",
"name": "Observable Discrepancy"
},
"discovery_date": "2019-09-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1753062"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way Intel CPUs handle speculative execution of instructions when the TSX Asynchronous Abort (TAA) error occurs. A local authenticated attacker with the ability to monitor execution times could infer the TSX memory state by comparing abort execution times. This could allow information disclosure via this observed side-channel for any TSX transaction being executed while an attacker is able to observe abort timing.\r\n\r\nIntel\u0027s Transactional Synchronisation Extensions (TSX) are set of instructions which enable transactional memory support to improve performance of the multi-threaded applications, in the lock-protected critical sections. The CPU executes instructions in the critical-sections as transactions, while ensuring their atomic state. When such transaction execution is unsuccessful, the processor cannot ensure atomic updates to the transaction memory, so the processor rolls back or aborts such transaction execution.\r\n\r\nWhile TSX Asynchronous Abort (TAA) is pending, CPU may continue to read data from architectural buffers and pass it to the dependent speculative operations. This may cause information leakage via speculative side-channel means, which is quite similar to the Microarchitectural Data Sampling (MDS) issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: TSX Transaction Asynchronous Abort (TAA)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "libvirt and qemu-kvm on Red Hat Enterprise Linux 6 are not affected by this vulnerability as they do not support MSR-based CPU features.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.7.Z:kpatch-patch-3_10_0-1062-0:1-9.el7.src",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062-0:1-9.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062-debuginfo-0:1-9.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_1-0:1-8.el7.src",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_1-0:1-8.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_1-debuginfo-0:1-8.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_2-0:1-7.el7.src",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_2-0:1-7.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_2-debuginfo-0:1-7.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_4_1-0:1-4.el7.src",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_4_1-0:1-4.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_4_1-debuginfo-0:1-4.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11135"
},
{
"category": "external",
"summary": "RHBZ#1753062",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753062"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11135",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11135"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11135",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11135"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/tsx-asynchronousabort",
"url": "https://access.redhat.com/solutions/tsx-asynchronousabort"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00270.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00270.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-01-06T14:46:13+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-7.7.Z:kpatch-patch-3_10_0-1062-0:1-9.el7.src",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062-0:1-9.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062-debuginfo-0:1-9.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_1-0:1-8.el7.src",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_1-0:1-8.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_1-debuginfo-0:1-8.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_2-0:1-7.el7.src",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_2-0:1-7.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_2-debuginfo-0:1-7.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_4_1-0:1-4.el7.src",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_4_1-0:1-4.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_4_1-debuginfo-0:1-4.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2020:0028"
},
{
"category": "workaround",
"details": "For mitigation related information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/solutions/tsx-asynchronousabort",
"product_ids": [
"7Server-7.7.Z:kpatch-patch-3_10_0-1062-0:1-9.el7.src",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062-0:1-9.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062-debuginfo-0:1-9.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_1-0:1-8.el7.src",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_1-0:1-8.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_1-debuginfo-0:1-8.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_2-0:1-7.el7.src",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_2-0:1-7.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_2-debuginfo-0:1-7.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_4_1-0:1-4.el7.src",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_4_1-0:1-4.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_4_1-debuginfo-0:1-4.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"7Server-7.7.Z:kpatch-patch-3_10_0-1062-0:1-9.el7.src",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062-0:1-9.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062-debuginfo-0:1-9.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_1-0:1-8.el7.src",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_1-0:1-8.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_1-debuginfo-0:1-8.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_2-0:1-7.el7.src",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_2-0:1-7.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_1_2-debuginfo-0:1-7.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_4_1-0:1-4.el7.src",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_4_1-0:1-4.el7.x86_64",
"7Server-7.7.Z:kpatch-patch-3_10_0-1062_4_1-debuginfo-0:1-4.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: TSX Transaction Asynchronous Abort (TAA)"
}
]
}
rhsa-2019:3860
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for redhat-release-virtualization-host and redhat-virtualization-host is now available for Red Hat Virtualization 4 for Red Hat Enterprise Linux 7 and Red Hat Virtualization 4.2 for Red Hat Enterprise Linux 7.6 EUS.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The redhat-virtualization-host packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts (RHVH) are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host\u0027s resources and performing administrative tasks. \n\nThe ovirt-node-ng packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts (RHVH) are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host\u0027s resources and performing administrative tasks.\n\nSecurity Fix(es):\n\n* hw: Machine Check Error on Page Size Change (IFU) (CVE-2018-12207)\n\n* hw: TSX Transaction Asynchronous Abort (TAA) (CVE-2019-11135)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2019:3860",
"url": "https://access.redhat.com/errata/RHSA-2019:3860"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce",
"url": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/tsx-asynchronousabort",
"url": "https://access.redhat.com/solutions/tsx-asynchronousabort"
},
{
"category": "external",
"summary": "1646768",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646768"
},
{
"category": "external",
"summary": "1753062",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753062"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_3860.json"
}
],
"title": "Red Hat Security Advisory: redhat-release-virtualization-host and redhat-virtualization-host update",
"tracking": {
"current_release_date": "2025-10-09T18:15:56+00:00",
"generator": {
"date": "2025-10-09T18:15:56+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2019:3860",
"initial_release_date": "2019-11-12T20:11:55+00:00",
"revision_history": [
{
"date": "2019-11-12T20:11:55+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2019-11-12T20:11:55+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T18:15:56+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product": {
"name": "Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::hypervisor"
}
}
},
{
"category": "product_name",
"name": "RHEL 7-based RHEV-H for RHEV 4.2 (build requirements)",
"product": {
"name": "RHEL 7-based RHEV-H for RHEV 4.2 (build requirements)",
"product_id": "7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::hypervisor"
}
}
},
{
"category": "product_name",
"name": "RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
"product": {
"name": "RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "7Server-RHEV-4-HypervisorBuild-7",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::hypervisor"
}
}
},
{
"category": "product_name",
"name": "Red Hat Virtualization 4 Hypervisor for RHEL 7",
"product": {
"name": "Red Hat Virtualization 4 Hypervisor for RHEL 7",
"product_id": "7Server-RHEV-4-Hypervisor-7",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::hypervisor"
}
}
}
],
"category": "product_family",
"name": "Red Hat Virtualization"
},
{
"branches": [
{
"category": "product_version",
"name": "redhat-release-virtualization-host-0:4.2-16.1.el7.x86_64",
"product": {
"name": "redhat-release-virtualization-host-0:4.2-16.1.el7.x86_64",
"product_id": "redhat-release-virtualization-host-0:4.2-16.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-release-virtualization-host@4.2-16.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "redhat-release-virtualization-host-content-0:4.2-16.1.el7.x86_64",
"product": {
"name": "redhat-release-virtualization-host-content-0:4.2-16.1.el7.x86_64",
"product_id": "redhat-release-virtualization-host-content-0:4.2-16.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-release-virtualization-host-content@4.2-16.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "redhat-release-virtualization-host-0:4.3.6-5.el7ev.x86_64",
"product": {
"name": "redhat-release-virtualization-host-0:4.3.6-5.el7ev.x86_64",
"product_id": "redhat-release-virtualization-host-0:4.3.6-5.el7ev.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-release-virtualization-host@4.3.6-5.el7ev?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "redhat-release-virtualization-host-0:4.2-16.1.el7.src",
"product": {
"name": "redhat-release-virtualization-host-0:4.2-16.1.el7.src",
"product_id": "redhat-release-virtualization-host-0:4.2-16.1.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-release-virtualization-host@4.2-16.1.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "redhat-virtualization-host-0:4.2-20191107.0.el7_6.src",
"product": {
"name": "redhat-virtualization-host-0:4.2-20191107.0.el7_6.src",
"product_id": "redhat-virtualization-host-0:4.2-20191107.0.el7_6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-virtualization-host@4.2-20191107.0.el7_6?arch=src"
}
}
},
{
"category": "product_version",
"name": "redhat-release-virtualization-host-0:4.3.6-5.el7ev.src",
"product": {
"name": "redhat-release-virtualization-host-0:4.3.6-5.el7ev.src",
"product_id": "redhat-release-virtualization-host-0:4.3.6-5.el7ev.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-release-virtualization-host@4.3.6-5.el7ev?arch=src"
}
}
},
{
"category": "product_version",
"name": "redhat-virtualization-host-0:4.3.6-20191108.0.el7_7.src",
"product": {
"name": "redhat-virtualization-host-0:4.3.6-20191108.0.el7_7.src",
"product_id": "redhat-virtualization-host-0:4.3.6-20191108.0.el7_7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-virtualization-host@4.3.6-20191108.0.el7_7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "redhat-virtualization-host-image-update-placeholder-0:4.2-16.1.el7.noarch",
"product": {
"name": "redhat-virtualization-host-image-update-placeholder-0:4.2-16.1.el7.noarch",
"product_id": "redhat-virtualization-host-image-update-placeholder-0:4.2-16.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-virtualization-host-image-update-placeholder@4.2-16.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "redhat-virtualization-host-image-update-0:4.2-20191107.0.el7_6.noarch",
"product": {
"name": "redhat-virtualization-host-image-update-0:4.2-20191107.0.el7_6.noarch",
"product_id": "redhat-virtualization-host-image-update-0:4.2-20191107.0.el7_6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-virtualization-host-image-update@4.2-20191107.0.el7_6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "redhat-virtualization-host-image-update-placeholder-0:4.3.6-5.el7ev.noarch",
"product": {
"name": "redhat-virtualization-host-image-update-placeholder-0:4.3.6-5.el7ev.noarch",
"product_id": "redhat-virtualization-host-image-update-placeholder-0:4.3.6-5.el7ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-virtualization-host-image-update-placeholder@4.3.6-5.el7ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "redhat-virtualization-host-image-update-0:4.3.6-20191108.0.el7_7.noarch",
"product": {
"name": "redhat-virtualization-host-image-update-0:4.3.6-20191108.0.el7_7.noarch",
"product_id": "redhat-virtualization-host-image-update-0:4.3.6-20191108.0.el7_7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-virtualization-host-image-update@4.3.6-20191108.0.el7_7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-virtualization-host-0:4.2-16.1.el7.src as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-0:4.2-16.1.el7.src"
},
"product_reference": "redhat-release-virtualization-host-0:4.2-16.1.el7.src",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-virtualization-host-0:4.2-16.1.el7.x86_64 as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-0:4.2-16.1.el7.x86_64"
},
"product_reference": "redhat-release-virtualization-host-0:4.2-16.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-virtualization-host-content-0:4.2-16.1.el7.x86_64 as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-content-0:4.2-16.1.el7.x86_64"
},
"product_reference": "redhat-release-virtualization-host-content-0:4.2-16.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-0:4.2-20191107.0.el7_6.src as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-0:4.2-20191107.0.el7_6.src"
},
"product_reference": "redhat-virtualization-host-0:4.2-20191107.0.el7_6.src",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-image-update-0:4.2-20191107.0.el7_6.noarch as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-image-update-0:4.2-20191107.0.el7_6.noarch"
},
"product_reference": "redhat-virtualization-host-image-update-0:4.2-20191107.0.el7_6.noarch",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-image-update-placeholder-0:4.2-16.1.el7.noarch as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-image-update-placeholder-0:4.2-16.1.el7.noarch"
},
"product_reference": "redhat-virtualization-host-image-update-placeholder-0:4.2-16.1.el7.noarch",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-virtualization-host-0:4.2-16.1.el7.src as a component of RHEL 7-based RHEV-H for RHEV 4.2 (build requirements)",
"product_id": "7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-0:4.2-16.1.el7.src"
},
"product_reference": "redhat-release-virtualization-host-0:4.2-16.1.el7.src",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-virtualization-host-0:4.2-16.1.el7.x86_64 as a component of RHEL 7-based RHEV-H for RHEV 4.2 (build requirements)",
"product_id": "7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-0:4.2-16.1.el7.x86_64"
},
"product_reference": "redhat-release-virtualization-host-0:4.2-16.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-virtualization-host-content-0:4.2-16.1.el7.x86_64 as a component of RHEL 7-based RHEV-H for RHEV 4.2 (build requirements)",
"product_id": "7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-content-0:4.2-16.1.el7.x86_64"
},
"product_reference": "redhat-release-virtualization-host-content-0:4.2-16.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-image-update-placeholder-0:4.2-16.1.el7.noarch as a component of RHEL 7-based RHEV-H for RHEV 4.2 (build requirements)",
"product_id": "7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-virtualization-host-image-update-placeholder-0:4.2-16.1.el7.noarch"
},
"product_reference": "redhat-virtualization-host-image-update-placeholder-0:4.2-16.1.el7.noarch",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-0:4.3.6-20191108.0.el7_7.src as a component of Red Hat Virtualization 4 Hypervisor for RHEL 7",
"product_id": "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.6-20191108.0.el7_7.src"
},
"product_reference": "redhat-virtualization-host-0:4.3.6-20191108.0.el7_7.src",
"relates_to_product_reference": "7Server-RHEV-4-Hypervisor-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-image-update-0:4.3.6-20191108.0.el7_7.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 7",
"product_id": "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.6-20191108.0.el7_7.noarch"
},
"product_reference": "redhat-virtualization-host-image-update-0:4.3.6-20191108.0.el7_7.noarch",
"relates_to_product_reference": "7Server-RHEV-4-Hypervisor-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-virtualization-host-0:4.3.6-5.el7ev.src as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.6-5.el7ev.src"
},
"product_reference": "redhat-release-virtualization-host-0:4.3.6-5.el7ev.src",
"relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-virtualization-host-0:4.3.6-5.el7ev.x86_64 as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.6-5.el7ev.x86_64"
},
"product_reference": "redhat-release-virtualization-host-0:4.3.6-5.el7ev.x86_64",
"relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-0:4.3.6-20191108.0.el7_7.src as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.6-20191108.0.el7_7.src"
},
"product_reference": "redhat-virtualization-host-0:4.3.6-20191108.0.el7_7.src",
"relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-image-update-0:4.3.6-20191108.0.el7_7.noarch as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.6-20191108.0.el7_7.noarch"
},
"product_reference": "redhat-virtualization-host-image-update-0:4.3.6-20191108.0.el7_7.noarch",
"relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-image-update-placeholder-0:4.3.6-5.el7ev.noarch as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.6-5.el7ev.noarch"
},
"product_reference": "redhat-virtualization-host-image-update-placeholder-0:4.3.6-5.el7ev.noarch",
"relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Intel"
]
},
{
"names": [
"Deepak Gupta"
],
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2018-12207",
"cwe": {
"id": "CWE-226",
"name": "Sensitive Information in Resource Not Removed Before Reuse"
},
"discovery_date": "2018-11-06T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-0:4.2-16.1.el7.src",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-0:4.2-16.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-content-0:4.2-16.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-image-update-placeholder-0:4.2-16.1.el7.noarch",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-0:4.2-16.1.el7.src",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-0:4.2-16.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-content-0:4.2-16.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-virtualization-host-image-update-placeholder-0:4.2-16.1.el7.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.6-5.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.6-5.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.6-5.el7ev.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1646768"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way Intel CPUs handle inconsistency between, virtual to physical memory address translations in CPU\u0027s local cache and system software\u0027s Paging structure entries. A privileged guest user may use this flaw to induce a hardware Machine Check Error on the host processor, resulting in a severe DoS scenario by halting the processor.\r\n\r\nSystem software like OS OR Virtual Machine Monitor (VMM) use virtual memory system for storing program instructions and data in memory. Virtual Memory system uses Paging structures like Page Tables and Page Directories to manage system memory. The processor\u0027s Memory Management Unit (MMU) uses Paging structure entries to translate program\u0027s virtual memory addresses to physical memory addresses. The processor stores these address translations into its local cache buffer called - Translation Lookaside Buffer (TLB). TLB has two parts, one for instructions and other for data addresses.\r\n\r\nSystem software can modify its Paging structure entries to change address mappings OR certain attributes like page size etc. Upon such Paging structure alterations in memory, system software must invalidate the corresponding address translations in the processor\u0027s TLB cache. But before this TLB invalidation takes place, a privileged guest user may trigger an instruction fetch operation, which could use an already cached, but now invalid, virtual to physical address translation from Instruction TLB (ITLB). Thus accessing an invalid physical memory address and resulting in halting the processor due to the Machine Check Error (MCE) on Page Size Change.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: Machine Check Error on Page Size Change (IFU)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-0:4.2-20191107.0.el7_6.src",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-image-update-0:4.2-20191107.0.el7_6.noarch",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.6-20191108.0.el7_7.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.6-20191108.0.el7_7.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.6-20191108.0.el7_7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.6-20191108.0.el7_7.noarch"
],
"known_not_affected": [
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-0:4.2-16.1.el7.src",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-0:4.2-16.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-content-0:4.2-16.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-image-update-placeholder-0:4.2-16.1.el7.noarch",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-0:4.2-16.1.el7.src",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-0:4.2-16.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-content-0:4.2-16.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-virtualization-host-image-update-placeholder-0:4.2-16.1.el7.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.6-5.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.6-5.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.6-5.el7ev.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-12207"
},
{
"category": "external",
"summary": "RHBZ#1646768",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646768"
},
{
"category": "external",
"summary": "RHSB-ifu-page-mce",
"url": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-12207",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12207"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-12207",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12207"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-11-12T20:11:55+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-0:4.2-20191107.0.el7_6.src",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-image-update-0:4.2-20191107.0.el7_6.noarch",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.6-20191108.0.el7_7.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.6-20191108.0.el7_7.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.6-20191108.0.el7_7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.6-20191108.0.el7_7.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:3860"
},
{
"category": "workaround",
"details": "For mitigation related information, please refer to the Red Hat vulnerability article: https://access.redhat.com/security/vulnerabilities/ifu-page-mce .",
"product_ids": [
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-0:4.2-16.1.el7.src",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-0:4.2-16.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-content-0:4.2-16.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-0:4.2-20191107.0.el7_6.src",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-image-update-0:4.2-20191107.0.el7_6.noarch",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-image-update-placeholder-0:4.2-16.1.el7.noarch",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-0:4.2-16.1.el7.src",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-0:4.2-16.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-content-0:4.2-16.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-virtualization-host-image-update-placeholder-0:4.2-16.1.el7.noarch",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.6-20191108.0.el7_7.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.6-20191108.0.el7_7.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.6-5.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.6-5.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.6-20191108.0.el7_7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.6-20191108.0.el7_7.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.6-5.el7ev.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-0:4.2-16.1.el7.src",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-0:4.2-16.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-content-0:4.2-16.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-0:4.2-20191107.0.el7_6.src",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-image-update-0:4.2-20191107.0.el7_6.noarch",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-image-update-placeholder-0:4.2-16.1.el7.noarch",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-0:4.2-16.1.el7.src",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-0:4.2-16.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-content-0:4.2-16.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-virtualization-host-image-update-placeholder-0:4.2-16.1.el7.noarch",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.6-20191108.0.el7_7.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.6-20191108.0.el7_7.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.6-5.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.6-5.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.6-20191108.0.el7_7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.6-20191108.0.el7_7.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.6-5.el7ev.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: Machine Check Error on Page Size Change (IFU)"
},
{
"acknowledgments": [
{
"names": [
"Intel"
]
}
],
"cve": "CVE-2019-11135",
"cwe": {
"id": "CWE-203",
"name": "Observable Discrepancy"
},
"discovery_date": "2019-09-18T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-0:4.2-16.1.el7.src",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-0:4.2-16.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-content-0:4.2-16.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-image-update-placeholder-0:4.2-16.1.el7.noarch",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-0:4.2-16.1.el7.src",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-0:4.2-16.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-content-0:4.2-16.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-virtualization-host-image-update-placeholder-0:4.2-16.1.el7.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.6-5.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.6-5.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.6-5.el7ev.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1753062"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way Intel CPUs handle speculative execution of instructions when the TSX Asynchronous Abort (TAA) error occurs. A local authenticated attacker with the ability to monitor execution times could infer the TSX memory state by comparing abort execution times. This could allow information disclosure via this observed side-channel for any TSX transaction being executed while an attacker is able to observe abort timing.\r\n\r\nIntel\u0027s Transactional Synchronisation Extensions (TSX) are set of instructions which enable transactional memory support to improve performance of the multi-threaded applications, in the lock-protected critical sections. The CPU executes instructions in the critical-sections as transactions, while ensuring their atomic state. When such transaction execution is unsuccessful, the processor cannot ensure atomic updates to the transaction memory, so the processor rolls back or aborts such transaction execution.\r\n\r\nWhile TSX Asynchronous Abort (TAA) is pending, CPU may continue to read data from architectural buffers and pass it to the dependent speculative operations. This may cause information leakage via speculative side-channel means, which is quite similar to the Microarchitectural Data Sampling (MDS) issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: TSX Transaction Asynchronous Abort (TAA)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "libvirt and qemu-kvm on Red Hat Enterprise Linux 6 are not affected by this vulnerability as they do not support MSR-based CPU features.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-0:4.2-20191107.0.el7_6.src",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-image-update-0:4.2-20191107.0.el7_6.noarch",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.6-20191108.0.el7_7.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.6-20191108.0.el7_7.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.6-20191108.0.el7_7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.6-20191108.0.el7_7.noarch"
],
"known_not_affected": [
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-0:4.2-16.1.el7.src",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-0:4.2-16.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-content-0:4.2-16.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-image-update-placeholder-0:4.2-16.1.el7.noarch",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-0:4.2-16.1.el7.src",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-0:4.2-16.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-content-0:4.2-16.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-virtualization-host-image-update-placeholder-0:4.2-16.1.el7.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.6-5.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.6-5.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.6-5.el7ev.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11135"
},
{
"category": "external",
"summary": "RHBZ#1753062",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753062"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11135",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11135"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11135",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11135"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/tsx-asynchronousabort",
"url": "https://access.redhat.com/solutions/tsx-asynchronousabort"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00270.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00270.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-11-12T20:11:55+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-0:4.2-20191107.0.el7_6.src",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-image-update-0:4.2-20191107.0.el7_6.noarch",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.6-20191108.0.el7_7.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.6-20191108.0.el7_7.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.6-20191108.0.el7_7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.6-20191108.0.el7_7.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:3860"
},
{
"category": "workaround",
"details": "For mitigation related information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/solutions/tsx-asynchronousabort",
"product_ids": [
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-0:4.2-16.1.el7.src",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-0:4.2-16.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-content-0:4.2-16.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-0:4.2-20191107.0.el7_6.src",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-image-update-0:4.2-20191107.0.el7_6.noarch",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-image-update-placeholder-0:4.2-16.1.el7.noarch",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-0:4.2-16.1.el7.src",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-0:4.2-16.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-content-0:4.2-16.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-virtualization-host-image-update-placeholder-0:4.2-16.1.el7.noarch",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.6-20191108.0.el7_7.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.6-20191108.0.el7_7.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.6-5.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.6-5.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.6-20191108.0.el7_7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.6-20191108.0.el7_7.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.6-5.el7ev.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-0:4.2-16.1.el7.src",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-0:4.2-16.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-content-0:4.2-16.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-0:4.2-20191107.0.el7_6.src",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-image-update-0:4.2-20191107.0.el7_6.noarch",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-image-update-placeholder-0:4.2-16.1.el7.noarch",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-0:4.2-16.1.el7.src",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-0:4.2-16.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-content-0:4.2-16.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-virtualization-host-image-update-placeholder-0:4.2-16.1.el7.noarch",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.6-20191108.0.el7_7.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.6-20191108.0.el7_7.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.6-5.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.6-5.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.6-20191108.0.el7_7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.6-20191108.0.el7_7.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.6-5.el7ev.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: TSX Transaction Asynchronous Abort (TAA)"
}
]
}
RHSA-2019:3860
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for redhat-release-virtualization-host and redhat-virtualization-host is now available for Red Hat Virtualization 4 for Red Hat Enterprise Linux 7 and Red Hat Virtualization 4.2 for Red Hat Enterprise Linux 7.6 EUS.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The redhat-virtualization-host packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts (RHVH) are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host\u0027s resources and performing administrative tasks. \n\nThe ovirt-node-ng packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts (RHVH) are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host\u0027s resources and performing administrative tasks.\n\nSecurity Fix(es):\n\n* hw: Machine Check Error on Page Size Change (IFU) (CVE-2018-12207)\n\n* hw: TSX Transaction Asynchronous Abort (TAA) (CVE-2019-11135)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2019:3860",
"url": "https://access.redhat.com/errata/RHSA-2019:3860"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce",
"url": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/tsx-asynchronousabort",
"url": "https://access.redhat.com/solutions/tsx-asynchronousabort"
},
{
"category": "external",
"summary": "1646768",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646768"
},
{
"category": "external",
"summary": "1753062",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753062"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_3860.json"
}
],
"title": "Red Hat Security Advisory: redhat-release-virtualization-host and redhat-virtualization-host update",
"tracking": {
"current_release_date": "2025-10-09T18:15:56+00:00",
"generator": {
"date": "2025-10-09T18:15:56+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2019:3860",
"initial_release_date": "2019-11-12T20:11:55+00:00",
"revision_history": [
{
"date": "2019-11-12T20:11:55+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2019-11-12T20:11:55+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T18:15:56+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product": {
"name": "Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::hypervisor"
}
}
},
{
"category": "product_name",
"name": "RHEL 7-based RHEV-H for RHEV 4.2 (build requirements)",
"product": {
"name": "RHEL 7-based RHEV-H for RHEV 4.2 (build requirements)",
"product_id": "7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::hypervisor"
}
}
},
{
"category": "product_name",
"name": "RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
"product": {
"name": "RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "7Server-RHEV-4-HypervisorBuild-7",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::hypervisor"
}
}
},
{
"category": "product_name",
"name": "Red Hat Virtualization 4 Hypervisor for RHEL 7",
"product": {
"name": "Red Hat Virtualization 4 Hypervisor for RHEL 7",
"product_id": "7Server-RHEV-4-Hypervisor-7",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::hypervisor"
}
}
}
],
"category": "product_family",
"name": "Red Hat Virtualization"
},
{
"branches": [
{
"category": "product_version",
"name": "redhat-release-virtualization-host-0:4.2-16.1.el7.x86_64",
"product": {
"name": "redhat-release-virtualization-host-0:4.2-16.1.el7.x86_64",
"product_id": "redhat-release-virtualization-host-0:4.2-16.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-release-virtualization-host@4.2-16.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "redhat-release-virtualization-host-content-0:4.2-16.1.el7.x86_64",
"product": {
"name": "redhat-release-virtualization-host-content-0:4.2-16.1.el7.x86_64",
"product_id": "redhat-release-virtualization-host-content-0:4.2-16.1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-release-virtualization-host-content@4.2-16.1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "redhat-release-virtualization-host-0:4.3.6-5.el7ev.x86_64",
"product": {
"name": "redhat-release-virtualization-host-0:4.3.6-5.el7ev.x86_64",
"product_id": "redhat-release-virtualization-host-0:4.3.6-5.el7ev.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-release-virtualization-host@4.3.6-5.el7ev?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "redhat-release-virtualization-host-0:4.2-16.1.el7.src",
"product": {
"name": "redhat-release-virtualization-host-0:4.2-16.1.el7.src",
"product_id": "redhat-release-virtualization-host-0:4.2-16.1.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-release-virtualization-host@4.2-16.1.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "redhat-virtualization-host-0:4.2-20191107.0.el7_6.src",
"product": {
"name": "redhat-virtualization-host-0:4.2-20191107.0.el7_6.src",
"product_id": "redhat-virtualization-host-0:4.2-20191107.0.el7_6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-virtualization-host@4.2-20191107.0.el7_6?arch=src"
}
}
},
{
"category": "product_version",
"name": "redhat-release-virtualization-host-0:4.3.6-5.el7ev.src",
"product": {
"name": "redhat-release-virtualization-host-0:4.3.6-5.el7ev.src",
"product_id": "redhat-release-virtualization-host-0:4.3.6-5.el7ev.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-release-virtualization-host@4.3.6-5.el7ev?arch=src"
}
}
},
{
"category": "product_version",
"name": "redhat-virtualization-host-0:4.3.6-20191108.0.el7_7.src",
"product": {
"name": "redhat-virtualization-host-0:4.3.6-20191108.0.el7_7.src",
"product_id": "redhat-virtualization-host-0:4.3.6-20191108.0.el7_7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-virtualization-host@4.3.6-20191108.0.el7_7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "redhat-virtualization-host-image-update-placeholder-0:4.2-16.1.el7.noarch",
"product": {
"name": "redhat-virtualization-host-image-update-placeholder-0:4.2-16.1.el7.noarch",
"product_id": "redhat-virtualization-host-image-update-placeholder-0:4.2-16.1.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-virtualization-host-image-update-placeholder@4.2-16.1.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "redhat-virtualization-host-image-update-0:4.2-20191107.0.el7_6.noarch",
"product": {
"name": "redhat-virtualization-host-image-update-0:4.2-20191107.0.el7_6.noarch",
"product_id": "redhat-virtualization-host-image-update-0:4.2-20191107.0.el7_6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-virtualization-host-image-update@4.2-20191107.0.el7_6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "redhat-virtualization-host-image-update-placeholder-0:4.3.6-5.el7ev.noarch",
"product": {
"name": "redhat-virtualization-host-image-update-placeholder-0:4.3.6-5.el7ev.noarch",
"product_id": "redhat-virtualization-host-image-update-placeholder-0:4.3.6-5.el7ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-virtualization-host-image-update-placeholder@4.3.6-5.el7ev?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "redhat-virtualization-host-image-update-0:4.3.6-20191108.0.el7_7.noarch",
"product": {
"name": "redhat-virtualization-host-image-update-0:4.3.6-20191108.0.el7_7.noarch",
"product_id": "redhat-virtualization-host-image-update-0:4.3.6-20191108.0.el7_7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redhat-virtualization-host-image-update@4.3.6-20191108.0.el7_7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-virtualization-host-0:4.2-16.1.el7.src as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-0:4.2-16.1.el7.src"
},
"product_reference": "redhat-release-virtualization-host-0:4.2-16.1.el7.src",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-virtualization-host-0:4.2-16.1.el7.x86_64 as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-0:4.2-16.1.el7.x86_64"
},
"product_reference": "redhat-release-virtualization-host-0:4.2-16.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-virtualization-host-content-0:4.2-16.1.el7.x86_64 as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-content-0:4.2-16.1.el7.x86_64"
},
"product_reference": "redhat-release-virtualization-host-content-0:4.2-16.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-0:4.2-20191107.0.el7_6.src as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-0:4.2-20191107.0.el7_6.src"
},
"product_reference": "redhat-virtualization-host-0:4.2-20191107.0.el7_6.src",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-image-update-0:4.2-20191107.0.el7_6.noarch as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-image-update-0:4.2-20191107.0.el7_6.noarch"
},
"product_reference": "redhat-virtualization-host-image-update-0:4.2-20191107.0.el7_6.noarch",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-image-update-placeholder-0:4.2-16.1.el7.noarch as a component of Red Hat Virtualization 4.2 Hypervisor for RHEL 7.6 EUS",
"product_id": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-image-update-placeholder-0:4.2-16.1.el7.noarch"
},
"product_reference": "redhat-virtualization-host-image-update-placeholder-0:4.2-16.1.el7.noarch",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-Hypervisor-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-virtualization-host-0:4.2-16.1.el7.src as a component of RHEL 7-based RHEV-H for RHEV 4.2 (build requirements)",
"product_id": "7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-0:4.2-16.1.el7.src"
},
"product_reference": "redhat-release-virtualization-host-0:4.2-16.1.el7.src",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-virtualization-host-0:4.2-16.1.el7.x86_64 as a component of RHEL 7-based RHEV-H for RHEV 4.2 (build requirements)",
"product_id": "7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-0:4.2-16.1.el7.x86_64"
},
"product_reference": "redhat-release-virtualization-host-0:4.2-16.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-virtualization-host-content-0:4.2-16.1.el7.x86_64 as a component of RHEL 7-based RHEV-H for RHEV 4.2 (build requirements)",
"product_id": "7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-content-0:4.2-16.1.el7.x86_64"
},
"product_reference": "redhat-release-virtualization-host-content-0:4.2-16.1.el7.x86_64",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-image-update-placeholder-0:4.2-16.1.el7.noarch as a component of RHEL 7-based RHEV-H for RHEV 4.2 (build requirements)",
"product_id": "7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-virtualization-host-image-update-placeholder-0:4.2-16.1.el7.noarch"
},
"product_reference": "redhat-virtualization-host-image-update-placeholder-0:4.2-16.1.el7.noarch",
"relates_to_product_reference": "7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-0:4.3.6-20191108.0.el7_7.src as a component of Red Hat Virtualization 4 Hypervisor for RHEL 7",
"product_id": "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.6-20191108.0.el7_7.src"
},
"product_reference": "redhat-virtualization-host-0:4.3.6-20191108.0.el7_7.src",
"relates_to_product_reference": "7Server-RHEV-4-Hypervisor-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-image-update-0:4.3.6-20191108.0.el7_7.noarch as a component of Red Hat Virtualization 4 Hypervisor for RHEL 7",
"product_id": "7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.6-20191108.0.el7_7.noarch"
},
"product_reference": "redhat-virtualization-host-image-update-0:4.3.6-20191108.0.el7_7.noarch",
"relates_to_product_reference": "7Server-RHEV-4-Hypervisor-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-virtualization-host-0:4.3.6-5.el7ev.src as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.6-5.el7ev.src"
},
"product_reference": "redhat-release-virtualization-host-0:4.3.6-5.el7ev.src",
"relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-release-virtualization-host-0:4.3.6-5.el7ev.x86_64 as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.6-5.el7ev.x86_64"
},
"product_reference": "redhat-release-virtualization-host-0:4.3.6-5.el7ev.x86_64",
"relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-0:4.3.6-20191108.0.el7_7.src as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.6-20191108.0.el7_7.src"
},
"product_reference": "redhat-virtualization-host-0:4.3.6-20191108.0.el7_7.src",
"relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-image-update-0:4.3.6-20191108.0.el7_7.noarch as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.6-20191108.0.el7_7.noarch"
},
"product_reference": "redhat-virtualization-host-image-update-0:4.3.6-20191108.0.el7_7.noarch",
"relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redhat-virtualization-host-image-update-placeholder-0:4.3.6-5.el7ev.noarch as a component of RHEL 7-based RHEV-H for RHEV 4 (build requirements)",
"product_id": "7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.6-5.el7ev.noarch"
},
"product_reference": "redhat-virtualization-host-image-update-placeholder-0:4.3.6-5.el7ev.noarch",
"relates_to_product_reference": "7Server-RHEV-4-HypervisorBuild-7"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Intel"
]
},
{
"names": [
"Deepak Gupta"
],
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2018-12207",
"cwe": {
"id": "CWE-226",
"name": "Sensitive Information in Resource Not Removed Before Reuse"
},
"discovery_date": "2018-11-06T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-0:4.2-16.1.el7.src",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-0:4.2-16.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-content-0:4.2-16.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-image-update-placeholder-0:4.2-16.1.el7.noarch",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-0:4.2-16.1.el7.src",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-0:4.2-16.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-content-0:4.2-16.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-virtualization-host-image-update-placeholder-0:4.2-16.1.el7.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.6-5.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.6-5.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.6-5.el7ev.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1646768"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way Intel CPUs handle inconsistency between, virtual to physical memory address translations in CPU\u0027s local cache and system software\u0027s Paging structure entries. A privileged guest user may use this flaw to induce a hardware Machine Check Error on the host processor, resulting in a severe DoS scenario by halting the processor.\r\n\r\nSystem software like OS OR Virtual Machine Monitor (VMM) use virtual memory system for storing program instructions and data in memory. Virtual Memory system uses Paging structures like Page Tables and Page Directories to manage system memory. The processor\u0027s Memory Management Unit (MMU) uses Paging structure entries to translate program\u0027s virtual memory addresses to physical memory addresses. The processor stores these address translations into its local cache buffer called - Translation Lookaside Buffer (TLB). TLB has two parts, one for instructions and other for data addresses.\r\n\r\nSystem software can modify its Paging structure entries to change address mappings OR certain attributes like page size etc. Upon such Paging structure alterations in memory, system software must invalidate the corresponding address translations in the processor\u0027s TLB cache. But before this TLB invalidation takes place, a privileged guest user may trigger an instruction fetch operation, which could use an already cached, but now invalid, virtual to physical address translation from Instruction TLB (ITLB). Thus accessing an invalid physical memory address and resulting in halting the processor due to the Machine Check Error (MCE) on Page Size Change.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: Machine Check Error on Page Size Change (IFU)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-0:4.2-20191107.0.el7_6.src",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-image-update-0:4.2-20191107.0.el7_6.noarch",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.6-20191108.0.el7_7.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.6-20191108.0.el7_7.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.6-20191108.0.el7_7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.6-20191108.0.el7_7.noarch"
],
"known_not_affected": [
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-0:4.2-16.1.el7.src",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-0:4.2-16.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-content-0:4.2-16.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-image-update-placeholder-0:4.2-16.1.el7.noarch",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-0:4.2-16.1.el7.src",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-0:4.2-16.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-content-0:4.2-16.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-virtualization-host-image-update-placeholder-0:4.2-16.1.el7.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.6-5.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.6-5.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.6-5.el7ev.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-12207"
},
{
"category": "external",
"summary": "RHBZ#1646768",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646768"
},
{
"category": "external",
"summary": "RHSB-ifu-page-mce",
"url": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-12207",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12207"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-12207",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12207"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-11-12T20:11:55+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-0:4.2-20191107.0.el7_6.src",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-image-update-0:4.2-20191107.0.el7_6.noarch",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.6-20191108.0.el7_7.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.6-20191108.0.el7_7.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.6-20191108.0.el7_7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.6-20191108.0.el7_7.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:3860"
},
{
"category": "workaround",
"details": "For mitigation related information, please refer to the Red Hat vulnerability article: https://access.redhat.com/security/vulnerabilities/ifu-page-mce .",
"product_ids": [
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-0:4.2-16.1.el7.src",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-0:4.2-16.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-content-0:4.2-16.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-0:4.2-20191107.0.el7_6.src",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-image-update-0:4.2-20191107.0.el7_6.noarch",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-image-update-placeholder-0:4.2-16.1.el7.noarch",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-0:4.2-16.1.el7.src",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-0:4.2-16.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-content-0:4.2-16.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-virtualization-host-image-update-placeholder-0:4.2-16.1.el7.noarch",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.6-20191108.0.el7_7.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.6-20191108.0.el7_7.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.6-5.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.6-5.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.6-20191108.0.el7_7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.6-20191108.0.el7_7.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.6-5.el7ev.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-0:4.2-16.1.el7.src",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-0:4.2-16.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-content-0:4.2-16.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-0:4.2-20191107.0.el7_6.src",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-image-update-0:4.2-20191107.0.el7_6.noarch",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-image-update-placeholder-0:4.2-16.1.el7.noarch",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-0:4.2-16.1.el7.src",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-0:4.2-16.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-content-0:4.2-16.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-virtualization-host-image-update-placeholder-0:4.2-16.1.el7.noarch",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.6-20191108.0.el7_7.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.6-20191108.0.el7_7.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.6-5.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.6-5.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.6-20191108.0.el7_7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.6-20191108.0.el7_7.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.6-5.el7ev.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: Machine Check Error on Page Size Change (IFU)"
},
{
"acknowledgments": [
{
"names": [
"Intel"
]
}
],
"cve": "CVE-2019-11135",
"cwe": {
"id": "CWE-203",
"name": "Observable Discrepancy"
},
"discovery_date": "2019-09-18T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-0:4.2-16.1.el7.src",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-0:4.2-16.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-content-0:4.2-16.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-image-update-placeholder-0:4.2-16.1.el7.noarch",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-0:4.2-16.1.el7.src",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-0:4.2-16.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-content-0:4.2-16.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-virtualization-host-image-update-placeholder-0:4.2-16.1.el7.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.6-5.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.6-5.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.6-5.el7ev.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1753062"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way Intel CPUs handle speculative execution of instructions when the TSX Asynchronous Abort (TAA) error occurs. A local authenticated attacker with the ability to monitor execution times could infer the TSX memory state by comparing abort execution times. This could allow information disclosure via this observed side-channel for any TSX transaction being executed while an attacker is able to observe abort timing.\r\n\r\nIntel\u0027s Transactional Synchronisation Extensions (TSX) are set of instructions which enable transactional memory support to improve performance of the multi-threaded applications, in the lock-protected critical sections. The CPU executes instructions in the critical-sections as transactions, while ensuring their atomic state. When such transaction execution is unsuccessful, the processor cannot ensure atomic updates to the transaction memory, so the processor rolls back or aborts such transaction execution.\r\n\r\nWhile TSX Asynchronous Abort (TAA) is pending, CPU may continue to read data from architectural buffers and pass it to the dependent speculative operations. This may cause information leakage via speculative side-channel means, which is quite similar to the Microarchitectural Data Sampling (MDS) issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: TSX Transaction Asynchronous Abort (TAA)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "libvirt and qemu-kvm on Red Hat Enterprise Linux 6 are not affected by this vulnerability as they do not support MSR-based CPU features.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-0:4.2-20191107.0.el7_6.src",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-image-update-0:4.2-20191107.0.el7_6.noarch",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.6-20191108.0.el7_7.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.6-20191108.0.el7_7.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.6-20191108.0.el7_7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.6-20191108.0.el7_7.noarch"
],
"known_not_affected": [
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-0:4.2-16.1.el7.src",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-0:4.2-16.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-content-0:4.2-16.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-image-update-placeholder-0:4.2-16.1.el7.noarch",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-0:4.2-16.1.el7.src",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-0:4.2-16.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-content-0:4.2-16.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-virtualization-host-image-update-placeholder-0:4.2-16.1.el7.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.6-5.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.6-5.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.6-5.el7ev.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11135"
},
{
"category": "external",
"summary": "RHBZ#1753062",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753062"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11135",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11135"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11135",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11135"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/tsx-asynchronousabort",
"url": "https://access.redhat.com/solutions/tsx-asynchronousabort"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00270.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00270.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-11-12T20:11:55+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/2974891",
"product_ids": [
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-0:4.2-20191107.0.el7_6.src",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-image-update-0:4.2-20191107.0.el7_6.noarch",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.6-20191108.0.el7_7.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.6-20191108.0.el7_7.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.6-20191108.0.el7_7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.6-20191108.0.el7_7.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:3860"
},
{
"category": "workaround",
"details": "For mitigation related information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/solutions/tsx-asynchronousabort",
"product_ids": [
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-0:4.2-16.1.el7.src",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-0:4.2-16.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-content-0:4.2-16.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-0:4.2-20191107.0.el7_6.src",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-image-update-0:4.2-20191107.0.el7_6.noarch",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-image-update-placeholder-0:4.2-16.1.el7.noarch",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-0:4.2-16.1.el7.src",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-0:4.2-16.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-content-0:4.2-16.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-virtualization-host-image-update-placeholder-0:4.2-16.1.el7.noarch",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.6-20191108.0.el7_7.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.6-20191108.0.el7_7.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.6-5.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.6-5.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.6-20191108.0.el7_7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.6-20191108.0.el7_7.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.6-5.el7ev.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-0:4.2-16.1.el7.src",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-0:4.2-16.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-release-virtualization-host-content-0:4.2-16.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-0:4.2-20191107.0.el7_6.src",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-image-update-0:4.2-20191107.0.el7_6.noarch",
"7Server-7.6.EUS-RHV-4.2-Hypervisor-eus:redhat-virtualization-host-image-update-placeholder-0:4.2-16.1.el7.noarch",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-0:4.2-16.1.el7.src",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-0:4.2-16.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-release-virtualization-host-content-0:4.2-16.1.el7.x86_64",
"7Server-7.6.EUS-RHV-4.2-HypervisorBuild-eus:redhat-virtualization-host-image-update-placeholder-0:4.2-16.1.el7.noarch",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-0:4.3.6-20191108.0.el7_7.src",
"7Server-RHEV-4-Hypervisor-7:redhat-virtualization-host-image-update-0:4.3.6-20191108.0.el7_7.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.6-5.el7ev.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-release-virtualization-host-0:4.3.6-5.el7ev.x86_64",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-0:4.3.6-20191108.0.el7_7.src",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-0:4.3.6-20191108.0.el7_7.noarch",
"7Server-RHEV-4-HypervisorBuild-7:redhat-virtualization-host-image-update-placeholder-0:4.3.6-5.el7ev.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: TSX Transaction Asynchronous Abort (TAA)"
}
]
}
rhsa-2019:3842
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 6.6 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* hw: Machine Check Error on Page Size Change (IFU) (CVE-2018-12207)\n\n* hw: TSX Transaction Asynchronous Abort (TAA) (CVE-2019-11135)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2019:3842",
"url": "https://access.redhat.com/errata/RHSA-2019:3842"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce",
"url": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/tsx-asynchronousabort",
"url": "https://access.redhat.com/solutions/tsx-asynchronousabort"
},
{
"category": "external",
"summary": "1646768",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646768"
},
{
"category": "external",
"summary": "1753062",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753062"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_3842.json"
}
],
"title": "Red Hat Security Advisory: kernel security update",
"tracking": {
"current_release_date": "2025-10-09T18:15:56+00:00",
"generator": {
"date": "2025-10-09T18:15:56+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2019:3842",
"initial_release_date": "2019-11-12T21:11:25+00:00",
"revision_history": [
{
"date": "2019-11-12T21:11:25+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2019-11-12T21:11:25+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T18:15:56+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product": {
"name": "Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:6.6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:6.6::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "python-perf-0:2.6.32-504.81.3.el6.x86_64",
"product": {
"name": "python-perf-0:2.6.32-504.81.3.el6.x86_64",
"product_id": "python-perf-0:2.6.32-504.81.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@2.6.32-504.81.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"product_id": "kernel-debug-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-504.81.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"product": {
"name": "kernel-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"product_id": "kernel-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-504.81.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-504.81.3.el6.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-504.81.3.el6.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:2.6.32-504.81.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@2.6.32-504.81.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"product": {
"name": "perf-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"product_id": "perf-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-504.81.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"product": {
"name": "python-perf-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"product_id": "python-perf-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-504.81.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.32-504.81.3.el6.x86_64",
"product": {
"name": "kernel-0:2.6.32-504.81.3.el6.x86_64",
"product_id": "kernel-0:2.6.32-504.81.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-504.81.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:2.6.32-504.81.3.el6.x86_64",
"product": {
"name": "kernel-debug-0:2.6.32-504.81.3.el6.x86_64",
"product_id": "kernel-debug-0:2.6.32-504.81.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@2.6.32-504.81.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:2.6.32-504.81.3.el6.x86_64",
"product": {
"name": "kernel-debug-devel-0:2.6.32-504.81.3.el6.x86_64",
"product_id": "kernel-debug-devel-0:2.6.32-504.81.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-504.81.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.32-504.81.3.el6.x86_64",
"product": {
"name": "kernel-devel-0:2.6.32-504.81.3.el6.x86_64",
"product_id": "kernel-devel-0:2.6.32-504.81.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.32-504.81.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.32-504.81.3.el6.x86_64",
"product": {
"name": "kernel-headers-0:2.6.32-504.81.3.el6.x86_64",
"product_id": "kernel-headers-0:2.6.32-504.81.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.32-504.81.3.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:2.6.32-504.81.3.el6.x86_64",
"product": {
"name": "perf-0:2.6.32-504.81.3.el6.x86_64",
"product_id": "perf-0:2.6.32-504.81.3.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@2.6.32-504.81.3.el6?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.32-504.81.3.el6.src",
"product": {
"name": "kernel-0:2.6.32-504.81.3.el6.src",
"product_id": "kernel-0:2.6.32-504.81.3.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.32-504.81.3.el6?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:2.6.32-504.81.3.el6.noarch",
"product": {
"name": "kernel-abi-whitelists-0:2.6.32-504.81.3.el6.noarch",
"product_id": "kernel-abi-whitelists-0:2.6.32-504.81.3.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@2.6.32-504.81.3.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:2.6.32-504.81.3.el6.noarch",
"product": {
"name": "kernel-doc-0:2.6.32-504.81.3.el6.noarch",
"product_id": "kernel-doc-0:2.6.32-504.81.3.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@2.6.32-504.81.3.el6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-firmware-0:2.6.32-504.81.3.el6.noarch",
"product": {
"name": "kernel-firmware-0:2.6.32-504.81.3.el6.noarch",
"product_id": "kernel-firmware-0:2.6.32-504.81.3.el6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-firmware@2.6.32-504.81.3.el6?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-504.81.3.el6.src as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:kernel-0:2.6.32-504.81.3.el6.src"
},
"product_reference": "kernel-0:2.6.32-504.81.3.el6.src",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-504.81.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:kernel-0:2.6.32-504.81.3.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-504.81.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-504.81.3.el6.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.81.3.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-504.81.3.el6.noarch",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-504.81.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:kernel-debug-0:2.6.32-504.81.3.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-504.81.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-504.81.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.81.3.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-504.81.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.81.3.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-504.81.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-504.81.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.81.3.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-504.81.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.81.3.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-504.81.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-504.81.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:kernel-devel-0:2.6.32-504.81.3.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-504.81.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-504.81.3.el6.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:kernel-doc-0:2.6.32-504.81.3.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-504.81.3.el6.noarch",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-504.81.3.el6.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.81.3.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-504.81.3.el6.noarch",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-504.81.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:kernel-headers-0:2.6.32-504.81.3.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-504.81.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-504.81.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:perf-0:2.6.32-504.81.3.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-504.81.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-504.81.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.81.3.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-504.81.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:python-perf-0:2.6.32-504.81.3.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-504.81.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-504.81.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)",
"product_id": "6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.81.3.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"relates_to_product_reference": "6Server-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-504.81.3.el6.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:kernel-0:2.6.32-504.81.3.el6.src"
},
"product_reference": "kernel-0:2.6.32-504.81.3.el6.src",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.32-504.81.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:kernel-0:2.6.32-504.81.3.el6.x86_64"
},
"product_reference": "kernel-0:2.6.32-504.81.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:2.6.32-504.81.3.el6.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.81.3.el6.noarch"
},
"product_reference": "kernel-abi-whitelists-0:2.6.32-504.81.3.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:2.6.32-504.81.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.81.3.el6.x86_64"
},
"product_reference": "kernel-debug-0:2.6.32-504.81.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:2.6.32-504.81.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.81.3.el6.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:2.6.32-504.81.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.81.3.el6.x86_64"
},
"product_reference": "kernel-debug-devel-0:2.6.32-504.81.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.32-504.81.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.81.3.el6.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:2.6.32-504.81.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.81.3.el6.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-504.81.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.32-504.81.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.81.3.el6.x86_64"
},
"product_reference": "kernel-devel-0:2.6.32-504.81.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.32-504.81.3.el6.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.81.3.el6.noarch"
},
"product_reference": "kernel-doc-0:2.6.32-504.81.3.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-firmware-0:2.6.32-504.81.3.el6.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.81.3.el6.noarch"
},
"product_reference": "kernel-firmware-0:2.6.32-504.81.3.el6.noarch",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.32-504.81.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.81.3.el6.x86_64"
},
"product_reference": "kernel-headers-0:2.6.32-504.81.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:2.6.32-504.81.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:perf-0:2.6.32-504.81.3.el6.x86_64"
},
"product_reference": "perf-0:2.6.32-504.81.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:2.6.32-504.81.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.81.3.el6.x86_64"
},
"product_reference": "perf-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:2.6.32-504.81.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.81.3.el6.x86_64"
},
"product_reference": "python-perf-0:2.6.32-504.81.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:2.6.32-504.81.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)",
"product_id": "6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.81.3.el6.x86_64"
},
"product_reference": "python-perf-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"relates_to_product_reference": "6Server-optional-6.6.AUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Intel"
]
},
{
"names": [
"Deepak Gupta"
],
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2018-12207",
"cwe": {
"id": "CWE-226",
"name": "Sensitive Information in Resource Not Removed Before Reuse"
},
"discovery_date": "2018-11-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1646768"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way Intel CPUs handle inconsistency between, virtual to physical memory address translations in CPU\u0027s local cache and system software\u0027s Paging structure entries. A privileged guest user may use this flaw to induce a hardware Machine Check Error on the host processor, resulting in a severe DoS scenario by halting the processor.\r\n\r\nSystem software like OS OR Virtual Machine Monitor (VMM) use virtual memory system for storing program instructions and data in memory. Virtual Memory system uses Paging structures like Page Tables and Page Directories to manage system memory. The processor\u0027s Memory Management Unit (MMU) uses Paging structure entries to translate program\u0027s virtual memory addresses to physical memory addresses. The processor stores these address translations into its local cache buffer called - Translation Lookaside Buffer (TLB). TLB has two parts, one for instructions and other for data addresses.\r\n\r\nSystem software can modify its Paging structure entries to change address mappings OR certain attributes like page size etc. Upon such Paging structure alterations in memory, system software must invalidate the corresponding address translations in the processor\u0027s TLB cache. But before this TLB invalidation takes place, a privileged guest user may trigger an instruction fetch operation, which could use an already cached, but now invalid, virtual to physical address translation from Instruction TLB (ITLB). Thus accessing an invalid physical memory address and resulting in halting the processor due to the Machine Check Error (MCE) on Page Size Change.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: Machine Check Error on Page Size Change (IFU)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-6.6.AUS:kernel-0:2.6.32-504.81.3.el6.src",
"6Server-6.6.AUS:kernel-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.81.3.el6.noarch",
"6Server-6.6.AUS:kernel-debug-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-devel-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-doc-0:2.6.32-504.81.3.el6.noarch",
"6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.81.3.el6.noarch",
"6Server-6.6.AUS:kernel-headers-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:perf-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:python-perf-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.81.3.el6.src",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.81.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.81.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.81.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:perf-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.81.3.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-12207"
},
{
"category": "external",
"summary": "RHBZ#1646768",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646768"
},
{
"category": "external",
"summary": "RHSB-ifu-page-mce",
"url": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-12207",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12207"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-12207",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12207"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-11-12T21:11:25+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Server-6.6.AUS:kernel-0:2.6.32-504.81.3.el6.src",
"6Server-6.6.AUS:kernel-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.81.3.el6.noarch",
"6Server-6.6.AUS:kernel-debug-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-devel-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-doc-0:2.6.32-504.81.3.el6.noarch",
"6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.81.3.el6.noarch",
"6Server-6.6.AUS:kernel-headers-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:perf-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:python-perf-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.81.3.el6.src",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.81.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.81.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.81.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:perf-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.81.3.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:3842"
},
{
"category": "workaround",
"details": "For mitigation related information, please refer to the Red Hat vulnerability article: https://access.redhat.com/security/vulnerabilities/ifu-page-mce .",
"product_ids": [
"6Server-6.6.AUS:kernel-0:2.6.32-504.81.3.el6.src",
"6Server-6.6.AUS:kernel-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.81.3.el6.noarch",
"6Server-6.6.AUS:kernel-debug-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-devel-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-doc-0:2.6.32-504.81.3.el6.noarch",
"6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.81.3.el6.noarch",
"6Server-6.6.AUS:kernel-headers-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:perf-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:python-perf-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.81.3.el6.src",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.81.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.81.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.81.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:perf-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.81.3.el6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"6Server-6.6.AUS:kernel-0:2.6.32-504.81.3.el6.src",
"6Server-6.6.AUS:kernel-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.81.3.el6.noarch",
"6Server-6.6.AUS:kernel-debug-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-devel-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-doc-0:2.6.32-504.81.3.el6.noarch",
"6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.81.3.el6.noarch",
"6Server-6.6.AUS:kernel-headers-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:perf-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:python-perf-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.81.3.el6.src",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.81.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.81.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.81.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:perf-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.81.3.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: Machine Check Error on Page Size Change (IFU)"
},
{
"acknowledgments": [
{
"names": [
"Intel"
]
}
],
"cve": "CVE-2019-11135",
"cwe": {
"id": "CWE-203",
"name": "Observable Discrepancy"
},
"discovery_date": "2019-09-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1753062"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way Intel CPUs handle speculative execution of instructions when the TSX Asynchronous Abort (TAA) error occurs. A local authenticated attacker with the ability to monitor execution times could infer the TSX memory state by comparing abort execution times. This could allow information disclosure via this observed side-channel for any TSX transaction being executed while an attacker is able to observe abort timing.\r\n\r\nIntel\u0027s Transactional Synchronisation Extensions (TSX) are set of instructions which enable transactional memory support to improve performance of the multi-threaded applications, in the lock-protected critical sections. The CPU executes instructions in the critical-sections as transactions, while ensuring their atomic state. When such transaction execution is unsuccessful, the processor cannot ensure atomic updates to the transaction memory, so the processor rolls back or aborts such transaction execution.\r\n\r\nWhile TSX Asynchronous Abort (TAA) is pending, CPU may continue to read data from architectural buffers and pass it to the dependent speculative operations. This may cause information leakage via speculative side-channel means, which is quite similar to the Microarchitectural Data Sampling (MDS) issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: TSX Transaction Asynchronous Abort (TAA)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "libvirt and qemu-kvm on Red Hat Enterprise Linux 6 are not affected by this vulnerability as they do not support MSR-based CPU features.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-6.6.AUS:kernel-0:2.6.32-504.81.3.el6.src",
"6Server-6.6.AUS:kernel-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.81.3.el6.noarch",
"6Server-6.6.AUS:kernel-debug-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-devel-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-doc-0:2.6.32-504.81.3.el6.noarch",
"6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.81.3.el6.noarch",
"6Server-6.6.AUS:kernel-headers-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:perf-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:python-perf-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.81.3.el6.src",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.81.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.81.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.81.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:perf-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.81.3.el6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11135"
},
{
"category": "external",
"summary": "RHBZ#1753062",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753062"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11135",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11135"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11135",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11135"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/tsx-asynchronousabort",
"url": "https://access.redhat.com/solutions/tsx-asynchronousabort"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00270.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00270.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-11-12T21:11:25+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"6Server-6.6.AUS:kernel-0:2.6.32-504.81.3.el6.src",
"6Server-6.6.AUS:kernel-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.81.3.el6.noarch",
"6Server-6.6.AUS:kernel-debug-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-devel-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-doc-0:2.6.32-504.81.3.el6.noarch",
"6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.81.3.el6.noarch",
"6Server-6.6.AUS:kernel-headers-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:perf-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:python-perf-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.81.3.el6.src",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.81.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.81.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.81.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:perf-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.81.3.el6.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:3842"
},
{
"category": "workaround",
"details": "For mitigation related information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/solutions/tsx-asynchronousabort",
"product_ids": [
"6Server-6.6.AUS:kernel-0:2.6.32-504.81.3.el6.src",
"6Server-6.6.AUS:kernel-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.81.3.el6.noarch",
"6Server-6.6.AUS:kernel-debug-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-devel-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-doc-0:2.6.32-504.81.3.el6.noarch",
"6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.81.3.el6.noarch",
"6Server-6.6.AUS:kernel-headers-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:perf-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:python-perf-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.81.3.el6.src",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.81.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.81.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.81.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:perf-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.81.3.el6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"6Server-6.6.AUS:kernel-0:2.6.32-504.81.3.el6.src",
"6Server-6.6.AUS:kernel-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.81.3.el6.noarch",
"6Server-6.6.AUS:kernel-debug-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-devel-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:kernel-doc-0:2.6.32-504.81.3.el6.noarch",
"6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.81.3.el6.noarch",
"6Server-6.6.AUS:kernel-headers-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:perf-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:python-perf-0:2.6.32-504.81.3.el6.x86_64",
"6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.81.3.el6.src",
"6Server-optional-6.6.AUS:kernel-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.81.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.81.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.81.3.el6.noarch",
"6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:perf-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.81.3.el6.x86_64",
"6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.81.3.el6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: TSX Transaction Asynchronous Abort (TAA)"
}
]
}
rhsa-2019:3838
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 7.5 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* hw: Machine Check Error on Page Size Change (IFU) (CVE-2018-12207)\n\n* hw: TSX Transaction Asynchronous Abort (TAA) (CVE-2019-11135)\n\n* hw: Intel GPU Denial Of Service while accessing MMIO in lower power state (CVE-2019-0154)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2019:3838",
"url": "https://access.redhat.com/errata/RHSA-2019:3838"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce",
"url": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/tsx-asynchronousabort",
"url": "https://access.redhat.com/solutions/tsx-asynchronousabort"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/i915-graphics",
"url": "https://access.redhat.com/solutions/i915-graphics"
},
{
"category": "external",
"summary": "1646768",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646768"
},
{
"category": "external",
"summary": "1724393",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1724393"
},
{
"category": "external",
"summary": "1753062",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753062"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_3838.json"
}
],
"title": "Red Hat Security Advisory: kernel security update",
"tracking": {
"current_release_date": "2025-10-09T18:15:54+00:00",
"generator": {
"date": "2025-10-09T18:15:54+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2019:3838",
"initial_release_date": "2019-11-12T20:51:27+00:00",
"revision_history": [
{
"date": "2019-11-12T20:51:27+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2019-11-12T20:51:27+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T18:15:54+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.5::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.5::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product": {
"name": "Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.5::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:7.5::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-862.43.2.el7.x86_64",
"product": {
"name": "kernel-0:3.10.0-862.43.2.el7.x86_64",
"product_id": "kernel-0:3.10.0-862.43.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-862.43.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"product": {
"name": "kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"product_id": "kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-862.43.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"product_id": "kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-862.43.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"product": {
"name": "kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"product_id": "kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-862.43.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"product": {
"name": "kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"product_id": "kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-862.43.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"product": {
"name": "kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"product_id": "kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-862.43.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"product_id": "kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-862.43.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-862.43.2.el7.x86_64",
"product": {
"name": "perf-0:3.10.0-862.43.2.el7.x86_64",
"product_id": "perf-0:3.10.0-862.43.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-862.43.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-862.43.2.el7.x86_64",
"product": {
"name": "python-perf-0:3.10.0-862.43.2.el7.x86_64",
"product_id": "python-perf-0:3.10.0-862.43.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-862.43.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-862.43.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"product_id": "kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-862.43.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-862.43.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-862.43.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"product": {
"name": "perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"product_id": "perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-862.43.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"product_id": "python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-862.43.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-862.43.2.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-862.43.2.el7.src",
"product": {
"name": "kernel-0:3.10.0-862.43.2.el7.src",
"product_id": "kernel-0:3.10.0-862.43.2.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-862.43.2.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"product": {
"name": "kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"product_id": "kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-862.43.2.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"product": {
"name": "kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"product_id": "kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@3.10.0-862.43.2.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-862.43.2.el7.s390x",
"product": {
"name": "kernel-0:3.10.0-862.43.2.el7.s390x",
"product_id": "kernel-0:3.10.0-862.43.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-862.43.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"product": {
"name": "kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"product_id": "kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-862.43.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"product": {
"name": "kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"product_id": "kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-862.43.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"product": {
"name": "kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"product_id": "kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-862.43.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"product": {
"name": "kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"product_id": "kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-862.43.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"product": {
"name": "kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"product_id": "kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump@3.10.0-862.43.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"product": {
"name": "kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"product_id": "kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-devel@3.10.0-862.43.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-862.43.2.el7.s390x",
"product": {
"name": "perf-0:3.10.0-862.43.2.el7.s390x",
"product_id": "perf-0:3.10.0-862.43.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-862.43.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-862.43.2.el7.s390x",
"product": {
"name": "python-perf-0:3.10.0-862.43.2.el7.s390x",
"product_id": "python-perf-0:3.10.0-862.43.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-862.43.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"product_id": "kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-862.43.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"product": {
"name": "kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"product_id": "kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-862.43.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@3.10.0-862.43.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"product": {
"name": "kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"product_id": "kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@3.10.0-862.43.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"product": {
"name": "perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"product_id": "perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-862.43.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"product_id": "python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-862.43.2.el7?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-862.43.2.el7.ppc64",
"product": {
"name": "kernel-0:3.10.0-862.43.2.el7.ppc64",
"product_id": "kernel-0:3.10.0-862.43.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-862.43.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"product": {
"name": "kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"product_id": "kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-862.43.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"product": {
"name": "kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"product_id": "kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-862.43.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"product_id": "kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-862.43.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"product": {
"name": "kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"product_id": "kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-862.43.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"product": {
"name": "kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"product_id": "kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-862.43.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"product": {
"name": "kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"product_id": "kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-862.43.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"product_id": "kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-862.43.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-862.43.2.el7.ppc64",
"product": {
"name": "perf-0:3.10.0-862.43.2.el7.ppc64",
"product_id": "perf-0:3.10.0-862.43.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-862.43.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-862.43.2.el7.ppc64",
"product": {
"name": "python-perf-0:3.10.0-862.43.2.el7.ppc64",
"product_id": "python-perf-0:3.10.0-862.43.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-862.43.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-862.43.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"product_id": "kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-862.43.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"product": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"product_id": "kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64@3.10.0-862.43.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-862.43.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"product": {
"name": "perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"product_id": "perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-862.43.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"product_id": "python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-862.43.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-862.43.2.el7?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-862.43.2.el7.ppc64le",
"product": {
"name": "kernel-0:3.10.0-862.43.2.el7.ppc64le",
"product_id": "kernel-0:3.10.0-862.43.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-862.43.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"product": {
"name": "kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"product_id": "kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-862.43.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"product": {
"name": "kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"product_id": "kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-862.43.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"product": {
"name": "kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"product_id": "kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-862.43.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"product": {
"name": "kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"product_id": "kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-862.43.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"product": {
"name": "kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"product_id": "kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-862.43.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"product_id": "kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-862.43.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-862.43.2.el7.ppc64le",
"product": {
"name": "perf-0:3.10.0-862.43.2.el7.ppc64le",
"product_id": "perf-0:3.10.0-862.43.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-862.43.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"product": {
"name": "python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"product_id": "python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-862.43.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"product_id": "kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-862.43.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"product_id": "kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-862.43.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@3.10.0-862.43.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"product_id": "kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-862.43.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"product": {
"name": "perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"product_id": "perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-862.43.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"product_id": "python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-862.43.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"product": {
"name": "kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"product_id": "kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-862.43.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"product_id": "kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-862.43.2.el7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.43.2.el7.src as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-862.43.2.el7.src",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-862.43.2.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "perf-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.5)",
"product_id": "7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.43.2.el7.src as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-862.43.2.el7.src",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-862.43.2.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "perf-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.5)",
"product_id": "7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.43.2.el7.src as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-862.43.2.el7.src",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-862.43.2.el7.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "perf-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.43.2.el7.src as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-862.43.2.el7.src",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-862.43.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "perf-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.5)",
"product_id": "7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.5.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Intel"
]
},
{
"names": [
"Deepak Gupta"
],
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2018-12207",
"cwe": {
"id": "CWE-226",
"name": "Sensitive Information in Resource Not Removed Before Reuse"
},
"discovery_date": "2018-11-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1646768"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way Intel CPUs handle inconsistency between, virtual to physical memory address translations in CPU\u0027s local cache and system software\u0027s Paging structure entries. A privileged guest user may use this flaw to induce a hardware Machine Check Error on the host processor, resulting in a severe DoS scenario by halting the processor.\r\n\r\nSystem software like OS OR Virtual Machine Monitor (VMM) use virtual memory system for storing program instructions and data in memory. Virtual Memory system uses Paging structures like Page Tables and Page Directories to manage system memory. The processor\u0027s Memory Management Unit (MMU) uses Paging structure entries to translate program\u0027s virtual memory addresses to physical memory addresses. The processor stores these address translations into its local cache buffer called - Translation Lookaside Buffer (TLB). TLB has two parts, one for instructions and other for data addresses.\r\n\r\nSystem software can modify its Paging structure entries to change address mappings OR certain attributes like page size etc. Upon such Paging structure alterations in memory, system software must invalidate the corresponding address translations in the processor\u0027s TLB cache. But before this TLB invalidation takes place, a privileged guest user may trigger an instruction fetch operation, which could use an already cached, but now invalid, virtual to physical address translation from Instruction TLB (ITLB). Thus accessing an invalid physical memory address and resulting in halting the processor due to the Machine Check Error (MCE) on Page Size Change.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: Machine Check Error on Page Size Change (IFU)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-12207"
},
{
"category": "external",
"summary": "RHBZ#1646768",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646768"
},
{
"category": "external",
"summary": "RHSB-ifu-page-mce",
"url": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-12207",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12207"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-12207",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12207"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-11-12T20:51:27+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:3838"
},
{
"category": "workaround",
"details": "For mitigation related information, please refer to the Red Hat vulnerability article: https://access.redhat.com/security/vulnerabilities/ifu-page-mce .",
"product_ids": [
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: Machine Check Error on Page Size Change (IFU)"
},
{
"acknowledgments": [
{
"names": [
"Intel"
]
}
],
"cve": "CVE-2019-0154",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"discovery_date": "2019-06-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1724393"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Intel graphics hardware (GPU) where a local attacker with the ability to issue an ioctl could trigger a hardware level crash if MMIO registers were read while the graphics card was in a low-power state. This creates a denial of service situation and the GPU and connected displays will remain unusable until a reboot occurs.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: Intel GPU Denial Of Service while accessing MMIO in lower power state",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Intel plans to release BIOS firmware to correct this issue. Red Hat\u0027s kernel update should mitigate this vulnerability. Some older hardware will not have BIOS firmware update and will rely on operating system level protection to prevent access while the device is in low-power states. For more information see https://access.redhat.com/solutions/i915-graphics",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-0154"
},
{
"category": "external",
"summary": "RHBZ#1724393",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1724393"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-0154",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0154"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-0154",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0154"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/i915-graphics",
"url": "https://access.redhat.com/solutions/i915-graphics"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00260.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00260.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-11-12T20:51:27+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:3838"
},
{
"category": "workaround",
"details": "Preventing loading of the i915 kernel module will prevent attackers from using this exploit against the system however the power management functionality of the card will be disabled and the system may draw additional power. See this KCS article (https://access.redhat.com/solutions/41278) for instructions on how to disable a kernel module. Graphical displays may also be at low resolution or not work correctly. This mitigation may not be suitable if running graphical tools locally is required.",
"product_ids": [
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: Intel GPU Denial Of Service while accessing MMIO in lower power state"
},
{
"acknowledgments": [
{
"names": [
"Intel"
]
}
],
"cve": "CVE-2019-11135",
"cwe": {
"id": "CWE-203",
"name": "Observable Discrepancy"
},
"discovery_date": "2019-09-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1753062"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way Intel CPUs handle speculative execution of instructions when the TSX Asynchronous Abort (TAA) error occurs. A local authenticated attacker with the ability to monitor execution times could infer the TSX memory state by comparing abort execution times. This could allow information disclosure via this observed side-channel for any TSX transaction being executed while an attacker is able to observe abort timing.\r\n\r\nIntel\u0027s Transactional Synchronisation Extensions (TSX) are set of instructions which enable transactional memory support to improve performance of the multi-threaded applications, in the lock-protected critical sections. The CPU executes instructions in the critical-sections as transactions, while ensuring their atomic state. When such transaction execution is unsuccessful, the processor cannot ensure atomic updates to the transaction memory, so the processor rolls back or aborts such transaction execution.\r\n\r\nWhile TSX Asynchronous Abort (TAA) is pending, CPU may continue to read data from architectural buffers and pass it to the dependent speculative operations. This may cause information leakage via speculative side-channel means, which is quite similar to the Microarchitectural Data Sampling (MDS) issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: TSX Transaction Asynchronous Abort (TAA)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "libvirt and qemu-kvm on Red Hat Enterprise Linux 6 are not affected by this vulnerability as they do not support MSR-based CPU features.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11135"
},
{
"category": "external",
"summary": "RHBZ#1753062",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753062"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11135",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11135"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11135",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11135"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/tsx-asynchronousabort",
"url": "https://access.redhat.com/solutions/tsx-asynchronousabort"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00270.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00270.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-11-12T20:51:27+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:3838"
},
{
"category": "workaround",
"details": "For mitigation related information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/solutions/tsx-asynchronousabort",
"product_ids": [
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src",
"7ComputeNode-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src",
"7ComputeNode-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7ComputeNode-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src",
"7Server-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.src",
"7Server-optional-7.5.EUS:kernel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-abi-whitelists-0:3.10.0-862.43.2.el7.noarch",
"7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-bootwrapper-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debug-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-s390x-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-doc-0:3.10.0-862.43.2.el7.noarch",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-headers-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-kdump-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-kdump-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-kdump-devel-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-libs-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:kernel-tools-libs-devel-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:perf-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:python-perf-0:3.10.0-862.43.2.el7.x86_64",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.ppc64le",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.s390x",
"7Server-optional-7.5.EUS:python-perf-debuginfo-0:3.10.0-862.43.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: TSX Transaction Asynchronous Abort (TAA)"
}
]
}
rhsa-2019_3834
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* hw: Machine Check Error on Page Size Change (IFU) (CVE-2018-12207)\n\n* hw: TSX Transaction Asynchronous Abort (TAA) (CVE-2019-11135)\n\n* hw: Intel GPU Denial Of Service while accessing MMIO in lower power state (CVE-2019-0154)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2019:3834",
"url": "https://access.redhat.com/errata/RHSA-2019:3834"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce",
"url": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/tsx-asynchronousabort",
"url": "https://access.redhat.com/solutions/tsx-asynchronousabort"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/i915-graphics",
"url": "https://access.redhat.com/solutions/i915-graphics"
},
{
"category": "external",
"summary": "1646768",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646768"
},
{
"category": "external",
"summary": "1724393",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1724393"
},
{
"category": "external",
"summary": "1753062",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753062"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_3834.json"
}
],
"title": "Red Hat Security Advisory: kernel security update",
"tracking": {
"current_release_date": "2024-11-15T03:17:36+00:00",
"generator": {
"date": "2024-11-15T03:17:36+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2019:3834",
"initial_release_date": "2019-11-12T21:02:41+00:00",
"revision_history": [
{
"date": "2019-11-12T21:02:41+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2019-11-12T21:02:41+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-15T03:17:36+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Client (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Client Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"product": {
"name": "bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"product_id": "bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@3.10.0-1062.4.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-1062.4.2.el7.x86_64",
"product": {
"name": "kernel-0:3.10.0-1062.4.2.el7.x86_64",
"product_id": "kernel-0:3.10.0-1062.4.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-1062.4.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"product": {
"name": "kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"product_id": "kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-1062.4.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"product_id": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-1062.4.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"product": {
"name": "kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"product_id": "kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-1062.4.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"product": {
"name": "kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"product_id": "kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-1062.4.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"product": {
"name": "kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"product_id": "kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-1062.4.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"product_id": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-1062.4.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-1062.4.2.el7.x86_64",
"product": {
"name": "perf-0:3.10.0-1062.4.2.el7.x86_64",
"product_id": "perf-0:3.10.0-1062.4.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-1062.4.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"product": {
"name": "python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"product_id": "python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-1062.4.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"product": {
"name": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"product_id": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@3.10.0-1062.4.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-1062.4.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"product_id": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-1062.4.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-1062.4.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-1062.4.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"product": {
"name": "perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"product_id": "perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-1062.4.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"product_id": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-1062.4.2.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-1062.4.2.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:3.10.0-1062.4.2.el7.src",
"product": {
"name": "kernel-0:3.10.0-1062.4.2.el7.src",
"product_id": "kernel-0:3.10.0-1062.4.2.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-1062.4.2.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"product": {
"name": "kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"product_id": "kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-1062.4.2.el7?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"product": {
"name": "kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"product_id": "kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@3.10.0-1062.4.2.el7?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:3.10.0-1062.4.2.el7.s390x",
"product": {
"name": "bpftool-0:3.10.0-1062.4.2.el7.s390x",
"product_id": "bpftool-0:3.10.0-1062.4.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@3.10.0-1062.4.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-1062.4.2.el7.s390x",
"product": {
"name": "kernel-0:3.10.0-1062.4.2.el7.s390x",
"product_id": "kernel-0:3.10.0-1062.4.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-1062.4.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"product": {
"name": "kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"product_id": "kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-1062.4.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"product": {
"name": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"product_id": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-1062.4.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"product": {
"name": "kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"product_id": "kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-1062.4.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"product": {
"name": "kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"product_id": "kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-1062.4.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"product": {
"name": "kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"product_id": "kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump@3.10.0-1062.4.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"product": {
"name": "kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"product_id": "kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-devel@3.10.0-1062.4.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-1062.4.2.el7.s390x",
"product": {
"name": "perf-0:3.10.0-1062.4.2.el7.s390x",
"product_id": "perf-0:3.10.0-1062.4.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-1062.4.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-1062.4.2.el7.s390x",
"product": {
"name": "python-perf-0:3.10.0-1062.4.2.el7.s390x",
"product_id": "python-perf-0:3.10.0-1062.4.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-1062.4.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"product": {
"name": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"product_id": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@3.10.0-1062.4.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"product_id": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-1062.4.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"product": {
"name": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"product_id": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-1062.4.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@3.10.0-1062.4.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"product": {
"name": "kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"product_id": "kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@3.10.0-1062.4.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"product": {
"name": "perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"product_id": "perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-1062.4.2.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"product_id": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-1062.4.2.el7?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"product": {
"name": "bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"product_id": "bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@3.10.0-1062.4.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-1062.4.2.el7.ppc64",
"product": {
"name": "kernel-0:3.10.0-1062.4.2.el7.ppc64",
"product_id": "kernel-0:3.10.0-1062.4.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-1062.4.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"product": {
"name": "kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"product_id": "kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-1062.4.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"product": {
"name": "kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"product_id": "kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-1062.4.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"product": {
"name": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"product_id": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-1062.4.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"product": {
"name": "kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"product_id": "kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-1062.4.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"product": {
"name": "kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"product_id": "kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-1062.4.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"product": {
"name": "kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"product_id": "kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-1062.4.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"product": {
"name": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"product_id": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-1062.4.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-1062.4.2.el7.ppc64",
"product": {
"name": "perf-0:3.10.0-1062.4.2.el7.ppc64",
"product_id": "perf-0:3.10.0-1062.4.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-1062.4.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"product": {
"name": "python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"product_id": "python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-1062.4.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"product": {
"name": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"product_id": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@3.10.0-1062.4.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"product_id": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-1062.4.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"product": {
"name": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"product_id": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-1062.4.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"product": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"product_id": "kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64@3.10.0-1062.4.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"product_id": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-1062.4.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"product": {
"name": "perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"product_id": "perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-1062.4.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"product_id": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-1062.4.2.el7?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"product_id": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-1062.4.2.el7?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"product": {
"name": "bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"product_id": "bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@3.10.0-1062.4.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"product": {
"name": "kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"product_id": "kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@3.10.0-1062.4.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"product": {
"name": "kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"product_id": "kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-1062.4.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"product": {
"name": "kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"product_id": "kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@3.10.0-1062.4.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"product": {
"name": "kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"product_id": "kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@3.10.0-1062.4.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"product": {
"name": "kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"product_id": "kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@3.10.0-1062.4.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"product": {
"name": "kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"product_id": "kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@3.10.0-1062.4.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"product_id": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-1062.4.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:3.10.0-1062.4.2.el7.ppc64le",
"product": {
"name": "perf-0:3.10.0-1062.4.2.el7.ppc64le",
"product_id": "perf-0:3.10.0-1062.4.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@3.10.0-1062.4.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"product": {
"name": "python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"product_id": "python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf@3.10.0-1062.4.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"product": {
"name": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"product_id": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@3.10.0-1062.4.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"product_id": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-1062.4.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"product_id": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-1062.4.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@3.10.0-1062.4.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"product_id": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-1062.4.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"product": {
"name": "perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"product_id": "perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-1062.4.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"product": {
"name": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"product_id": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-1062.4.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"product": {
"name": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"product_id": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-1062.4.2.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"product_id": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-1062.4.2.el7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "bpftool-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.4.2.el7.src as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-1062.4.2.el7.src",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1062.4.2.el7.noarch as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "perf-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Client-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "bpftool-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.4.2.el7.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-1062.4.2.el7.src",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1062.4.2.el7.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "perf-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Client-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "bpftool-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.4.2.el7.src as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-1062.4.2.el7.src",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1062.4.2.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "perf-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "bpftool-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.4.2.el7.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-1062.4.2.el7.src",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1062.4.2.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "perf-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "bpftool-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.4.2.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-1062.4.2.el7.src",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1062.4.2.el7.noarch as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "perf-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Server-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "bpftool-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.4.2.el7.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-1062.4.2.el7.src",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1062.4.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "perf-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Server-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "bpftool-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.4.2.el7.src as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-1062.4.2.el7.src",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1062.4.2.el7.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "perf-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "bpftool-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.4.2.el7.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src"
},
"product_reference": "kernel-0:3.10.0-1062.4.2.el7.src",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch"
},
"product_reference": "kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:3.10.0-1062.4.2.el7.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch"
},
"product_reference": "kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "perf-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "perf-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "perf-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "perf-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "python-perf-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
},
"product_reference": "python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.7.Z"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Intel"
]
},
{
"names": [
"Deepak Gupta"
],
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2018-12207",
"cwe": {
"id": "CWE-226",
"name": "Sensitive Information in Resource Not Removed Before Reuse"
},
"discovery_date": "2018-11-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1646768"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way Intel CPUs handle inconsistency between, virtual to physical memory address translations in CPU\u0027s local cache and system software\u0027s Paging structure entries. A privileged guest user may use this flaw to induce a hardware Machine Check Error on the host processor, resulting in a severe DoS scenario by halting the processor.\r\n\r\nSystem software like OS OR Virtual Machine Monitor (VMM) use virtual memory system for storing program instructions and data in memory. Virtual Memory system uses Paging structures like Page Tables and Page Directories to manage system memory. The processor\u0027s Memory Management Unit (MMU) uses Paging structure entries to translate program\u0027s virtual memory addresses to physical memory addresses. The processor stores these address translations into its local cache buffer called - Translation Lookaside Buffer (TLB). TLB has two parts, one for instructions and other for data addresses.\r\n\r\nSystem software can modify its Paging structure entries to change address mappings OR certain attributes like page size etc. Upon such Paging structure alterations in memory, system software must invalidate the corresponding address translations in the processor\u0027s TLB cache. But before this TLB invalidation takes place, a privileged guest user may trigger an instruction fetch operation, which could use an already cached, but now invalid, virtual to physical address translation from Instruction TLB (ITLB). Thus accessing an invalid physical memory address and resulting in halting the processor due to the Machine Check Error (MCE) on Page Size Change.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: Machine Check Error on Page Size Change (IFU)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Client-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Client-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7ComputeNode-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7ComputeNode-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Server-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Server-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Workstation-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Workstation-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-12207"
},
{
"category": "external",
"summary": "RHBZ#1646768",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646768"
},
{
"category": "external",
"summary": "RHSB-ifu-page-mce",
"url": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-12207",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12207"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-12207",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12207"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-11-12T21:02:41+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Client-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Client-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7ComputeNode-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7ComputeNode-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Server-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Server-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Workstation-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Workstation-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:3834"
},
{
"category": "workaround",
"details": "For mitigation related information, please refer to the Red Hat vulnerability article: https://access.redhat.com/security/vulnerabilities/ifu-page-mce .",
"product_ids": [
"7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Client-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Client-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7ComputeNode-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7ComputeNode-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Server-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Server-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Workstation-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Workstation-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Client-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Client-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7ComputeNode-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7ComputeNode-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Server-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Server-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Workstation-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Workstation-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: Machine Check Error on Page Size Change (IFU)"
},
{
"acknowledgments": [
{
"names": [
"Intel"
]
}
],
"cve": "CVE-2019-0154",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"discovery_date": "2019-06-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1724393"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Intel graphics hardware (GPU) where a local attacker with the ability to issue an ioctl could trigger a hardware level crash if MMIO registers were read while the graphics card was in a low-power state. This creates a denial of service situation and the GPU and connected displays will remain unusable until a reboot occurs.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: Intel GPU Denial Of Service while accessing MMIO in lower power state",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Intel plans to release BIOS firmware to correct this issue. Red Hat\u0027s kernel update should mitigate this vulnerability. Some older hardware will not have BIOS firmware update and will rely on operating system level protection to prevent access while the device is in low-power states. For more information see https://access.redhat.com/solutions/i915-graphics",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Client-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Client-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7ComputeNode-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7ComputeNode-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Server-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Server-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Workstation-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Workstation-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-0154"
},
{
"category": "external",
"summary": "RHBZ#1724393",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1724393"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-0154",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0154"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-0154",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0154"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/i915-graphics",
"url": "https://access.redhat.com/solutions/i915-graphics"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00260.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00260.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-11-12T21:02:41+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Client-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Client-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7ComputeNode-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7ComputeNode-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Server-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Server-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Workstation-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Workstation-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:3834"
},
{
"category": "workaround",
"details": "Preventing loading of the i915 kernel module will prevent attackers from using this exploit against the system however the power management functionality of the card will be disabled and the system may draw additional power. See this KCS article (https://access.redhat.com/solutions/41278) for instructions on how to disable a kernel module. Graphical displays may also be at low resolution or not work correctly. This mitigation may not be suitable if running graphical tools locally is required.",
"product_ids": [
"7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Client-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Client-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7ComputeNode-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7ComputeNode-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Server-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Server-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Workstation-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Workstation-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Client-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Client-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7ComputeNode-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7ComputeNode-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Server-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Server-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Workstation-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Workstation-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: Intel GPU Denial Of Service while accessing MMIO in lower power state"
},
{
"acknowledgments": [
{
"names": [
"Intel"
]
}
],
"cve": "CVE-2019-11135",
"cwe": {
"id": "CWE-203",
"name": "Observable Discrepancy"
},
"discovery_date": "2019-09-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1753062"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way Intel CPUs handle speculative execution of instructions when the TSX Asynchronous Abort (TAA) error occurs. A local authenticated attacker with the ability to monitor execution times could infer the TSX memory state by comparing abort execution times. This could allow information disclosure via this observed side-channel for any TSX transaction being executed while an attacker is able to observe abort timing.\r\n\r\nIntel\u0027s Transactional Synchronisation Extensions (TSX) are set of instructions which enable transactional memory support to improve performance of the multi-threaded applications, in the lock-protected critical sections. The CPU executes instructions in the critical-sections as transactions, while ensuring their atomic state. When such transaction execution is unsuccessful, the processor cannot ensure atomic updates to the transaction memory, so the processor rolls back or aborts such transaction execution.\r\n\r\nWhile TSX Asynchronous Abort (TAA) is pending, CPU may continue to read data from architectural buffers and pass it to the dependent speculative operations. This may cause information leakage via speculative side-channel means, which is quite similar to the Microarchitectural Data Sampling (MDS) issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: TSX Transaction Asynchronous Abort (TAA)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "libvirt and qemu-kvm on Red Hat Enterprise Linux 6 are not affected by this vulnerability as they do not support MSR-based CPU features.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Client-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Client-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7ComputeNode-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7ComputeNode-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Server-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Server-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Workstation-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Workstation-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11135"
},
{
"category": "external",
"summary": "RHBZ#1753062",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753062"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11135",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11135"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11135",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11135"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/tsx-asynchronousabort",
"url": "https://access.redhat.com/solutions/tsx-asynchronousabort"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00270.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00270.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-11-12T21:02:41+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Client-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Client-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7ComputeNode-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7ComputeNode-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Server-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Server-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Workstation-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Workstation-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2019:3834"
},
{
"category": "workaround",
"details": "For mitigation related information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/solutions/tsx-asynchronousabort",
"product_ids": [
"7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Client-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Client-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7ComputeNode-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7ComputeNode-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Server-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Server-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Workstation-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Workstation-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Client-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Client-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Client-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Client-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Client-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7ComputeNode-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7ComputeNode-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7ComputeNode-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7ComputeNode-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7ComputeNode-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Server-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Server-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Server-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Server-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Server-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Workstation-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Workstation-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:bpftool-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:bpftool-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.src",
"7Workstation-optional-7.7.Z:kernel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-abi-whitelists-0:3.10.0-1062.4.2.el7.noarch",
"7Workstation-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-bootwrapper-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debug-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debug-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debug-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-debuginfo-common-ppc64-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-debuginfo-common-s390x-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-debuginfo-common-x86_64-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-doc-0:3.10.0-1062.4.2.el7.noarch",
"7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-headers-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-kdump-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-kdump-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-kdump-devel-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-tools-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-tools-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-tools-libs-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:kernel-tools-libs-devel-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:python-perf-0:3.10.0-1062.4.2.el7.x86_64",
"7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64",
"7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.ppc64le",
"7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.s390x",
"7Workstation-optional-7.7.Z:python-perf-debuginfo-0:3.10.0-1062.4.2.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: TSX Transaction Asynchronous Abort (TAA)"
}
]
}
RHSA-2019:3941
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat OpenShift Container Platform release 4.1.24 is now available with updates to packages and images that fix several bugs and add enhancements.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments.\n\nThis is a text-only advisory for the machine-os-content container image, which includes RPM packages for Red Hat Enterprise Linux CoreOS.\n\nSecurity Fix(es):\n\n* A flaw was found in the way Intel CPUs handle inconsistency between, virtual to physical memory address translations in CPU\u0027s local cache and system software\u0027s Paging structure entries. A privileged guest user may use this flaw to induce a hardware Machine Check Error on the host processor, resulting in a severe DoS scenario by halting the processor.\n\nSystem software like OS OR Virtual Machine Monitor (VMM) use virtual memory system for storing program instructions and data in memory. Virtual Memory system uses Paging structures like Page Tables and Page Directories to manage system memory. The processor\u0027s Memory Management Unit (MMU) uses Paging structure entries to translate program\u0027s virtual memory addresses to physical memory addresses. The processor stores these address translations into its local cache buffer called - Translation Lookaside Buffer (TLB). TLB has two parts, one for instructions and other for data addresses.\n\nSystem software can modify its Paging structure entries to change address mappings OR certain attributes like page size etc. Upon such Paging structure alterations in memory, system software must invalidate the corresponding address translations in the processor\u0027s TLB cache. But before this TLB invalidation takes place, a privileged guest user may trigger an instruction fetch operation, which could use an already cached, but now invalid, virtual to physical address translation from Instruction TLB (ITLB). Thus accessing an invalid physical memory address and resulting in halting the processor due to the Machine Check Error (MCE) on Page Size Change. (CVE-2018-12207)\n\n* A flaw was found in the way sudo implemented running commands with an arbitrary user ID. If a sudoers entry is written to allow users to run a command as any user except root, this flaw can be used by an attacker to bypass that restriction. (CVE-2019-14287)\n\n* An improper authorization flaw was discovered in systemd-resolved in the way it configures the exposed DBus interface org.freedesktop.resolve1. An unprivileged local user could call all DBus methods, even when marked as privileged operations. An attacker could abuse this flaw by changing the DNS, Search Domain, LLMNR, DNSSEC, and other network link settings without any authorization, giving them control of the network names resolution process and causing the system to communicate with wrong or malicious servers. (CVE-2019-15718)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2019:3941",
"url": "https://access.redhat.com/errata/RHSA-2019:3941"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce",
"url": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce"
},
{
"category": "external",
"summary": "1646768",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646768"
},
{
"category": "external",
"summary": "1746057",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1746057"
},
{
"category": "external",
"summary": "1760531",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1760531"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_3941.json"
}
],
"title": "Red Hat Security Advisory: OpenShift Container Platform 4.1.24 machine-os-content-container security update",
"tracking": {
"current_release_date": "2025-10-09T18:15:57+00:00",
"generator": {
"date": "2025-10-09T18:15:57+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2019:3941",
"initial_release_date": "2019-11-21T09:55:18+00:00",
"revision_history": [
{
"date": "2019-11-21T09:55:18+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2019-11-21T09:55:18+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T18:15:57+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenShift Container Platform 4",
"product": {
"name": "Red Hat OpenShift Container Platform 4",
"product_id": "Red Hat OpenShift Container Platform 4",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:4.1"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift Enterprise"
}
],
"category": "vendor",
"name": "Red Hat"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Intel"
]
},
{
"names": [
"Deepak Gupta"
],
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2018-12207",
"cwe": {
"id": "CWE-226",
"name": "Sensitive Information in Resource Not Removed Before Reuse"
},
"discovery_date": "2018-11-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1646768"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way Intel CPUs handle inconsistency between, virtual to physical memory address translations in CPU\u0027s local cache and system software\u0027s Paging structure entries. A privileged guest user may use this flaw to induce a hardware Machine Check Error on the host processor, resulting in a severe DoS scenario by halting the processor.\r\n\r\nSystem software like OS OR Virtual Machine Monitor (VMM) use virtual memory system for storing program instructions and data in memory. Virtual Memory system uses Paging structures like Page Tables and Page Directories to manage system memory. The processor\u0027s Memory Management Unit (MMU) uses Paging structure entries to translate program\u0027s virtual memory addresses to physical memory addresses. The processor stores these address translations into its local cache buffer called - Translation Lookaside Buffer (TLB). TLB has two parts, one for instructions and other for data addresses.\r\n\r\nSystem software can modify its Paging structure entries to change address mappings OR certain attributes like page size etc. Upon such Paging structure alterations in memory, system software must invalidate the corresponding address translations in the processor\u0027s TLB cache. But before this TLB invalidation takes place, a privileged guest user may trigger an instruction fetch operation, which could use an already cached, but now invalid, virtual to physical address translation from Instruction TLB (ITLB). Thus accessing an invalid physical memory address and resulting in halting the processor due to the Machine Check Error (MCE) on Page Size Change.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: Machine Check Error on Page Size Change (IFU)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Container Platform 4"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-12207"
},
{
"category": "external",
"summary": "RHBZ#1646768",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646768"
},
{
"category": "external",
"summary": "RHSB-ifu-page-mce",
"url": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-12207",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12207"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-12207",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12207"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-11-21T09:55:18+00:00",
"details": "For OpenShift Container Platform 4.1 see the following documentation, which\nwill be updated shortly for release 4.1.24, for important instructions on\nhow to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/4.1/release_notes/ocp-4-1-release-notes.html",
"product_ids": [
"Red Hat OpenShift Container Platform 4"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:3941"
},
{
"category": "workaround",
"details": "For mitigation related information, please refer to the Red Hat vulnerability article: https://access.redhat.com/security/vulnerabilities/ifu-page-mce .",
"product_ids": [
"Red Hat OpenShift Container Platform 4"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"Red Hat OpenShift Container Platform 4"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: Machine Check Error on Page Size Change (IFU)"
},
{
"acknowledgments": [
{
"names": [
"the Sudo project"
]
},
{
"names": [
"Joe Vennix"
],
"organization": "Apple Information Security",
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2019-14287",
"cwe": {
"id": "CWE-267",
"name": "Privilege Defined With Unsafe Actions"
},
"discovery_date": "2019-10-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1760531"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way sudo implemented running commands with arbitrary user ID. If a sudoers entry is written to allow the attacker to run a command as any user except root, this flaw can be used by the attacker to bypass that restriction.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "sudo: Privilege escalation via \u0027Runas\u0027 specification with \u0027ALL\u0027 keyword",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw only affects specific, non-default configurations of sudo, in which sudoers configuration entry allows a user to run a command as any user except root, for example:\n\nsomeuser myhost = (ALL, !root) /usr/bin/somecommand\n\nThis configuration allows user \"someuser\" to run somecommand as any other user except root. However, this flaw also allows someuser to run somecommand as root by specifying the target user using the numeric id of -1. Only the specified command can be run, this flaw does NOT allow user to run other commands that those specified in the sudoers configuration.\n\nAny other configurations of sudo (including configurations that allow user to run commands as any user including root and configurations that allow user to run command as a specific other user) are NOT affected by this flaw.\n\nRed Hat Virtualization Hypervisor includes an affected version of sudo, however the default configuration is not vulnerable to this flaw.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Container Platform 4"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-14287"
},
{
"category": "external",
"summary": "RHBZ#1760531",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1760531"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-14287",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14287"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14287",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14287"
},
{
"category": "external",
"summary": "https://www.sudo.ws/alerts/minus_1_uid.html",
"url": "https://www.sudo.ws/alerts/minus_1_uid.html"
}
],
"release_date": "2019-10-14T15:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-11-21T09:55:18+00:00",
"details": "For OpenShift Container Platform 4.1 see the following documentation, which\nwill be updated shortly for release 4.1.24, for important instructions on\nhow to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/4.1/release_notes/ocp-4-1-release-notes.html",
"product_ids": [
"Red Hat OpenShift Container Platform 4"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:3941"
},
{
"category": "workaround",
"details": "This vulnerability only affects configurations of sudo that have a runas user list that includes an exclusion of root. The most simple example is:\n\n~~~\nsomeuser ALL=(ALL, !root) /usr/bin/somecommand\n~~~\n\nThe exclusion is specified using an excalamation mark (!). In this example, the \"root\" user is specified by name. The root user may also be identified in other ways, such as by user id:\n\n~~~\nsomeuser ALL=(ALL, !#0) /usr/bin/somecommand\n~~~\n\nor by reference to a runas alias:\n\n~~~\nRunas_Alias MYGROUP = root, adminuser\nsomeuser ALL=(ALL, !MYGROUP) /usr/bin/somecommand\n~~~\n\nTo ensure your sudoers configuration is not affected by this vulnerability, we recommend examining each sudoers entry that includes the `!` character in the runas specification, to ensure that the root user is not among the exclusions. These can be found in the /etc/sudoers file or files under /etc/sudoers.d.",
"product_ids": [
"Red Hat OpenShift Container Platform 4"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"Red Hat OpenShift Container Platform 4"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "sudo: Privilege escalation via \u0027Runas\u0027 specification with \u0027ALL\u0027 keyword"
},
{
"cve": "CVE-2019-15718",
"cwe": {
"id": "CWE-285",
"name": "Improper Authorization"
},
"discovery_date": "2019-08-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1746057"
}
],
"notes": [
{
"category": "description",
"text": "An improper authorization flaw was discovered in systemd-resolved in the way it configures the exposed DBus interface org.freedesktop.resolve1. An unprivileged local attacker could call all DBus methods, even when marked as privileged operations. An attacker could abuse this flaw by changing the DNS, Search Domain, LLMNR, DNSSEC and other network link settings without any authorization, allowing control of the network names resolution process and cause the system to communicate with wrong or malicious servers.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "systemd: systemd-resolved allows unprivileged users to configure DNS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue does not affect the versions of systemd as shipped with Red Hat Enterprise Linux 7 as the shipped systemd-resolved does not provide any privileged DBus method.\nThis issue does affect the versions of systemd as shipped with Red Hat Enterprise Linux 8, however the systemd-resolved service is not enabled by default, so the flaw cannot be exploited unless the service was manually enabled.\n\nThe flaw was rated as Moderate as it requires a local attacker and changing the DNS servers cannot compromise the system by itself, though it could be used for phishing attacks or to redirect the users to malicious websites. Moreover, on Red Hat Enterprise Linux 8 systemd-resolved needs to be manually enabled by an administrator to make the system vulnerable.\n\nOpenShift Container Platform 4 includes a vulnerable version of systemd on RHEL CoreOS nodes. However, the systemd-resolved service is removed from RHEL CoreOS instances, making this vulnerability not exploitable. This flaw is rated Low for OpenShift Container Platform 4.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Container Platform 4"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-15718"
},
{
"category": "external",
"summary": "RHBZ#1746057",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1746057"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-15718",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15718"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-15718",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-15718"
}
],
"release_date": "2019-09-03T15:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-11-21T09:55:18+00:00",
"details": "For OpenShift Container Platform 4.1 see the following documentation, which\nwill be updated shortly for release 4.1.24, for important instructions on\nhow to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/4.1/release_notes/ocp-4-1-release-notes.html",
"product_ids": [
"Red Hat OpenShift Container Platform 4"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:3941"
},
{
"category": "workaround",
"details": "Disable systemd-resolved service by using `sudo systemctl disable systemd-resolved`.",
"product_ids": [
"Red Hat OpenShift Container Platform 4"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"Red Hat OpenShift Container Platform 4"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "systemd: systemd-resolved allows unprivileged users to configure DNS"
}
]
}
rhsa-2019:3936
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kpatch-patch is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.\n\nSecurity Fix(es):\n\n* hw: Machine Check Error on Page Size Change (IFU) (CVE-2018-12207)\n\n* hw: TSX Transaction Asynchronous Abort (TAA) (CVE-2019-11135)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2019:3936",
"url": "https://access.redhat.com/errata/RHSA-2019:3936"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce",
"url": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/tsx-asynchronousabort",
"url": "https://access.redhat.com/solutions/tsx-asynchronousabort"
},
{
"category": "external",
"summary": "1646768",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646768"
},
{
"category": "external",
"summary": "1753062",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753062"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_3936.json"
}
],
"title": "Red Hat Security Advisory: kpatch-patch security update",
"tracking": {
"current_release_date": "2025-10-09T18:15:57+00:00",
"generator": {
"date": "2025-10-09T18:15:57+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2019:3936",
"initial_release_date": "2019-11-22T08:52:34+00:00",
"revision_history": [
{
"date": "2019-11-22T08:52:34+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2019-11-22T08:52:34+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T18:15:57+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:8::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147-0:1-3.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147-0:1-3.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147-0:1-3.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147@1-3.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147-debugsource-0:1-3.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147-debugsource-0:1-3.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147-debugsource-0:1-3.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147-debugsource@1-3.el8_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147-debuginfo-0:1-3.el8_1.x86_64",
"product": {
"name": "kpatch-patch-4_18_0-147-debuginfo-0:1-3.el8_1.x86_64",
"product_id": "kpatch-patch-4_18_0-147-debuginfo-0:1-3.el8_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147-debuginfo@1-3.el8_1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kpatch-patch-4_18_0-147-0:1-3.el8_1.src",
"product": {
"name": "kpatch-patch-4_18_0-147-0:1-3.el8_1.src",
"product_id": "kpatch-patch-4_18_0-147-0:1-3.el8_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kpatch-patch-4_18_0-147@1-3.el8_1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147-0:1-3.el8_1.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kpatch-patch-4_18_0-147-0:1-3.el8_1.src"
},
"product_reference": "kpatch-patch-4_18_0-147-0:1-3.el8_1.src",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147-0:1-3.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kpatch-patch-4_18_0-147-0:1-3.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147-0:1-3.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147-debuginfo-0:1-3.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kpatch-patch-4_18_0-147-debuginfo-0:1-3.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147-debuginfo-0:1-3.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kpatch-patch-4_18_0-147-debugsource-0:1-3.el8_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.1.0.Z.MAIN.EUS:kpatch-patch-4_18_0-147-debugsource-0:1-3.el8_1.x86_64"
},
"product_reference": "kpatch-patch-4_18_0-147-debugsource-0:1-3.el8_1.x86_64",
"relates_to_product_reference": "BaseOS-8.1.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Intel"
]
},
{
"names": [
"Deepak Gupta"
],
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2018-12207",
"cwe": {
"id": "CWE-226",
"name": "Sensitive Information in Resource Not Removed Before Reuse"
},
"discovery_date": "2018-11-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1646768"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way Intel CPUs handle inconsistency between, virtual to physical memory address translations in CPU\u0027s local cache and system software\u0027s Paging structure entries. A privileged guest user may use this flaw to induce a hardware Machine Check Error on the host processor, resulting in a severe DoS scenario by halting the processor.\r\n\r\nSystem software like OS OR Virtual Machine Monitor (VMM) use virtual memory system for storing program instructions and data in memory. Virtual Memory system uses Paging structures like Page Tables and Page Directories to manage system memory. The processor\u0027s Memory Management Unit (MMU) uses Paging structure entries to translate program\u0027s virtual memory addresses to physical memory addresses. The processor stores these address translations into its local cache buffer called - Translation Lookaside Buffer (TLB). TLB has two parts, one for instructions and other for data addresses.\r\n\r\nSystem software can modify its Paging structure entries to change address mappings OR certain attributes like page size etc. Upon such Paging structure alterations in memory, system software must invalidate the corresponding address translations in the processor\u0027s TLB cache. But before this TLB invalidation takes place, a privileged guest user may trigger an instruction fetch operation, which could use an already cached, but now invalid, virtual to physical address translation from Instruction TLB (ITLB). Thus accessing an invalid physical memory address and resulting in halting the processor due to the Machine Check Error (MCE) on Page Size Change.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: Machine Check Error on Page Size Change (IFU)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.1.0.Z.MAIN.EUS:kpatch-patch-4_18_0-147-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.MAIN.EUS:kpatch-patch-4_18_0-147-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kpatch-patch-4_18_0-147-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kpatch-patch-4_18_0-147-debugsource-0:1-3.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-12207"
},
{
"category": "external",
"summary": "RHBZ#1646768",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646768"
},
{
"category": "external",
"summary": "RHSB-ifu-page-mce",
"url": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-12207",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12207"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-12207",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12207"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-11-22T08:52:34+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.1.0.Z.MAIN.EUS:kpatch-patch-4_18_0-147-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.MAIN.EUS:kpatch-patch-4_18_0-147-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kpatch-patch-4_18_0-147-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kpatch-patch-4_18_0-147-debugsource-0:1-3.el8_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:3936"
},
{
"category": "workaround",
"details": "For mitigation related information, please refer to the Red Hat vulnerability article: https://access.redhat.com/security/vulnerabilities/ifu-page-mce .",
"product_ids": [
"BaseOS-8.1.0.Z.MAIN.EUS:kpatch-patch-4_18_0-147-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.MAIN.EUS:kpatch-patch-4_18_0-147-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kpatch-patch-4_18_0-147-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kpatch-patch-4_18_0-147-debugsource-0:1-3.el8_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"BaseOS-8.1.0.Z.MAIN.EUS:kpatch-patch-4_18_0-147-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.MAIN.EUS:kpatch-patch-4_18_0-147-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kpatch-patch-4_18_0-147-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kpatch-patch-4_18_0-147-debugsource-0:1-3.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: Machine Check Error on Page Size Change (IFU)"
},
{
"acknowledgments": [
{
"names": [
"Intel"
]
}
],
"cve": "CVE-2019-11135",
"cwe": {
"id": "CWE-203",
"name": "Observable Discrepancy"
},
"discovery_date": "2019-09-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1753062"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way Intel CPUs handle speculative execution of instructions when the TSX Asynchronous Abort (TAA) error occurs. A local authenticated attacker with the ability to monitor execution times could infer the TSX memory state by comparing abort execution times. This could allow information disclosure via this observed side-channel for any TSX transaction being executed while an attacker is able to observe abort timing.\r\n\r\nIntel\u0027s Transactional Synchronisation Extensions (TSX) are set of instructions which enable transactional memory support to improve performance of the multi-threaded applications, in the lock-protected critical sections. The CPU executes instructions in the critical-sections as transactions, while ensuring their atomic state. When such transaction execution is unsuccessful, the processor cannot ensure atomic updates to the transaction memory, so the processor rolls back or aborts such transaction execution.\r\n\r\nWhile TSX Asynchronous Abort (TAA) is pending, CPU may continue to read data from architectural buffers and pass it to the dependent speculative operations. This may cause information leakage via speculative side-channel means, which is quite similar to the Microarchitectural Data Sampling (MDS) issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: TSX Transaction Asynchronous Abort (TAA)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "libvirt and qemu-kvm on Red Hat Enterprise Linux 6 are not affected by this vulnerability as they do not support MSR-based CPU features.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.1.0.Z.MAIN.EUS:kpatch-patch-4_18_0-147-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.MAIN.EUS:kpatch-patch-4_18_0-147-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kpatch-patch-4_18_0-147-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kpatch-patch-4_18_0-147-debugsource-0:1-3.el8_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11135"
},
{
"category": "external",
"summary": "RHBZ#1753062",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753062"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11135",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11135"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11135",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11135"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/tsx-asynchronousabort",
"url": "https://access.redhat.com/solutions/tsx-asynchronousabort"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00270.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00270.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-11-22T08:52:34+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.1.0.Z.MAIN.EUS:kpatch-patch-4_18_0-147-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.MAIN.EUS:kpatch-patch-4_18_0-147-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kpatch-patch-4_18_0-147-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kpatch-patch-4_18_0-147-debugsource-0:1-3.el8_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:3936"
},
{
"category": "workaround",
"details": "For mitigation related information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/solutions/tsx-asynchronousabort",
"product_ids": [
"BaseOS-8.1.0.Z.MAIN.EUS:kpatch-patch-4_18_0-147-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.MAIN.EUS:kpatch-patch-4_18_0-147-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kpatch-patch-4_18_0-147-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kpatch-patch-4_18_0-147-debugsource-0:1-3.el8_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"BaseOS-8.1.0.Z.MAIN.EUS:kpatch-patch-4_18_0-147-0:1-3.el8_1.src",
"BaseOS-8.1.0.Z.MAIN.EUS:kpatch-patch-4_18_0-147-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kpatch-patch-4_18_0-147-debuginfo-0:1-3.el8_1.x86_64",
"BaseOS-8.1.0.Z.MAIN.EUS:kpatch-patch-4_18_0-147-debugsource-0:1-3.el8_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: TSX Transaction Asynchronous Abort (TAA)"
}
]
}
rhsa-2020_0204
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 8.0 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* hw: Machine Check Error on Page Size Change (IFU) (CVE-2018-12207)\n\n* hw: TSX Transaction Asynchronous Abort (TAA) (CVE-2019-11135)\n\n* kernel: nfs: use-after-free in svc_process_common() (CVE-2018-16884)\n\n* hw: Intel GPU blitter manipulation can allow for arbitrary kernel memory write (CVE-2019-0155)\n\n* Kernel: vhost_net: infinite loop while receiving packets leads to DoS (CVE-2019-3900)\n\n* Kernel: page cache side channel attacks (CVE-2019-5489)\n\n* hardware: bluetooth: BR/EDR encryption key negotiation attacks (KNOB) (CVE-2019-9506)\n\n* kernel: Heap overflow in mwifiex_uap_parse_tail_ies function in drivers/net/wireless/marvell/mwifiex/ie.c (CVE-2019-10126)\n\n* kernel: heap overflow in mwifiex_update_vs_ie() function of Marvell WiFi driver (CVE-2019-14816)\n\n* Kernel: KVM: OOB memory access via mmio ring buffer (CVE-2019-14821)\n\n* kernel: heap overflow in marvell/mwifiex/tdls.c (CVE-2019-14901)\n\n* hw: Intel GPU Denial Of Service while accessing MMIO in lower power state (CVE-2019-0154)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* Backport TCP follow-up for small buffers (BZ#1739184)\n\n* TCP performance regression after CVE-2019-11478 bug fix (BZ#1743170)\n\n* RHEL8.0 - bnx2x link down, caused by transmit timeouts during load test (Marvell/Cavium/QLogic) (L3:) (BZ#1743548)\n\n* block: blk-mq improvement (BZ#1780567)\n\n* RHEL8.0 - Regression to RHEL7.6 by changing force_latency found during RHEL8.0 validation for SAP HANA on POWER (BZ#1781111)\n\n* blk-mq: overwirte performance drops on real MQ device (BZ#1782183)\n\n* RHEL8: creating vport takes lot of memory i.e 2GB per vport which leads to drain out system memory quickly. (BZ#1782705)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2020:0204",
"url": "https://access.redhat.com/errata/RHSA-2020:0204"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce",
"url": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce"
},
{
"category": "external",
"summary": "1646768",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646768"
},
{
"category": "external",
"summary": "1660375",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1660375"
},
{
"category": "external",
"summary": "1664110",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1664110"
},
{
"category": "external",
"summary": "1698757",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1698757"
},
{
"category": "external",
"summary": "1716992",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1716992"
},
{
"category": "external",
"summary": "1724393",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1724393"
},
{
"category": "external",
"summary": "1724398",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1724398"
},
{
"category": "external",
"summary": "1727857",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1727857"
},
{
"category": "external",
"summary": "1744149",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1744149"
},
{
"category": "external",
"summary": "1746708",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1746708"
},
{
"category": "external",
"summary": "1753062",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753062"
},
{
"category": "external",
"summary": "1773519",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1773519"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_0204.json"
}
],
"title": "Red Hat Security Advisory: kernel security and bug fix update",
"tracking": {
"current_release_date": "2024-11-15T08:27:37+00:00",
"generator": {
"date": "2024-11-15T08:27:37+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2020:0204",
"initial_release_date": "2020-01-22T21:26:18+00:00",
"revision_history": [
{
"date": "2020-01-22T21:26:18+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2020-01-22T21:26:18+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-15T08:27:37+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:8.0::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-80.15.1.el8_0.ppc64le",
"product": {
"name": "bpftool-0:4.18.0-80.15.1.el8_0.ppc64le",
"product_id": "bpftool-0:4.18.0-80.15.1.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-80.15.1.el8_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-80.15.1.el8_0.ppc64le",
"product": {
"name": "kernel-0:4.18.0-80.15.1.el8_0.ppc64le",
"product_id": "kernel-0:4.18.0-80.15.1.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-80.15.1.el8_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"product": {
"name": "kernel-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"product_id": "kernel-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-80.15.1.el8_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"product": {
"name": "kernel-cross-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"product_id": "kernel-cross-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-80.15.1.el8_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-80.15.1.el8_0.ppc64le",
"product": {
"name": "kernel-debug-0:4.18.0-80.15.1.el8_0.ppc64le",
"product_id": "kernel-debug-0:4.18.0-80.15.1.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-80.15.1.el8_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"product": {
"name": "kernel-debug-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"product_id": "kernel-debug-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-80.15.1.el8_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"product": {
"name": "kernel-debug-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"product_id": "kernel-debug-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-80.15.1.el8_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"product": {
"name": "kernel-debug-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"product_id": "kernel-debug-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-80.15.1.el8_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"product_id": "kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-80.15.1.el8_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"product": {
"name": "kernel-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"product_id": "kernel-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-80.15.1.el8_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"product": {
"name": "kernel-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"product_id": "kernel-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-80.15.1.el8_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"product": {
"name": "kernel-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"product_id": "kernel-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-80.15.1.el8_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"product": {
"name": "kernel-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"product_id": "kernel-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-80.15.1.el8_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-80.15.1.el8_0.ppc64le",
"product": {
"name": "kernel-tools-0:4.18.0-80.15.1.el8_0.ppc64le",
"product_id": "kernel-tools-0:4.18.0-80.15.1.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-80.15.1.el8_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-80.15.1.el8_0.ppc64le",
"product": {
"name": "kernel-tools-libs-0:4.18.0-80.15.1.el8_0.ppc64le",
"product_id": "kernel-tools-libs-0:4.18.0-80.15.1.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-80.15.1.el8_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"product": {
"name": "perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"product_id": "perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-80.15.1.el8_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"product": {
"name": "python3-perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"product_id": "python3-perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-80.15.1.el8_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"product_id": "bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-80.15.1.el8_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"product_id": "kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-80.15.1.el8_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"product": {
"name": "kernel-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"product_id": "kernel-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-80.15.1.el8_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-80.15.1.el8_0.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-80.15.1.el8_0.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:4.18.0-80.15.1.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.18.0-80.15.1.el8_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"product_id": "kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-80.15.1.el8_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"product": {
"name": "perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"product_id": "perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-80.15.1.el8_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"product_id": "python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-80.15.1.el8_0?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-80.15.1.el8_0.x86_64",
"product": {
"name": "bpftool-0:4.18.0-80.15.1.el8_0.x86_64",
"product_id": "bpftool-0:4.18.0-80.15.1.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-80.15.1.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-80.15.1.el8_0.x86_64",
"product": {
"name": "kernel-0:4.18.0-80.15.1.el8_0.x86_64",
"product_id": "kernel-0:4.18.0-80.15.1.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-80.15.1.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-80.15.1.el8_0.x86_64",
"product": {
"name": "kernel-core-0:4.18.0-80.15.1.el8_0.x86_64",
"product_id": "kernel-core-0:4.18.0-80.15.1.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-80.15.1.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"product_id": "kernel-cross-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-80.15.1.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-80.15.1.el8_0.x86_64",
"product": {
"name": "kernel-debug-0:4.18.0-80.15.1.el8_0.x86_64",
"product_id": "kernel-debug-0:4.18.0-80.15.1.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-80.15.1.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-80.15.1.el8_0.x86_64",
"product": {
"name": "kernel-debug-core-0:4.18.0-80.15.1.el8_0.x86_64",
"product_id": "kernel-debug-core-0:4.18.0-80.15.1.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-80.15.1.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"product_id": "kernel-debug-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-80.15.1.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"product_id": "kernel-debug-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-80.15.1.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-80.15.1.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"product": {
"name": "kernel-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"product_id": "kernel-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-80.15.1.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"product": {
"name": "kernel-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"product_id": "kernel-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-80.15.1.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"product": {
"name": "kernel-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"product_id": "kernel-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-80.15.1.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"product_id": "kernel-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-80.15.1.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-80.15.1.el8_0.x86_64",
"product": {
"name": "kernel-tools-0:4.18.0-80.15.1.el8_0.x86_64",
"product_id": "kernel-tools-0:4.18.0-80.15.1.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-80.15.1.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-80.15.1.el8_0.x86_64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-80.15.1.el8_0.x86_64",
"product_id": "kernel-tools-libs-0:4.18.0-80.15.1.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-80.15.1.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-80.15.1.el8_0.x86_64",
"product": {
"name": "perf-0:4.18.0-80.15.1.el8_0.x86_64",
"product_id": "perf-0:4.18.0-80.15.1.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-80.15.1.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-80.15.1.el8_0.x86_64",
"product": {
"name": "python3-perf-0:4.18.0-80.15.1.el8_0.x86_64",
"product_id": "python3-perf-0:4.18.0-80.15.1.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-80.15.1.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"product_id": "bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-80.15.1.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-80.15.1.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"product_id": "kernel-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-80.15.1.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-80.15.1.el8_0.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-80.15.1.el8_0.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:4.18.0-80.15.1.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@4.18.0-80.15.1.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-80.15.1.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"product": {
"name": "perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"product_id": "perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-80.15.1.el8_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"product_id": "python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-80.15.1.el8_0?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:4.18.0-80.15.1.el8_0.src",
"product": {
"name": "kernel-0:4.18.0-80.15.1.el8_0.src",
"product_id": "kernel-0:4.18.0-80.15.1.el8_0.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-80.15.1.el8_0?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-whitelists-0:4.18.0-80.15.1.el8_0.noarch",
"product": {
"name": "kernel-abi-whitelists-0:4.18.0-80.15.1.el8_0.noarch",
"product_id": "kernel-abi-whitelists-0:4.18.0-80.15.1.el8_0.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-whitelists@4.18.0-80.15.1.el8_0?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:4.18.0-80.15.1.el8_0.noarch",
"product": {
"name": "kernel-doc-0:4.18.0-80.15.1.el8_0.noarch",
"product_id": "kernel-doc-0:4.18.0-80.15.1.el8_0.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@4.18.0-80.15.1.el8_0?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-80.15.1.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-80.15.1.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-80.15.1.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.x86_64"
},
"product_reference": "bpftool-0:4.18.0-80.15.1.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-80.15.1.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.ppc64le"
},
"product_reference": "kernel-0:4.18.0-80.15.1.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-80.15.1.el8_0.src as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.src"
},
"product_reference": "kernel-0:4.18.0-80.15.1.el8_0.src",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-80.15.1.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.x86_64"
},
"product_reference": "kernel-0:4.18.0-80.15.1.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-whitelists-0:4.18.0-80.15.1.el8_0.noarch as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.15.1.el8_0.noarch"
},
"product_reference": "kernel-abi-whitelists-0:4.18.0-80.15.1.el8_0.noarch",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-80.15.1.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-80.15.1.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-80.15.1.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-80.15.1.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-80.15.1.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-80.15.1.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-80.15.1.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-80.15.1.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-80.15.1.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-80.15.1.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-80.15.1.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-80.15.1.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-80.15.1.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-80.15.1.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-80.15.1.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-80.15.1.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-80.15.1.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.15.1.el8_0.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-80.15.1.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-80.15.1.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.15.1.el8_0.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-80.15.1.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-80.15.1.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-80.15.1.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-80.15.1.el8_0.noarch as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.15.1.el8_0.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-80.15.1.el8_0.noarch",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-80.15.1.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-80.15.1.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-80.15.1.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-80.15.1.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-80.15.1.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-80.15.1.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-80.15.1.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-80.15.1.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-80.15.1.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-80.15.1.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-80.15.1.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-80.15.1.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-80.15.1.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.ppc64le"
},
"product_reference": "perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-80.15.1.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.x86_64"
},
"product_reference": "perf-0:4.18.0-80.15.1.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-80.15.1.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-80.15.1.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-80.15.1.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v. 8.0)",
"product_id": "BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"relates_to_product_reference": "BaseOS-8.0.0.Z.E4S"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Intel"
]
},
{
"names": [
"Deepak Gupta"
],
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2018-12207",
"cwe": {
"id": "CWE-226",
"name": "Sensitive Information in Resource Not Removed Before Reuse"
},
"discovery_date": "2018-11-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1646768"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way Intel CPUs handle inconsistency between, virtual to physical memory address translations in CPU\u0027s local cache and system software\u0027s Paging structure entries. A privileged guest user may use this flaw to induce a hardware Machine Check Error on the host processor, resulting in a severe DoS scenario by halting the processor.\r\n\r\nSystem software like OS OR Virtual Machine Monitor (VMM) use virtual memory system for storing program instructions and data in memory. Virtual Memory system uses Paging structures like Page Tables and Page Directories to manage system memory. The processor\u0027s Memory Management Unit (MMU) uses Paging structure entries to translate program\u0027s virtual memory addresses to physical memory addresses. The processor stores these address translations into its local cache buffer called - Translation Lookaside Buffer (TLB). TLB has two parts, one for instructions and other for data addresses.\r\n\r\nSystem software can modify its Paging structure entries to change address mappings OR certain attributes like page size etc. Upon such Paging structure alterations in memory, system software must invalidate the corresponding address translations in the processor\u0027s TLB cache. But before this TLB invalidation takes place, a privileged guest user may trigger an instruction fetch operation, which could use an already cached, but now invalid, virtual to physical address translation from Instruction TLB (ITLB). Thus accessing an invalid physical memory address and resulting in halting the processor due to the Machine Check Error (MCE) on Page Size Change.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: Machine Check Error on Page Size Change (IFU)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.src",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-12207"
},
{
"category": "external",
"summary": "RHBZ#1646768",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646768"
},
{
"category": "external",
"summary": "RHSB-ifu-page-mce",
"url": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-12207",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12207"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-12207",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12207"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-01-22T21:26:18+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.src",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2020:0204"
},
{
"category": "workaround",
"details": "For mitigation related information, please refer to the Red Hat vulnerability article: https://access.redhat.com/security/vulnerabilities/ifu-page-mce .",
"product_ids": [
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.src",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.src",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: Machine Check Error on Page Size Change (IFU)"
},
{
"acknowledgments": [
{
"names": [
"Evgenii Shatokhin",
"Vasily Averin"
],
"organization": "Virtuozzo"
}
],
"cve": "CVE-2018-16884",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2018-12-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1660375"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u0027s NFS41+ subsystem. NFS41+ shares mounted in different network namespaces at the same time can make bc_svc_process() use wrong back-channel IDs and cause a use-after-free vulnerability. Thus a malicious container user can cause a host kernel memory corruption and a system panic. Due to the nature of the flaw, privilege escalation cannot be fully ruled out.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: nfs: use-after-free in svc_process_common()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.src",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-16884"
},
{
"category": "external",
"summary": "RHBZ#1660375",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1660375"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-16884",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16884"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-16884",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-16884"
}
],
"release_date": "2018-11-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-01-22T21:26:18+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.src",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2020:0204"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:H",
"version": "3.0"
},
"products": [
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.src",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: nfs: use-after-free in svc_process_common()"
},
{
"acknowledgments": [
{
"names": [
"Intel"
]
}
],
"cve": "CVE-2019-0154",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"discovery_date": "2019-06-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1724393"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Intel graphics hardware (GPU) where a local attacker with the ability to issue an ioctl could trigger a hardware level crash if MMIO registers were read while the graphics card was in a low-power state. This creates a denial of service situation and the GPU and connected displays will remain unusable until a reboot occurs.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: Intel GPU Denial Of Service while accessing MMIO in lower power state",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Intel plans to release BIOS firmware to correct this issue. Red Hat\u0027s kernel update should mitigate this vulnerability. Some older hardware will not have BIOS firmware update and will rely on operating system level protection to prevent access while the device is in low-power states. For more information see https://access.redhat.com/solutions/i915-graphics",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.src",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-0154"
},
{
"category": "external",
"summary": "RHBZ#1724393",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1724393"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-0154",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0154"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-0154",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0154"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/i915-graphics",
"url": "https://access.redhat.com/solutions/i915-graphics"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00260.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00260.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-01-22T21:26:18+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.src",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2020:0204"
},
{
"category": "workaround",
"details": "Preventing loading of the i915 kernel module will prevent attackers from using this exploit against the system however the power management functionality of the card will be disabled and the system may draw additional power. See this KCS article (https://access.redhat.com/solutions/41278) for instructions on how to disable a kernel module. Graphical displays may also be at low resolution or not work correctly. This mitigation may not be suitable if running graphical tools locally is required.",
"product_ids": [
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.src",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.src",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: Intel GPU Denial Of Service while accessing MMIO in lower power state"
},
{
"acknowledgments": [
{
"names": [
"Intel"
]
}
],
"cve": "CVE-2019-0155",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"discovery_date": "2019-06-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1724398"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Intel graphics hardware (GPU), where a local attacker with the ability to issue commands to the GPU could inadvertently lead to memory corruption and possible privilege escalation. The attacker could use the GPU blitter to perform privilege MMIO operations, not limited to the address space required to function correctly.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: Intel GPU blitter manipulation can allow for arbitrary kernel memory write",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/solutions/i915-graphics",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.src",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-0155"
},
{
"category": "external",
"summary": "RHBZ#1724398",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1724398"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-0155",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0155"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-0155",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0155"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/i915-graphics",
"url": "https://access.redhat.com/solutions/i915-graphics"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00242.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00242.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-01-22T21:26:18+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.src",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2020:0204"
},
{
"category": "workaround",
"details": "Preventing loading of the i915 kernel module will prevent attackers from using this exploit against the system however the power management functionality of the card will be disabled and the system may draw additional power. See this KCS article( https://access.redhat.com/solutions/41278 ) for instructions on how to disable a kernel module. Graphical displays may also be at low resolution or not work correctly. This mitigation may not be suitable if running graphical tools locally is required.",
"product_ids": [
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.src",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.src",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hw: Intel GPU blitter manipulation can allow for arbitrary kernel memory write"
},
{
"acknowledgments": [
{
"names": [
"Jason Wang"
],
"organization": "Red Hat Inc.",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2019-3900",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2019-04-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1698757"
}
],
"notes": [
{
"category": "description",
"text": "An infinite loop issue was found in the vhost_net kernel module while handling incoming packets in handle_rx(). The infinite loop could occur if one end sends packets faster than the other end can process them. A guest user, maybe a remote one, could use this flaw to stall the vhost_net kernel thread, resulting in a DoS scenario.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Kernel: vhost_net: infinite loop while receiving packets leads to DoS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue does not affect the versions of the kernel package as shipped with Red Hat Enterprise Linux 5 and Red Hat Enterprise MRG 2.\n\nThis issue affects the version of Linux kernel as shipped with Red Hat Enterprise Linux 6 and 7. Future kernel updates for Red Hat Enterprise Linux 6 and 7 may address this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.src",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-3900"
},
{
"category": "external",
"summary": "RHBZ#1698757",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1698757"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-3900",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3900"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-3900",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-3900"
}
],
"release_date": "2019-04-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-01-22T21:26:18+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.src",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2020:0204"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.src",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "Kernel: vhost_net: infinite loop while receiving packets leads to DoS"
},
{
"cve": "CVE-2019-5489",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2019-01-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1664110"
}
],
"notes": [
{
"category": "description",
"text": "A new software page cache side channel attack scenario was discovered in operating systems that implement the very common \u0027page cache\u0027 caching mechanism. A malicious user/process could use \u0027in memory\u0027 page-cache knowledge to infer access timings to shared memory and gain knowledge which can be used to reduce effectiveness of cryptographic strength by monitoring algorithmic behavior, infer access patterns of memory to determine code paths taken, and exfiltrate data to a blinded attacker through page-granularity access times as a side-channel.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Kernel: page cache side channel attacks",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.src",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-5489"
},
{
"category": "external",
"summary": "RHBZ#1664110",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1664110"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-5489",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5489"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-5489",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-5489"
}
],
"release_date": "2019-01-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-01-22T21:26:18+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.src",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2020:0204"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:L/A:N",
"version": "3.0"
},
"products": [
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.src",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "Kernel: page cache side channel attacks"
},
{
"cve": "CVE-2019-9506",
"cwe": {
"id": "CWE-327",
"name": "Use of a Broken or Risky Cryptographic Algorithm"
},
"discovery_date": "2019-06-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1727857"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was discovered in the Bluetooth protocol. An attacker within physical proximity to the Bluetooth connection could downgrade the encryption protocol to be trivially brute forced.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hardware: bluetooth: BR/EDR encryption key negotiation attacks (KNOB)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.src",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-9506"
},
{
"category": "external",
"summary": "RHBZ#1727857",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1727857"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-9506",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9506"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9506",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9506"
}
],
"release_date": "2019-08-10T09:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-01-22T21:26:18+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.src",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2020:0204"
},
{
"category": "workaround",
"details": "At this time there is no known mitigation if bluetooth hardware is to be continue to be used. Replacing the hardware with its wired version and disabling bluetooth may be a suitable alternative for some environments.",
"product_ids": [
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.src",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L",
"version": "3.0"
},
"products": [
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.src",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hardware: bluetooth: BR/EDR encryption key negotiation attacks (KNOB)"
},
{
"acknowledgments": [
{
"names": [
"huangwen"
],
"organization": "ADLab of Venustech"
}
],
"cve": "CVE-2019-10126",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2019-05-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1716992"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the mwifiex implementation in the Linux kernel. A system connecting to wireless access point could be manipulated by an attacker with advanced permissions on the access point into localized memory corruption or possibly privilege escalation.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Heap overflow in mwifiex_uap_parse_tail_ies function in drivers/net/wireless/marvell/mwifiex/ie.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.src",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-10126"
},
{
"category": "external",
"summary": "RHBZ#1716992",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1716992"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-10126",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10126"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-10126",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10126"
}
],
"release_date": "2019-05-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-01-22T21:26:18+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.src",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2020:0204"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.src",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: Heap overflow in mwifiex_uap_parse_tail_ies function in drivers/net/wireless/marvell/mwifiex/ie.c"
},
{
"acknowledgments": [
{
"names": [
"Intel"
]
}
],
"cve": "CVE-2019-11135",
"cwe": {
"id": "CWE-203",
"name": "Observable Discrepancy"
},
"discovery_date": "2019-09-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1753062"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way Intel CPUs handle speculative execution of instructions when the TSX Asynchronous Abort (TAA) error occurs. A local authenticated attacker with the ability to monitor execution times could infer the TSX memory state by comparing abort execution times. This could allow information disclosure via this observed side-channel for any TSX transaction being executed while an attacker is able to observe abort timing.\r\n\r\nIntel\u0027s Transactional Synchronisation Extensions (TSX) are set of instructions which enable transactional memory support to improve performance of the multi-threaded applications, in the lock-protected critical sections. The CPU executes instructions in the critical-sections as transactions, while ensuring their atomic state. When such transaction execution is unsuccessful, the processor cannot ensure atomic updates to the transaction memory, so the processor rolls back or aborts such transaction execution.\r\n\r\nWhile TSX Asynchronous Abort (TAA) is pending, CPU may continue to read data from architectural buffers and pass it to the dependent speculative operations. This may cause information leakage via speculative side-channel means, which is quite similar to the Microarchitectural Data Sampling (MDS) issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: TSX Transaction Asynchronous Abort (TAA)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "libvirt and qemu-kvm on Red Hat Enterprise Linux 6 are not affected by this vulnerability as they do not support MSR-based CPU features.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.src",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-11135"
},
{
"category": "external",
"summary": "RHBZ#1753062",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1753062"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-11135",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11135"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11135",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11135"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/tsx-asynchronousabort",
"url": "https://access.redhat.com/solutions/tsx-asynchronousabort"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00270.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00270.html"
}
],
"release_date": "2019-11-12T18:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-01-22T21:26:18+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.src",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2020:0204"
},
{
"category": "workaround",
"details": "For mitigation related information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/solutions/tsx-asynchronousabort",
"product_ids": [
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.src",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.src",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: TSX Transaction Asynchronous Abort (TAA)"
},
{
"acknowledgments": [
{
"names": [
"Huangwen"
],
"organization": "ADLab of Venustech"
}
],
"cve": "CVE-2019-14816",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2019-08-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1744149"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the Linux kernel\u0027s Marvell WiFi chip driver. Where, while parsing vendor-specific informational attributes, an attacker on the same WiFi physical network segment could cause a system crash, resulting in a denial of service, or potentially execute arbitrary code. This flaw affects the network interface at the most basic level meaning the attacker only needs to affiliate with the same network device as the vulnerable system to create an attack path.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: heap overflow in mwifiex_update_vs_ie() function of Marvell WiFi driver",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.src",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-14816"
},
{
"category": "external",
"summary": "RHBZ#1744149",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1744149"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-14816",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14816"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14816",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14816"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7caac62ed598a196d6ddf8d9c121e12e082cac3a",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7caac62ed598a196d6ddf8d9c121e12e082cac3a"
}
],
"release_date": "2019-08-28T10:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-01-22T21:26:18+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.src",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2020:0204"
},
{
"category": "workaround",
"details": "At this time there is no mitigation to the flaw, if you are able to disable wireless and your system is able to work this will be a temporary mitigation until a kernel update is available for installation.",
"product_ids": [
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.src",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.src",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: heap overflow in mwifiex_update_vs_ie() function of Marvell WiFi driver"
},
{
"acknowledgments": [
{
"names": [
"Matt Delco"
],
"organization": "Google.com"
}
],
"cve": "CVE-2019-14821",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2019-08-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1746708"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds access issue was found in the way Linux kernel\u0027s KVM hypervisor implements the Coalesced MMIO write operation. It operates on an MMIO ring buffer \u0027struct kvm_coalesced_mmio\u0027 object, wherein write indices \u0027ring-\u003efirst\u0027 and \u0027ring-\u003elast\u0027 value could be supplied by a host user-space process. An unprivileged host user or process with access to \u0027/dev/kvm\u0027 device could use this flaw to crash the host kernel, resulting in a denial of service or potentially escalating privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Kernel: KVM: OOB memory access via mmio ring buffer",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue requires unprivileged users to have access to \u0027/dev/kvm\u0027 device. So restricting access to \u0027/dev/kvm\u0027 device to known trusted users could limit its exploitation by untrusted users/processes.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.src",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-14821"
},
{
"category": "external",
"summary": "RHBZ#1746708",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1746708"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-14821",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14821"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14821",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14821"
}
],
"release_date": "2019-09-17T17:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-01-22T21:26:18+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.src",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2020:0204"
},
{
"category": "workaround",
"details": "Restrict access to the \u0027/dev/kvm\u0027 device to trusted users.",
"product_ids": [
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.src",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.src",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "Kernel: KVM: OOB memory access via mmio ring buffer"
},
{
"acknowledgments": [
{
"names": [
"Huangwen and Wang Qize"
],
"organization": "ADLab of VenusTech"
}
],
"cve": "CVE-2019-14901",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2019-11-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1773519"
}
],
"notes": [
{
"category": "description",
"text": "A heap overflow flaw was found in the Linux kernel\u0027s Marvell WiFi chip driver. The vulnerability allows a remote attacker to cause a system crash, resulting in a denial of service, or execute arbitrary code. The highest threat with this vulnerability is with the availability of the system. If code execution occurs, the code will run with the permissions of root. This will affect both confidentiality and integrity of files on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: heap overflow in marvell/mwifiex/tdls.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.src",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-14901"
},
{
"category": "external",
"summary": "RHBZ#1773519",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1773519"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-14901",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14901"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14901",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14901"
}
],
"release_date": "2019-11-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-01-22T21:26:18+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.src",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2020:0204"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:bpftool-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.src",
"BaseOS-8.0.0.Z.E4S:kernel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-abi-whitelists-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-cross-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-core-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debug-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-ppc64le-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-debuginfo-common-x86_64-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-devel-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-doc-0:4.18.0-80.15.1.el8_0.noarch",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-headers-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-modules-extra-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:kernel-tools-libs-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-0:4.18.0-80.15.1.el8_0.x86_64",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.ppc64le",
"BaseOS-8.0.0.Z.E4S:python3-perf-debuginfo-0:4.18.0-80.15.1.el8_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: heap overflow in marvell/mwifiex/tdls.c"
}
]
}
CERTFR-2020-AVI-817
Vulnerability from certfr_avis
Une vulnérabilité a été découverte dans F5 BIG-IP. Elle permet à un attaquant de provoquer un déni de service.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "BIG-IP 13.x versions ant\u00e9rieures \u00e0 13.1.3.5",
"product": {
"name": "BIG-IP",
"vendor": {
"name": "F5",
"scada": false
}
}
},
{
"description": "BIG-IP 14.x versions ant\u00e9rieures \u00e0 14.1.2.8",
"product": {
"name": "BIG-IP",
"vendor": {
"name": "F5",
"scada": false
}
}
},
{
"description": "BIG-IP 12.x",
"product": {
"name": "BIG-IP",
"vendor": {
"name": "F5",
"scada": false
}
}
},
{
"description": "BIG-IP 11.x",
"product": {
"name": "BIG-IP",
"vendor": {
"name": "F5",
"scada": false
}
}
},
{
"description": "BIG-IP 15.x versions ant\u00e9rieures \u00e0 15.1.0.5 et 15.0.1.4",
"product": {
"name": "BIG-IP",
"vendor": {
"name": "F5",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2018-12207",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12207"
}
],
"initial_release_date": "2020-12-11T00:00:00",
"last_revision_date": "2020-12-11T00:00:00",
"links": [],
"reference": "CERTFR-2020-AVI-817",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2020-12-11T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans F5 BIG-IP. Elle permet \u00e0 un\nattaquant de provoquer un d\u00e9ni de service.\n",
"title": "Vuln\u00e9rabilit\u00e9 dans F5 BIG-IP",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 F5 K17269881 du 05 d\u00e9cembre 2019 mis \u00e0 jour le 11 d\u00e9cembre 2020",
"url": "https://support.f5.com/csp/article/K17269881"
}
]
}
CERTFR-2019-AVI-559
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans Xen. Elles permettent à un attaquant de provoquer un déni de service à distance et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Xen toutes versions sans le dernier correctif de s\u00e9curit\u00e9",
"product": {
"name": "Xen",
"vendor": {
"name": "XEN",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2019-11135",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11135"
},
{
"name": "CVE-2018-12207",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12207"
}
],
"initial_release_date": "2019-11-13T00:00:00",
"last_revision_date": "2019-11-13T00:00:00",
"links": [],
"reference": "CERTFR-2019-AVI-559",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2019-11-13T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Xen. Elles\npermettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance et\nune atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Xen",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Xen XSA-305 du 12 novembre 2019",
"url": "https://xenbits.xen.org/xsa/advisory-305.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Xen XSA-304 du 12 novembre 2019",
"url": "https://xenbits.xen.org/xsa/advisory-304.html"
}
]
}
CERTFR-2020-AVI-618
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Stormshield. Certaines d'entre elles permettent à un attaquant de provoquer un déni de service à distance, une atteinte à la confidentialité des données et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Stormshield | Stormshield Network Security | Stormshield Network Security (SNS) versions antérieures à 4.1.1. Cette version est la seule qui corrige toutes les vulnérabilités mentionnées dans les avis Stormshield dont les liens sont présentés ici. Nous invitons nos lecteurs à faire leur propre analyse de risque quant au choix de la version qui correspond le mieux à leurs besoins. | ||
| Stormshield | N/A | Netasq versions 9.x |
| Title | Publication Time | Tags | |||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Stormshield Network Security (SNS) versions ant\u00e9rieures \u00e0 4.1.1. Cette version est la seule qui corrige toutes les vuln\u00e9rabilit\u00e9s mentionn\u00e9es dans les avis Stormshield dont les liens sont pr\u00e9sent\u00e9s ici. Nous invitons nos lecteurs \u00e0 faire leur propre analyse de risque quant au choix de la version qui correspond le mieux \u00e0 leurs besoins.",
"product": {
"name": "Stormshield Network Security",
"vendor": {
"name": "Stormshield",
"scada": false
}
}
},
{
"description": "Netasq versions 9.x",
"product": {
"name": "N/A",
"vendor": {
"name": "Stormshield",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2019-11139",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11139"
},
{
"name": "CVE-2019-0117",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0117"
},
{
"name": "CVE-2019-11157",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11157"
},
{
"name": "CVE-2020-0549",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0549"
},
{
"name": "CVE-2016-8858",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8858"
},
{
"name": "CVE-2020-11711",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11711"
},
{
"name": "CVE-2019-14607",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14607"
},
{
"name": "CVE-2018-12207",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12207"
},
{
"name": "CVE-2019-0184",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0184"
},
{
"name": "CVE-2019-0123",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0123"
},
{
"name": "CVE-2020-0548",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0548"
}
],
"initial_release_date": "2020-10-05T00:00:00",
"last_revision_date": "2020-10-05T00:00:00",
"links": [],
"reference": "CERTFR-2020-AVI-618",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2020-10-05T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nStormshield. Certaines d\u0027entre elles permettent \u00e0 un attaquant de\nprovoquer un d\u00e9ni de service \u00e0 distance, une atteinte \u00e0 la\nconfidentialit\u00e9 des donn\u00e9es et une \u00e9l\u00e9vation de privil\u00e8ges.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Stormshield",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Stormshield 2020-013 du 17 septembre 2020",
"url": "https://advisories.stormshield.eu/2020-013/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Stormshield 2020-012 du 17 septembre 2020",
"url": "https://advisories.stormshield.eu/2020-012/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Stormshield 2019-013 du 17 septembre 2020",
"url": "https://advisories.stormshield.eu/2019-013/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Stormshield 2019-026 du 17 septembre 2020",
"url": "https://advisories.stormshield.eu/2019-026/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Stormshield 2020-011 du 17 septembre 2020",
"url": "https://advisories.stormshield.eu/2020-011/"
}
]
}
CERTFR-2019-AVI-563
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les microgiciels Intel. Elles permettent à un attaquant de provoquer un déni de service à distance, une atteinte à la confidentialité des données et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Intel | N/A | Intel PTT versions antérieures à 11.8.65, 11.11.65, 11.22.65, 12.0.35, 13.0.1201 et 14.0.10 | ||
| Intel | N/A | Intel SPS versions SPS_SoC-X_x antérieures à SPS_SoC-X_04.00.04.086.0 | ||
| Intel | N/A | Intel CSME, Intel AMT, Intel DAL et Intel DAL versions 11.2x antérieures à 11.22.70 | ||
| Intel | N/A | Les processeurs Intel, voir le site du constructeur pour les modèles vulnérables (cf. section documentation) | ||
| Intel | N/A | Intel CSME, Intel AMT, Intel DAL et Intel DAL versions 13.x antérieures à 13.0.10 | ||
| Intel | N/A | Intel CSME, Intel AMT, Intel DAL et Intel DAL versions 12.0.x antérieures à 12.0.45 | ||
| Intel | N/A | Intel CSME, Intel AMT, Intel DAL et Intel DAL versions antérieures à 11.8.70 | ||
| Intel | N/A | Intel SPS versions SPS_E5_x antérieures à SPS_E5_04.00.04.381.0 | ||
| Intel | N/A | Intel SPS versions SPS_E3_x antérieures à SPS_E3_04.01.04.054.0 | ||
| Intel | N/A | Intel SPS versions SPS_SoC-A_x antérieures à SPS_SoC-A_04.00.04.181.0 | ||
| Intel | N/A | Le microgiciel des contrôleurs Ethernet Intel séries 700 versions antérieures à 7.0 | ||
| Intel | N/A | Intel Baseboard Management Controller (BMC), voir le site du constructeur pour les modèles vulnérables (cf. section documentation) | ||
| Intel | N/A | Le logiciel pour contrôleurs Ethernet Intel séries 700 versions antérieure à 24.0 | ||
| Intel | N/A | Intel TXE versions 3.0.x et 3.1.x antérieures à 3.1.70 | ||
| Intel | N/A | Intel CSME, Intel AMT, Intel DAL et Intel DAL versions 11.10.x et 11.11.x antérieures à 11.11.70 | ||
| Intel | N/A | Intel CSME, Intel AMT, Intel DAL et Intel DAL versions 14.x antérieures à 14.0.10 | ||
| Intel | N/A | Intel TXE versions 4.0.x antérieures à 4.0.20 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Intel PTT versions ant\u00e9rieures \u00e0 11.8.65, 11.11.65, 11.22.65, 12.0.35, 13.0.1201 et 14.0.10",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel SPS versions SPS_SoC-X_x ant\u00e9rieures \u00e0 SPS_SoC-X_04.00.04.086.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel CSME, Intel AMT, Intel DAL et Intel DAL versions 11.2x ant\u00e9rieures \u00e0 11.22.70",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Les processeurs Intel, voir le site du constructeur pour les mod\u00e8les vuln\u00e9rables (cf. section documentation)",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel CSME, Intel AMT, Intel DAL et Intel DAL versions 13.x ant\u00e9rieures \u00e0 13.0.10",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel CSME, Intel AMT, Intel DAL et Intel DAL versions 12.0.x ant\u00e9rieures \u00e0 12.0.45",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel CSME, Intel AMT, Intel DAL et Intel DAL versions ant\u00e9rieures \u00e0 11.8.70",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel SPS versions SPS_E5_x ant\u00e9rieures \u00e0 SPS_E5_04.00.04.381.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel SPS versions SPS_E3_x ant\u00e9rieures \u00e0 SPS_E3_04.01.04.054.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel SPS versions SPS_SoC-A_x ant\u00e9rieures \u00e0 SPS_SoC-A_04.00.04.181.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Le microgiciel des contr\u00f4leurs Ethernet Intel s\u00e9ries 700 versions ant\u00e9rieures \u00e0 7.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Baseboard Management Controller (BMC), voir le site du constructeur pour les mod\u00e8les vuln\u00e9rables (cf. section documentation)",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Le logiciel pour contr\u00f4leurs Ethernet Intel s\u00e9ries 700 versions ant\u00e9rieure \u00e0 24.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel TXE versions 3.0.x et 3.1.x ant\u00e9rieures \u00e0 3.1.70",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel CSME, Intel AMT, Intel DAL et Intel DAL versions 11.10.x et 11.11.x ant\u00e9rieures \u00e0 11.11.70",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel CSME, Intel AMT, Intel DAL et Intel DAL versions 14.x ant\u00e9rieures \u00e0 14.0.10",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel TXE versions 4.0.x ant\u00e9rieures \u00e0 4.0.20",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2019-0143",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0143"
},
{
"name": "CVE-2019-11179",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11179"
},
{
"name": "CVE-2019-11139",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11139"
},
{
"name": "CVE-2019-0150",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0150"
},
{
"name": "CVE-2019-0152",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0152"
},
{
"name": "CVE-2019-0169",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0169"
},
{
"name": "CVE-2019-11097",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11097"
},
{
"name": "CVE-2019-0117",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0117"
},
{
"name": "CVE-2019-11170",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11170"
},
{
"name": "CVE-2019-11132",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11132"
},
{
"name": "CVE-2019-11086",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11086"
},
{
"name": "CVE-2019-11137",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11137"
},
{
"name": "CVE-2019-0154",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0154"
},
{
"name": "CVE-2019-11106",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11106"
},
{
"name": "CVE-2019-11175",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11175"
},
{
"name": "CVE-2019-0139",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0139"
},
{
"name": "CVE-2019-0140",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0140"
},
{
"name": "CVE-2019-11172",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11172"
},
{
"name": "CVE-2019-11177",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11177"
},
{
"name": "CVE-2019-11135",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11135"
},
{
"name": "CVE-2019-0168",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0168"
},
{
"name": "CVE-2019-11103",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11103"
},
{
"name": "CVE-2019-11107",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11107"
},
{
"name": "CVE-2019-0141",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0141"
},
{
"name": "CVE-2019-11136",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11136"
},
{
"name": "CVE-2019-0149",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0149"
},
{
"name": "CVE-2019-11181",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11181"
},
{
"name": "CVE-2019-11110",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11110"
},
{
"name": "CVE-2019-0144",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0144"
},
{
"name": "CVE-2019-11173",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11173"
},
{
"name": "CVE-2019-11182",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11182"
},
{
"name": "CVE-2019-11102",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11102"
},
{
"name": "CVE-2019-11088",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11088"
},
{
"name": "CVE-2019-11105",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11105"
},
{
"name": "CVE-2019-0124",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0124"
},
{
"name": "CVE-2019-0151",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0151"
},
{
"name": "CVE-2019-11168",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11168"
},
{
"name": "CVE-2019-11101",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11101"
},
{
"name": "CVE-2019-11171",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11171"
},
{
"name": "CVE-2018-12207",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12207"
},
{
"name": "CVE-2019-0142",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0142"
},
{
"name": "CVE-2019-11131",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11131"
},
{
"name": "CVE-2019-0146",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0146"
},
{
"name": "CVE-2019-11090",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11090"
},
{
"name": "CVE-2019-0131",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0131"
},
{
"name": "CVE-2019-11109",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11109"
},
{
"name": "CVE-2019-11178",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11178"
},
{
"name": "CVE-2019-0166",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0166"
},
{
"name": "CVE-2019-0184",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0184"
},
{
"name": "CVE-2019-0123",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0123"
},
{
"name": "CVE-2019-11180",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11180"
},
{
"name": "CVE-2019-11104",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11104"
},
{
"name": "CVE-2019-0148",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0148"
},
{
"name": "CVE-2019-11087",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11087"
},
{
"name": "CVE-2019-11174",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11174"
},
{
"name": "CVE-2019-0145",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0145"
},
{
"name": "CVE-2019-11108",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11108"
},
{
"name": "CVE-2019-0147",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0147"
},
{
"name": "CVE-2019-11100",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11100"
},
{
"name": "CVE-2019-0165",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0165"
},
{
"name": "CVE-2019-11147",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11147"
}
],
"initial_release_date": "2019-11-13T00:00:00",
"last_revision_date": "2019-11-13T00:00:00",
"links": [],
"reference": "CERTFR-2019-AVI-563",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2019-11-13T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les microgiciels\nIntel. Elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0\ndistance, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une \u00e9l\u00e9vation\nde privil\u00e8ges.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les microgiciels Intel",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00313 du 12 novembre 2019",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00219 du 12 novembre 2019",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00219.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00270 du 12 novembre 2019",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00270.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00210 du 12 novembre 2019",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00240 du 12 novembre 2019",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00240.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00255 du 12 novembre 2019",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00255.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00271 du 12 novembre 2019",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00271.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00260 du 12 novembre 2019",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00260.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00280 du 12 novembre 2019",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00280.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00164 du 12 novembre 2019",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00164.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00241 du 12 novembre 2019",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00220 du 12 novembre 2019",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00220.html"
}
]
}
CERTFR-2019-AVI-560
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits VMware. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | ESXi | ESXi versions 6.0.x antérieures à ESXi600-201911401-BG ou ESXi600-201911402-BG | ||
| VMware | Fusion | Fusion versions 11.x antérieures à 11.5.1 | ||
| VMware | ESXi | ESXi versions 6.5.x antérieures à ESXi650-201911401-BG ou ESXi650-201911402-BG | ||
| VMware | ESXi | ESXi versions 6.7.x antérieures à ESXi670-201911401-BG ou ESXi670-201911402-BG | ||
| VMware | N/A | Workstation versions 15.x antérieures à 15.5.1 |
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "ESXi versions 6.0.x ant\u00e9rieures \u00e0 ESXi600-201911401-BG ou ESXi600-201911402-BG",
"product": {
"name": "ESXi",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Fusion versions 11.x ant\u00e9rieures \u00e0 11.5.1",
"product": {
"name": "Fusion",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "ESXi versions 6.5.x ant\u00e9rieures \u00e0 ESXi650-201911401-BG ou ESXi650-201911402-BG",
"product": {
"name": "ESXi",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "ESXi versions 6.7.x ant\u00e9rieures \u00e0 ESXi670-201911401-BG ou ESXi670-201911402-BG",
"product": {
"name": "ESXi",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Workstation versions 15.x ant\u00e9rieures \u00e0 15.5.1",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2019-11135",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11135"
},
{
"name": "CVE-2019-5542",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5542"
},
{
"name": "CVE-2018-12207",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12207"
},
{
"name": "CVE-2019-5541",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5541"
},
{
"name": "CVE-2019-5540",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5540"
}
],
"initial_release_date": "2019-11-13T00:00:00",
"last_revision_date": "2019-11-13T00:00:00",
"links": [],
"reference": "CERTFR-2019-AVI-560",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2019-11-13T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nVMware. Elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de\ncode arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une\natteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 VMware VMSA-2019-0021 du 12 novembre 2019",
"url": "https://www.vmware.com/security/advisories/VMSA-2019-0021.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 VMware VMSA-2019-0020 du 12 novembre 2019",
"url": "https://www.vmware.com/security/advisories/VMSA-2019-0020.html"
}
]
}
CERTFR-2019-AVI-561
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, une exécution de code arbitraire à distance et un déni de service.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP3-BCL | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP3-LTSS | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Open Buildservice Development Tools 15 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Legacy Software 15-SP1 | ||
| SUSE | N/A | SUSE Enterprise Storage 5 | ||
| SUSE | SUSE Linux Enterprise Desktop | SUSE Linux Enterprise Desktop 12-SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Development Tools 15-SP1 | ||
| SUSE | N/A | SUSE Linux Enterprise Software Development Kit 12-SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Development Tools 15 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP 12-SP3 | ||
| SUSE | N/A | SUSE CaaS Platform 3.0 | ||
| SUSE | N/A | HPE Helion Openstack 8 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15-SP1 | ||
| SUSE | N/A | SUSE Linux Enterprise Workstation Extension 12-SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise Workstation Extension 15-SP1 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Basesystem 15 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 15 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Basesystem 15-SP1 | ||
| SUSE | N/A | SUSE Linux Enterprise Workstation Extension 15 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Open Buildservice Development Tools 15-SP1 | ||
| SUSE | N/A | SUSE OpenStack Cloud 8 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Legacy Software 15 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 15-SP1 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Public Cloud 15-SP1 | ||
| SUSE | N/A | SUSE OpenStack Cloud Crowbar 8 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 12-SP4 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 12-SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 12-SP3 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise Server 12-SP3-BCL",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Open Buildservice Development Tools 15",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Legacy Software 15-SP1",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Enterprise Storage 5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Desktop 12-SP4",
"product": {
"name": "SUSE Linux Enterprise Desktop",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Development Tools 15-SP1",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Software Development Kit 12-SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Development Tools 15",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP 12-SP3",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE CaaS Platform 3.0",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "HPE Helion Openstack 8",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15-SP1",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Workstation Extension 12-SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Workstation Extension 15-SP1",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Basesystem 15",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 15",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Basesystem 15-SP1",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Workstation Extension 15",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Open Buildservice Development Tools 15-SP1",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE OpenStack Cloud 8",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-SP4",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Legacy Software 15",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 15-SP1",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Public Cloud 15-SP1",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE OpenStack Cloud Crowbar 8",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 12-SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 12-SP4",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 12-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2017-18509",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18509"
},
{
"name": "CVE-2019-15505",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15505"
},
{
"name": "CVE-2019-16995",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16995"
},
{
"name": "CVE-2019-15221",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15221"
},
{
"name": "CVE-2017-18379",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18379"
},
{
"name": "CVE-2019-15118",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15118"
},
{
"name": "CVE-2019-14821",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14821"
},
{
"name": "CVE-2019-15215",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15215"
},
{
"name": "CVE-2019-0155",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0155"
},
{
"name": "CVE-2019-16413",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16413"
},
{
"name": "CVE-2019-10207",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10207"
},
{
"name": "CVE-2019-0154",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0154"
},
{
"name": "CVE-2019-15217",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15217"
},
{
"name": "CVE-2019-15214",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15214"
},
{
"name": "CVE-2019-15291",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15291"
},
{
"name": "CVE-2019-16234",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16234"
},
{
"name": "CVE-2019-15212",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15212"
},
{
"name": "CVE-2016-10906",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-10906"
},
{
"name": "CVE-2019-15927",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15927"
},
{
"name": "CVE-2019-11135",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11135"
},
{
"name": "CVE-2019-16232",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16232"
},
{
"name": "CVE-2019-18805",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18805"
},
{
"name": "CVE-2019-13272",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13272"
},
{
"name": "CVE-2019-14814",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14814"
},
{
"name": "CVE-2019-14815",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14815"
},
{
"name": "CVE-2019-15924",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15924"
},
{
"name": "CVE-2019-17666",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17666"
},
{
"name": "CVE-2019-15807",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15807"
},
{
"name": "CVE-2019-15098",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15098"
},
{
"name": "CVE-2019-15220",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15220"
},
{
"name": "CVE-2018-20976",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20976"
},
{
"name": "CVE-2019-17056",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17056"
},
{
"name": "CVE-2019-14835",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14835"
},
{
"name": "CVE-2019-15219",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15219"
},
{
"name": "CVE-2019-15211",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15211"
},
{
"name": "CVE-2019-15239",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15239"
},
{
"name": "CVE-2019-11477",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11477"
},
{
"name": "CVE-2018-12207",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12207"
},
{
"name": "CVE-2019-17133",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17133"
},
{
"name": "CVE-2019-10220",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10220"
},
{
"name": "CVE-2019-15290",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15290"
},
{
"name": "CVE-2019-15218",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15218"
},
{
"name": "CVE-2019-16233",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16233"
},
{
"name": "CVE-2017-18595",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18595"
},
{
"name": "CVE-2019-17055",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17055"
},
{
"name": "CVE-2019-14816",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14816"
},
{
"name": "CVE-2019-9506",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9506"
},
{
"name": "CVE-2019-15902",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15902"
},
{
"name": "CVE-2017-18551",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18551"
},
{
"name": "CVE-2019-9456",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9456"
},
{
"name": "CVE-2019-15666",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15666"
},
{
"name": "CVE-2019-15216",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15216"
},
{
"name": "CVE-2019-15926",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15926"
}
],
"initial_release_date": "2019-11-13T00:00:00",
"last_revision_date": "2019-11-14T00:00:00",
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-201914218-1 du 12 novembre 2019",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-201914218-1/"
}
],
"reference": "CERTFR-2019-AVI-561",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2019-11-13T00:00:00.000000"
},
{
"description": "Nouveaux correctifs",
"revision_date": "2019-11-14T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un\nprobl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, une ex\u00e9cution de code\narbitraire \u00e0 distance et un d\u00e9ni de service.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20192950-1 du 12 novembre 2019",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192950-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20192946-1 du 12 novembre 2019",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192946-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20192953-1 du 12 novembre 2019",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192953-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-201914218-1 du 13 novembre 2019",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20192952-1 du 12 novembre 2019",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192952-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20192949-1 du 12 novembre 2019",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192949-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20192951-1 du 12 novembre 2019",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192951-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20192948-1 du 12 novembre 2019",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192948-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20192947-1 du 12 novembre 2019",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192947-1/"
}
]
}
CERTFR-2022-AVI-267
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans Juniper Networks Junos Space. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Juniper Networks | Junos Space | Juniper Networks Junos Space versions antérieures à 21.1R1 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Juniper Networks Junos Space versions ant\u00e9rieures \u00e0 21.1R1",
"product": {
"name": "Junos Space",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2017-13078",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13078"
},
{
"name": "CVE-2017-13077",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13077"
},
{
"name": "CVE-2017-13080",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13080"
},
{
"name": "CVE-2017-13082",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13082"
},
{
"name": "CVE-2017-13088",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13088"
},
{
"name": "CVE-2017-13086",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13086"
},
{
"name": "CVE-2017-13087",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13087"
},
{
"name": "CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
},
{
"name": "CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"name": "CVE-2007-1351",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-1351"
},
{
"name": "CVE-2007-1352",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-1352"
},
{
"name": "CVE-2007-6284",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-6284"
},
{
"name": "CVE-2008-2935",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2935"
},
{
"name": "CVE-2008-3281",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3281"
},
{
"name": "CVE-2008-3529",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3529"
},
{
"name": "CVE-2008-4226",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-4226"
},
{
"name": "CVE-2008-4225",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-4225"
},
{
"name": "CVE-2009-2414",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2414"
},
{
"name": "CVE-2009-2416",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2416"
},
{
"name": "CVE-2008-5161",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5161"
},
{
"name": "CVE-2010-4008",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4008"
},
{
"name": "CVE-2011-0411",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0411"
},
{
"name": "CVE-2011-1720",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1720"
},
{
"name": "CVE-2011-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0216"
},
{
"name": "CVE-2011-2834",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2834"
},
{
"name": "CVE-2011-2895",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2895"
},
{
"name": "CVE-2011-3905",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3905"
},
{
"name": "CVE-2011-3919",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3919"
},
{
"name": "CVE-2012-0841",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0841"
},
{
"name": "CVE-2011-1944",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1944"
},
{
"name": "CVE-2012-2807",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2807"
},
{
"name": "CVE-2012-2870",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2870"
},
{
"name": "CVE-2012-5134",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5134"
},
{
"name": "CVE-2011-3102",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3102"
},
{
"name": "CVE-2013-2877",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2877"
},
{
"name": "CVE-2013-0338",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0338"
},
{
"name": "CVE-2012-6139",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-6139"
},
{
"name": "CVE-2013-2566",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2566"
},
{
"name": "CVE-2013-6462",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-6462"
},
{
"name": "CVE-2014-0211",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0211"
},
{
"name": "CVE-2014-3660",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3660"
},
{
"name": "CVE-2015-1803",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1803"
},
{
"name": "CVE-2015-1804",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1804"
},
{
"name": "CVE-2015-1802",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1802"
},
{
"name": "CVE-2015-2716",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2716"
},
{
"name": "CVE-2015-5352",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5352"
},
{
"name": "CVE-2015-2808",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2808"
},
{
"name": "CVE-2014-8991",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8991"
},
{
"name": "CVE-2014-7185",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-7185"
},
{
"name": "CVE-2014-9365",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9365"
},
{
"name": "CVE-2015-6838",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-6838"
},
{
"name": "CVE-2015-6837",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-6837"
},
{
"name": "CVE-2015-7995",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7995"
},
{
"name": "CVE-2015-8035",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8035"
},
{
"name": "CVE-2015-7499",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7499"
},
{
"name": "CVE-2015-8242",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8242"
},
{
"name": "CVE-2015-7500",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7500"
},
{
"name": "CVE-2016-1762",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1762"
},
{
"name": "CVE-2015-5312",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5312"
},
{
"name": "CVE-2016-1839",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1839"
},
{
"name": "CVE-2016-1833",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1833"
},
{
"name": "CVE-2016-1837",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1837"
},
{
"name": "CVE-2016-1834",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1834"
},
{
"name": "CVE-2016-1840",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1840"
},
{
"name": "CVE-2016-1836",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1836"
},
{
"name": "CVE-2016-1838",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1838"
},
{
"name": "CVE-2016-1684",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1684"
},
{
"name": "CVE-2016-1683",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1683"
},
{
"name": "CVE-2016-4448",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4448"
},
{
"name": "CVE-2016-4447",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4447"
},
{
"name": "CVE-2016-4449",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4449"
},
{
"name": "CVE-2016-5131",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5131"
},
{
"name": "CVE-2015-0975",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0975"
},
{
"name": "CVE-2016-4658",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4658"
},
{
"name": "CVE-2016-2183",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2183"
},
{
"name": "CVE-2016-3627",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3627"
},
{
"name": "CVE-2016-3115",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3115"
},
{
"name": "CVE-2016-5636",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5636"
},
{
"name": "CVE-2017-7375",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7375"
},
{
"name": "CVE-2017-7376",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7376"
},
{
"name": "CVE-2017-7773",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7773"
},
{
"name": "CVE-2017-7772",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7772"
},
{
"name": "CVE-2017-7778",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7778"
},
{
"name": "CVE-2017-7771",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7771"
},
{
"name": "CVE-2017-7774",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7774"
},
{
"name": "CVE-2017-7776",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7776"
},
{
"name": "CVE-2017-7777",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7777"
},
{
"name": "CVE-2017-7775",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7775"
},
{
"name": "CVE-2017-6463",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6463"
},
{
"name": "CVE-2017-6462",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6462"
},
{
"name": "CVE-2017-6464",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6464"
},
{
"name": "CVE-2017-14492",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14492"
},
{
"name": "CVE-2017-14496",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14496"
},
{
"name": "CVE-2017-14491",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14491"
},
{
"name": "CVE-2017-14493",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14493"
},
{
"name": "CVE-2017-14494",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14494"
},
{
"name": "CVE-2017-14495",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14495"
},
{
"name": "CVE-2017-5130",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5130"
},
{
"name": "CVE-2017-3736",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3736"
},
{
"name": "CVE-2017-3735",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3735"
},
{
"name": "CVE-2017-15412",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15412"
},
{
"name": "CVE-2017-3738",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3738"
},
{
"name": "CVE-2017-3737",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3737"
},
{
"name": "CVE-2017-17807",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17807"
},
{
"name": "CVE-2018-0739",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0739"
},
{
"name": "CVE-2017-16931",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16931"
},
{
"name": "CVE-2018-11214",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11214"
},
{
"name": "CVE-2015-9019",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-9019"
},
{
"name": "CVE-2017-18258",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18258"
},
{
"name": "CVE-2017-16932",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16932"
},
{
"name": "CVE-2016-9318",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9318"
},
{
"name": "CVE-2018-1000120",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000120"
},
{
"name": "CVE-2018-1000007",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000007"
},
{
"name": "CVE-2018-1000121",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000121"
},
{
"name": "CVE-2018-1000122",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000122"
},
{
"name": "CVE-2018-0732",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0732"
},
{
"name": "CVE-2018-6914",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-6914"
},
{
"name": "CVE-2017-0898",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0898"
},
{
"name": "CVE-2018-8778",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8778"
},
{
"name": "CVE-2017-14033",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14033"
},
{
"name": "CVE-2018-8780",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8780"
},
{
"name": "CVE-2017-17742",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17742"
},
{
"name": "CVE-2017-10784",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10784"
},
{
"name": "CVE-2017-17405",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17405"
},
{
"name": "CVE-2018-8779",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8779"
},
{
"name": "CVE-2017-14064",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14064"
},
{
"name": "CVE-2018-8777",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8777"
},
{
"name": "CVE-2018-16395",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16395"
},
{
"name": "CVE-2018-0737",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0737"
},
{
"name": "CVE-2018-16396",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16396"
},
{
"name": "CVE-2018-0495",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0495"
},
{
"name": "CVE-2018-0734",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0734"
},
{
"name": "CVE-2018-5407",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5407"
},
{
"name": "CVE-2018-1126",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1126"
},
{
"name": "CVE-2018-7858",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7858"
},
{
"name": "CVE-2018-1124",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1124"
},
{
"name": "CVE-2018-10897",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10897"
},
{
"name": "CVE-2018-1064",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1064"
},
{
"name": "CVE-2018-5683",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5683"
},
{
"name": "CVE-2017-13672",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13672"
},
{
"name": "CVE-2018-11212",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11212"
},
{
"name": "CVE-2017-18267",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18267"
},
{
"name": "CVE-2018-13988",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13988"
},
{
"name": "CVE-2018-20169",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20169"
},
{
"name": "CVE-2018-19985",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-19985"
},
{
"name": "CVE-2019-1559",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1559"
},
{
"name": "CVE-2019-6133",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6133"
},
{
"name": "CVE-2018-18311",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18311"
},
{
"name": "CVE-2018-12127",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12127"
},
{
"name": "CVE-2018-12130",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12130"
},
{
"name": "CVE-2019-11091",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11091"
},
{
"name": "CVE-2018-12126",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12126"
},
{
"name": "CVE-2019-9503",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9503"
},
{
"name": "CVE-2019-10132",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10132"
},
{
"name": "CVE-2019-11190",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11190"
},
{
"name": "CVE-2019-11884",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11884"
},
{
"name": "CVE-2019-11487",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11487"
},
{
"name": "CVE-2019-12382",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12382"
},
{
"name": "CVE-2018-7191",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7191"
},
{
"name": "CVE-2019-5953",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5953"
},
{
"name": "CVE-2019-12614",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12614"
},
{
"name": "CVE-2019-11729",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11729"
},
{
"name": "CVE-2019-11727",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11727"
},
{
"name": "CVE-2019-11719",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11719"
},
{
"name": "CVE-2018-1060",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1060"
},
{
"name": "CVE-2018-12327",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12327"
},
{
"name": "CVE-2018-1061",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1061"
},
{
"name": "CVE-2019-10639",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10639"
},
{
"name": "CVE-2019-10638",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10638"
},
{
"name": "CVE-2018-20836",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20836"
},
{
"name": "CVE-2019-13233",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13233"
},
{
"name": "CVE-2019-14283",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14283"
},
{
"name": "CVE-2019-13648",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13648"
},
{
"name": "CVE-2019-10207",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10207"
},
{
"name": "CVE-2015-9289",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-9289"
},
{
"name": "CVE-2019-14816",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14816"
},
{
"name": "CVE-2019-15239",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15239"
},
{
"name": "CVE-2019-15917",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15917"
},
{
"name": "CVE-2017-18551",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18551"
},
{
"name": "CVE-2019-15217",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15217"
},
{
"name": "CVE-2019-14821",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14821"
},
{
"name": "CVE-2019-11068",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11068"
},
{
"name": "CVE-2018-18066",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18066"
},
{
"name": "CVE-2019-15903",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15903"
},
{
"name": "CVE-2019-17666",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17666"
},
{
"name": "CVE-2019-17133",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17133"
},
{
"name": "CVE-2018-12207",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12207"
},
{
"name": "CVE-2019-11135",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11135"
},
{
"name": "CVE-2019-0154",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0154"
},
{
"name": "CVE-2019-17055",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17055"
},
{
"name": "CVE-2019-17053",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17053"
},
{
"name": "CVE-2019-16746",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16746"
},
{
"name": "CVE-2019-0155",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0155"
},
{
"name": "CVE-2019-16233",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16233"
},
{
"name": "CVE-2019-15807",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15807"
},
{
"name": "CVE-2019-16231",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16231"
},
{
"name": "CVE-2019-11756",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11756"
},
{
"name": "CVE-2019-11745",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11745"
},
{
"name": "CVE-2019-19058",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19058"
},
{
"name": "CVE-2019-14895",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14895"
},
{
"name": "CVE-2019-19046",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19046"
},
{
"name": "CVE-2019-15916",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15916"
},
{
"name": "CVE-2019-18660",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18660"
},
{
"name": "CVE-2019-19063",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19063"
},
{
"name": "CVE-2019-19062",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19062"
},
{
"name": "CVE-2018-14526",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14526"
},
{
"name": "CVE-2019-13734",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13734"
},
{
"name": "CVE-2019-19530",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19530"
},
{
"name": "CVE-2019-19534",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19534"
},
{
"name": "CVE-2019-19524",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19524"
},
{
"name": "CVE-2019-14901",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14901"
},
{
"name": "CVE-2019-19537",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19537"
},
{
"name": "CVE-2019-19523",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19523"
},
{
"name": "CVE-2019-19338",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19338"
},
{
"name": "CVE-2019-19332",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19332"
},
{
"name": "CVE-2019-19527",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19527"
},
{
"name": "CVE-2019-18808",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18808"
},
{
"name": "CVE-2019-19767",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19767"
},
{
"name": "CVE-2019-19807",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19807"
},
{
"name": "CVE-2019-19055",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19055"
},
{
"name": "CVE-2019-17023",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17023"
},
{
"name": "CVE-2019-9824",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9824"
},
{
"name": "CVE-2019-9636",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9636"
},
{
"name": "CVE-2019-12749",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12749"
},
{
"name": "CVE-2019-19447",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19447"
},
{
"name": "CVE-2019-20095",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20095"
},
{
"name": "CVE-2019-20054",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20054"
},
{
"name": "CVE-2019-18634",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18634"
},
{
"name": "CVE-2019-14898",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14898"
},
{
"name": "CVE-2019-16994",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16994"
},
{
"name": "CVE-2019-18282",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18282"
},
{
"name": "CVE-2020-2732",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2732"
},
{
"name": "CVE-2019-19059",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19059"
},
{
"name": "CVE-2019-3901",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3901"
},
{
"name": "CVE-2020-9383",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9383"
},
{
"name": "CVE-2020-8647",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8647"
},
{
"name": "CVE-2020-8649",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8649"
},
{
"name": "CVE-2020-1749",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1749"
},
{
"name": "CVE-2019-9458",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9458"
},
{
"name": "CVE-2020-10942",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10942"
},
{
"name": "CVE-2019-9454",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9454"
},
{
"name": "CVE-2020-11565",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11565"
},
{
"name": "CVE-2020-10690",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10690"
},
{
"name": "CVE-2020-10751",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10751"
},
{
"name": "CVE-2020-12826",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12826"
},
{
"name": "CVE-2020-12654",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12654"
},
{
"name": "CVE-2020-10732",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10732"
},
{
"name": "CVE-2019-20636",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20636"
},
{
"name": "CVE-2019-20811",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20811"
},
{
"name": "CVE-2020-12653",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12653"
},
{
"name": "CVE-2020-10757",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10757"
},
{
"name": "CVE-2020-12770",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12770"
},
{
"name": "CVE-2020-12888",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12888"
},
{
"name": "CVE-2020-12402",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12402"
},
{
"name": "CVE-2018-16881",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16881"
},
{
"name": "CVE-2018-19519",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-19519"
},
{
"name": "CVE-2020-10713",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10713"
},
{
"name": "CVE-2020-14311",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14311"
},
{
"name": "CVE-2020-14309",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14309"
},
{
"name": "CVE-2020-15706",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15706"
},
{
"name": "CVE-2020-14308",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14308"
},
{
"name": "CVE-2020-14310",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14310"
},
{
"name": "CVE-2020-15705",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15705"
},
{
"name": "CVE-2020-15707",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15707"
},
{
"name": "CVE-2020-14331",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14331"
},
{
"name": "CVE-2020-10769",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10769"
},
{
"name": "CVE-2020-14364",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14364"
},
{
"name": "CVE-2020-12400",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12400"
},
{
"name": "CVE-2020-12401",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12401"
},
{
"name": "CVE-2020-6829",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-6829"
},
{
"name": "CVE-2020-14314",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14314"
},
{
"name": "CVE-2020-24394",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24394"
},
{
"name": "CVE-2020-25212",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25212"
},
{
"name": "CVE-2020-14305",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14305"
},
{
"name": "CVE-2020-10742",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10742"
},
{
"name": "CVE-2020-14385",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14385"
},
{
"name": "CVE-2020-25643",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25643"
},
{
"name": "CVE-2020-15999",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15999"
},
{
"name": "CVE-2018-20843",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20843"
},
{
"name": "CVE-2018-5729",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5729"
},
{
"name": "CVE-2018-5730",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5730"
},
{
"name": "CVE-2020-13817",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13817"
},
{
"name": "CVE-2020-11868",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11868"
},
{
"name": "CVE-2021-3156",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3156"
},
{
"name": "CVE-2019-17006",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17006"
},
{
"name": "CVE-2019-13232",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13232"
},
{
"name": "CVE-2020-10531",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10531"
},
{
"name": "CVE-2019-8696",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8696"
},
{
"name": "CVE-2019-20907",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20907"
},
{
"name": "CVE-2019-8675",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8675"
},
{
"name": "CVE-2017-12652",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12652"
},
{
"name": "CVE-2019-12450",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12450"
},
{
"name": "CVE-2020-12825",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12825"
},
{
"name": "CVE-2020-12243",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12243"
},
{
"name": "CVE-2019-14866",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14866"
},
{
"name": "CVE-2020-1983",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1983"
},
{
"name": "CVE-2019-5188",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5188"
},
{
"name": "CVE-2019-5094",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5094"
},
{
"name": "CVE-2020-10754",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10754"
},
{
"name": "CVE-2020-12049",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12049"
},
{
"name": "CVE-2019-14822",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14822"
},
{
"name": "CVE-2020-14363",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14363"
},
{
"name": "CVE-2019-9924",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9924"
},
{
"name": "CVE-2018-18751",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18751"
},
{
"name": "CVE-2019-9948",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9948"
},
{
"name": "CVE-2019-20386",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20386"
},
{
"name": "CVE-2017-13722",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13722"
},
{
"name": "CVE-2014-0210",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0210"
},
{
"name": "CVE-2018-16403",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16403"
},
{
"name": "CVE-2018-15746",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15746"
},
{
"name": "CVE-2014-6272",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6272"
},
{
"name": "CVE-2019-7638",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7638"
},
{
"name": "CVE-2015-8241",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8241"
},
{
"name": "CVE-2019-10155",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10155"
},
{
"name": "CVE-2018-11813",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11813"
},
{
"name": "CVE-2018-18310",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18310"
},
{
"name": "CVE-2018-1084",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1084"
},
{
"name": "CVE-2020-12662",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12662"
},
{
"name": "CVE-2012-4423",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-4423"
},
{
"name": "CVE-2017-0902",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0902"
},
{
"name": "CVE-2018-8945",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8945"
},
{
"name": "CVE-2017-0899",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0899"
},
{
"name": "CVE-2010-2239",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2239"
},
{
"name": "CVE-2010-2242",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2242"
},
{
"name": "CVE-2017-14167",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14167"
},
{
"name": "CVE-2015-0225",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0225"
},
{
"name": "CVE-2019-11324",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11324"
},
{
"name": "CVE-2013-6458",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-6458"
},
{
"name": "CVE-2018-1000075",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000075"
},
{
"name": "CVE-2018-15857",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15857"
},
{
"name": "CVE-2018-16062",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16062"
},
{
"name": "CVE-2018-10534",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10534"
},
{
"name": "CVE-2014-0179",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0179"
},
{
"name": "CVE-2018-18384",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18384"
},
{
"name": "CVE-2013-1766",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1766"
},
{
"name": "CVE-2016-6580",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-6580"
},
{
"name": "CVE-2018-12697",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12697"
},
{
"name": "CVE-2018-1000301",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000301"
},
{
"name": "CVE-2019-11236",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11236"
},
{
"name": "CVE-2019-12155",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12155"
},
{
"name": "CVE-2017-0900",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0900"
},
{
"name": "CVE-2014-3598",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3598"
},
{
"name": "CVE-2017-1000050",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000050"
},
{
"name": "CVE-2018-10535",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10535"
},
{
"name": "CVE-2019-3820",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3820"
},
{
"name": "CVE-2018-16402",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16402"
},
{
"name": "CVE-2018-1116",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1116"
},
{
"name": "CVE-2018-15853",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15853"
},
{
"name": "CVE-2019-14378",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14378"
},
{
"name": "CVE-2016-1494",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1494"
},
{
"name": "CVE-2019-12312",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12312"
},
{
"name": "CVE-2013-0339",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0339"
},
{
"name": "CVE-2019-16935",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16935"
},
{
"name": "CVE-2015-6525",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-6525"
},
{
"name": "CVE-2016-6581",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-6581"
},
{
"name": "CVE-2013-4520",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4520"
},
{
"name": "CVE-2014-3633",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3633"
},
{
"name": "CVE-2014-3004",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3004"
},
{
"name": "CVE-2015-9381",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-9381"
},
{
"name": "CVE-2016-5361",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5361"
},
{
"name": "CVE-2018-14598",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14598"
},
{
"name": "CVE-2014-1447",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-1447"
},
{
"name": "CVE-2018-20852",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20852"
},
{
"name": "CVE-2012-2693",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2693"
},
{
"name": "CVE-2018-7208",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7208"
},
{
"name": "CVE-2018-12910",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12910"
},
{
"name": "CVE-2019-8325",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8325"
},
{
"name": "CVE-2015-7497",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7497"
},
{
"name": "CVE-2019-7665",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7665"
},
{
"name": "CVE-2018-15854",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15854"
},
{
"name": "CVE-2019-13404",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13404"
},
{
"name": "CVE-2015-5160",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5160"
},
{
"name": "CVE-2018-10767",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10767"
},
{
"name": "CVE-2018-7550",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7550"
},
{
"name": "CVE-2016-3076",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3076"
},
{
"name": "CVE-2018-14404",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14404"
},
{
"name": "CVE-2018-18521",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18521"
},
{
"name": "CVE-2018-19788",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-19788"
},
{
"name": "CVE-2019-8322",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8322"
},
{
"name": "CVE-2019-3840",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3840"
},
{
"name": "CVE-2016-9189",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9189"
},
{
"name": "CVE-2015-9262",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-9262"
},
{
"name": "CVE-2018-14647",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14647"
},
{
"name": "CVE-2019-17041",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17041"
},
{
"name": "CVE-2019-14906",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14906"
},
{
"name": "CVE-2018-1000073",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000073"
},
{
"name": "CVE-2019-9947",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9947"
},
{
"name": "CVE-2017-1000158",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000158"
},
{
"name": "CVE-2019-7635",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7635"
},
{
"name": "CVE-2019-7576",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7576"
},
{
"name": "CVE-2019-14834",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14834"
},
{
"name": "CVE-2018-15855",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15855"
},
{
"name": "CVE-2019-7149",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7149"
},
{
"name": "CVE-2018-7642",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7642"
},
{
"name": "CVE-2019-5010",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5010"
},
{
"name": "CVE-2018-12641",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12641"
},
{
"name": "CVE-2021-3396",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3396"
},
{
"name": "CVE-2020-12403",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12403"
},
{
"name": "CVE-2017-15268",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15268"
},
{
"name": "CVE-2018-15587",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15587"
},
{
"name": "CVE-2016-10746",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-10746"
},
{
"name": "CVE-2017-13711",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13711"
},
{
"name": "CVE-2014-8131",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8131"
},
{
"name": "CVE-2014-9601",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9601"
},
{
"name": "CVE-2014-3657",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3657"
},
{
"name": "CVE-2018-10373",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10373"
},
{
"name": "CVE-2017-17790",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17790"
},
{
"name": "CVE-2011-2511",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2511"
},
{
"name": "CVE-2018-1000802",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000802"
},
{
"name": "CVE-2017-7555",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7555"
},
{
"name": "CVE-2016-9015",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9015"
},
{
"name": "CVE-2017-13720",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13720"
},
{
"name": "CVE-2018-11782",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11782"
},
{
"name": "CVE-2017-11671",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11671"
},
{
"name": "CVE-2017-10664",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10664"
},
{
"name": "CVE-2018-11213",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11213"
},
{
"name": "CVE-2013-6457",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-6457"
},
{
"name": "CVE-2019-10138",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10138"
},
{
"name": "CVE-2019-7578",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7578"
},
{
"name": "CVE-2020-7039",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-7039"
},
{
"name": "CVE-2017-11368",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11368"
},
{
"name": "CVE-2018-0494",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0494"
},
{
"name": "CVE-2019-20485",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20485"
},
{
"name": "CVE-2003-1418",
"url": "https://www.cve.org/CVERecord?id=CVE-2003-1418"
},
{
"name": "CVE-2017-15289",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15289"
},
{
"name": "CVE-2016-5391",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5391"
},
{
"name": "CVE-2017-2810",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2810"
},
{
"name": "CVE-2018-15864",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15864"
},
{
"name": "CVE-2017-18207",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18207"
},
{
"name": "CVE-2019-12761",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12761"
},
{
"name": "CVE-2013-5651",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5651"
},
{
"name": "CVE-2017-17522",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17522"
},
{
"name": "CVE-2019-20382",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20382"
},
{
"name": "CVE-2016-2533",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2533"
},
{
"name": "CVE-2019-14287",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14287"
},
{
"name": "CVE-2018-18520",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18520"
},
{
"name": "CVE-2019-9740",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9740"
},
{
"name": "CVE-2019-7575",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7575"
},
{
"name": "CVE-2015-5652",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5652"
},
{
"name": "CVE-2019-7572",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7572"
},
{
"name": "CVE-2017-6519",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6519"
},
{
"name": "CVE-2018-10906",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10906"
},
{
"name": "CVE-2018-15863",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15863"
},
{
"name": "CVE-2018-15862",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15862"
},
{
"name": "CVE-2018-1000079",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000079"
},
{
"name": "CVE-2019-7664",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7664"
},
{
"name": "CVE-2017-5992",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5992"
},
{
"name": "CVE-2019-16865",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16865"
},
{
"name": "CVE-2019-8324",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8324"
},
{
"name": "CVE-2018-1000076",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000076"
},
{
"name": "CVE-2018-1000030",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000030"
},
{
"name": "CVE-2018-1000074",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000074"
},
{
"name": "CVE-2017-0901",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0901"
},
{
"name": "CVE-2018-7568",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7568"
},
{
"name": "CVE-2016-0775",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0775"
},
{
"name": "CVE-2018-15688",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15688"
},
{
"name": "CVE-2018-14599",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14599"
},
{
"name": "CVE-2018-10733",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10733"
},
{
"name": "CVE-2016-9396",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9396"
},
{
"name": "CVE-2019-10160",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10160"
},
{
"name": "CVE-2017-7562",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7562"
},
{
"name": "CVE-2016-1000032",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000032"
},
{
"name": "CVE-2017-15124",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15124"
},
{
"name": "CVE-2018-1113",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1113"
},
{
"name": "CVE-2013-4399",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4399"
},
{
"name": "CVE-2019-7636",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7636"
},
{
"name": "CVE-2014-3672",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3672"
},
{
"name": "CVE-2018-4700",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4700"
},
{
"name": "CVE-2017-0903",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0903"
},
{
"name": "CVE-2018-15856",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15856"
},
{
"name": "CVE-2018-1000078",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000078"
},
{
"name": "CVE-2019-7573",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7573"
},
{
"name": "CVE-2018-1000077",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000077"
},
{
"name": "CVE-2010-2237",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2237"
},
{
"name": "CVE-2018-1000876",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000876"
},
{
"name": "CVE-2018-14348",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14348"
},
{
"name": "CVE-2019-3890",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3890"
},
{
"name": "CVE-2015-7498",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7498"
},
{
"name": "CVE-2019-7577",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7577"
},
{
"name": "CVE-2016-0740",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0740"
},
{
"name": "CVE-2018-4180",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4180"
},
{
"name": "CVE-2013-4297",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4297"
},
{
"name": "CVE-2010-2238",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2238"
},
{
"name": "CVE-2018-14600",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14600"
},
{
"name": "CVE-2017-13090",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13090"
},
{
"name": "CVE-2013-7336",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-7336"
},
{
"name": "CVE-2018-10372",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10372"
},
{
"name": "CVE-2019-7637",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7637"
},
{
"name": "CVE-2018-11806",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11806"
},
{
"name": "CVE-2018-7643",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7643"
},
{
"name": "CVE-2015-0236",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0236"
},
{
"name": "CVE-2018-1000117",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000117"
},
{
"name": "CVE-2014-0209",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0209"
},
{
"name": "CVE-2013-2230",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2230"
},
{
"name": "CVE-2018-1122",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1122"
},
{
"name": "CVE-2014-3960",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3960"
},
{
"name": "CVE-2019-16056",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16056"
},
{
"name": "CVE-2020-12663",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12663"
},
{
"name": "CVE-2018-10768",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10768"
},
{
"name": "CVE-2017-16611",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16611"
},
{
"name": "CVE-2014-7823",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-7823"
},
{
"name": "CVE-2020-10703",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10703"
},
{
"name": "CVE-2018-7569",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7569"
},
{
"name": "CVE-2013-4154",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4154"
},
{
"name": "CVE-2018-20060",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20060"
},
{
"name": "CVE-2015-9382",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-9382"
},
{
"name": "CVE-2017-18190",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18190"
},
{
"name": "CVE-2016-4009",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4009"
},
{
"name": "CVE-2018-13033",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13033"
},
{
"name": "CVE-2016-9190",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9190"
},
{
"name": "CVE-2019-7574",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7574"
},
{
"name": "CVE-2016-0772",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0772"
},
{
"name": "CVE-2016-5699",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5699"
},
{
"name": "CVE-2011-1486",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1486"
},
{
"name": "CVE-2020-5208",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-5208"
},
{
"name": "CVE-2019-6778",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6778"
},
{
"name": "CVE-2020-10772",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10772"
},
{
"name": "CVE-2020-25637",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25637"
},
{
"name": "CVE-2018-10360",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10360"
},
{
"name": "CVE-2018-15859",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15859"
},
{
"name": "CVE-2017-13089",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13089"
},
{
"name": "CVE-2019-12779",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12779"
},
{
"name": "CVE-2019-1010238",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1010238"
},
{
"name": "CVE-2019-6690",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6690"
},
{
"name": "CVE-2015-8317",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8317"
},
{
"name": "CVE-2018-4181",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4181"
},
{
"name": "CVE-2019-8323",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8323"
},
{
"name": "CVE-2016-3616",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3616"
},
{
"name": "CVE-2018-14498",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14498"
},
{
"name": "CVE-2018-15861",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15861"
},
{
"name": "CVE-2019-7150",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7150"
},
{
"name": "CVE-2019-17042",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17042"
},
{
"name": "CVE-2016-5008",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5008"
},
{
"name": "CVE-2014-4616",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4616"
}
],
"initial_release_date": "2022-03-23T00:00:00",
"last_revision_date": "2022-03-23T00:00:00",
"links": [],
"reference": "CERTFR-2022-AVI-267",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-03-23T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Juniper Networks\nJunos Space. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de\ns\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Juniper Networks Junos Space",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11176 du 22 mars 2022",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11176\u0026cat=SIRT_1\u0026actp=LIST"
}
]
}
CERTFR-2019-AVI-555
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux d'Ubuntu. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, un déni de service et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Ubuntu 16.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 19.10",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 18.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 19.04",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 12.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 14.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2019-17052",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17052"
},
{
"name": "CVE-2019-0155",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0155"
},
{
"name": "CVE-2019-0154",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0154"
},
{
"name": "CVE-2019-11135",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11135"
},
{
"name": "CVE-2019-2215",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2215"
},
{
"name": "CVE-2019-17666",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17666"
},
{
"name": "CVE-2019-15098",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15098"
},
{
"name": "CVE-2019-16746",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16746"
},
{
"name": "CVE-2019-17054",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17054"
},
{
"name": "CVE-2019-17056",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17056"
},
{
"name": "CVE-2018-12207",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12207"
},
{
"name": "CVE-2019-15792",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15792"
},
{
"name": "CVE-2019-17055",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17055"
},
{
"name": "CVE-2019-15791",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15791"
},
{
"name": "CVE-2019-15793",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15793"
},
{
"name": "CVE-2019-17053",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17053"
}
],
"initial_release_date": "2019-11-13T00:00:00",
"last_revision_date": "2019-11-14T00:00:00",
"links": [],
"reference": "CERTFR-2019-AVI-555",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2019-11-13T00:00:00.000000"
},
{
"description": "Nouveaux correctifs",
"revision_date": "2019-11-14T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux\nd\u0027Ubuntu. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nune ex\u00e9cution de code arbitraire, un d\u00e9ni de service et un contournement\nde la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux d\u0027Ubuntu",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-4183-1 du 13 novembre 2019",
"url": "https://usn.ubuntu.com/4183-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-4188-1 du 13 novembre 2019",
"url": "https://usn.ubuntu.com/4188-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-4186-2 du 13 novembre 2019",
"url": "https://usn.ubuntu.com/4186-2/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-4184-2 du 13 novembre 2019",
"url": "https://usn.ubuntu.com/4184-2/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-4185-2 du 13 novembre 2019",
"url": "https://usn.ubuntu.com/4185-2/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-4183-2 du 13 novembre 2019",
"url": "https://usn.ubuntu.com/4183-2/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-4186-1 du 13 novembre 2019",
"url": "https://usn.ubuntu.com/4186-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-4186-3 du 13 novembre 2019",
"url": "https://usn.ubuntu.com/4186-3/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-4185-1 du 13 novembre 2019",
"url": "https://usn.ubuntu.com/4185-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-4185-3 du 13 novembre 2019",
"url": "https://usn.ubuntu.com/4185-3/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-4184-1 du 13 novembre 2019",
"url": "https://usn.ubuntu.com/4184-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-4187-1 du 13 novembre 2019",
"url": "https://usn.ubuntu.com/4187-1/"
}
]
}
CERTFR-2019-AVI-558
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Citrix. Elles permettent à un attaquant de provoquer un déni de service à distance, une atteinte à la confidentialité des données et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Citrix | XenServer | Citrix XenServer 7.1 LTSR CU2 sans le dernier correctif de sécurité | ||
| Citrix | N/A | Citrix MPX/SDX 8900, 14000-40G/14000-40S/14000-40C, 15000-25G/15000-50G, 25000-40G, 26000/26000-50G avec le protocole Link Layer Discovery Protocol (LLDP) activé | ||
| Citrix | XenServer | Citrix XenServer 7.0 sans le dernier correctif de sécurité | ||
| Citrix | Citrix Hypervisor | Citrix Hypervisor 8.0 sans une mise à jour du pilote pour les cartes réseau Intel série 700 | ||
| Citrix | XenServer | Citrix XenServer 7.1 LTSR CU2 sans une mise à jour du pilote pour les cartes réseau Intel série 700 | ||
| Citrix | XenServer | Citrix XenServer 7.6 sans le dernier correctif de sécurité | ||
| Citrix | Citrix Hypervisor | Citrix Hypervisor 8.0 sans le dernier correctif de sécurité |
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Citrix XenServer 7.1 LTSR CU2 sans le dernier correctif de s\u00e9curit\u00e9",
"product": {
"name": "XenServer",
"vendor": {
"name": "Citrix",
"scada": false
}
}
},
{
"description": "Citrix MPX/SDX 8900, 14000-40G/14000-40S/14000-40C, 15000-25G/15000-50G, 25000-40G, 26000/26000-50G avec le protocole Link Layer Discovery Protocol (LLDP) activ\u00e9",
"product": {
"name": "N/A",
"vendor": {
"name": "Citrix",
"scada": false
}
}
},
{
"description": "Citrix XenServer 7.0 sans le dernier correctif de s\u00e9curit\u00e9",
"product": {
"name": "XenServer",
"vendor": {
"name": "Citrix",
"scada": false
}
}
},
{
"description": "Citrix Hypervisor 8.0 sans une mise \u00e0 jour du pilote pour les cartes r\u00e9seau Intel s\u00e9rie 700",
"product": {
"name": "Citrix Hypervisor",
"vendor": {
"name": "Citrix",
"scada": false
}
}
},
{
"description": "Citrix XenServer 7.1 LTSR CU2 sans une mise \u00e0 jour du pilote pour les cartes r\u00e9seau Intel s\u00e9rie 700",
"product": {
"name": "XenServer",
"vendor": {
"name": "Citrix",
"scada": false
}
}
},
{
"description": "Citrix XenServer 7.6 sans le dernier correctif de s\u00e9curit\u00e9",
"product": {
"name": "XenServer",
"vendor": {
"name": "Citrix",
"scada": false
}
}
},
{
"description": "Citrix Hypervisor 8.0 sans le dernier correctif de s\u00e9curit\u00e9",
"product": {
"name": "Citrix Hypervisor",
"vendor": {
"name": "Citrix",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2019-0140",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0140"
},
{
"name": "CVE-2019-11135",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11135"
},
{
"name": "CVE-2018-12207",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12207"
}
],
"initial_release_date": "2019-11-13T00:00:00",
"last_revision_date": "2019-11-13T00:00:00",
"links": [],
"reference": "CERTFR-2019-AVI-558",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2019-11-13T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nCitrix. Elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service\n\u00e0 distance, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une\n\u00e9l\u00e9vation de privil\u00e8ges.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Citrix",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Citrix CTX263807 du 12 novembre 2019",
"url": "https://support.citrix.com/article/CTX263807"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Citrix CTX263684 du 12 novembre 2019",
"url": "https://support.citrix.com/article/CTX263684"
}
]
}
CERTFR-2019-AVI-571
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de Debian. Elles permettent à un attaquant de provoquer un déni de service, une atteinte à la confidentialité des données et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "",
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2019-0155",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0155"
},
{
"name": "CVE-2019-0154",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0154"
},
{
"name": "CVE-2019-11135",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11135"
},
{
"name": "CVE-2018-12207",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12207"
}
],
"initial_release_date": "2019-11-14T00:00:00",
"last_revision_date": "2019-11-14T00:00:00",
"links": [],
"reference": "CERTFR-2019-AVI-571",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2019-11-14T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nDebian. Elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service,\nune atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une \u00e9l\u00e9vation de\nprivil\u00e8ges.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de Debian",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Debian DSA-4564-1 du 12 novembre 2019",
"url": "https://www.debian.org/security/2019/dsa-4564"
}
]
}
CERTFR-2020-AVI-029
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, une exécution de code arbitraire à distance et un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP5 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise Server 12-SP5",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2019-15916",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15916"
},
{
"name": "CVE-2019-19082",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19082"
},
{
"name": "CVE-2019-16995",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16995"
},
{
"name": "CVE-2019-19533",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19533"
},
{
"name": "CVE-2019-19529",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19529"
},
{
"name": "CVE-2019-18809",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18809"
},
{
"name": "CVE-2019-14821",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14821"
},
{
"name": "CVE-2019-19966",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19966"
},
{
"name": "CVE-2019-19227",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19227"
},
{
"name": "CVE-2019-0155",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0155"
},
{
"name": "CVE-2019-19524",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19524"
},
{
"name": "CVE-2019-15030",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15030"
},
{
"name": "CVE-2019-19073",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19073"
},
{
"name": "CVE-2019-19543",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19543"
},
{
"name": "CVE-2019-19526",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19526"
},
{
"name": "CVE-2019-0154",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0154"
},
{
"name": "CVE-2019-19060",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19060"
},
{
"name": "CVE-2019-14901",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14901"
},
{
"name": "CVE-2019-19527",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19527"
},
{
"name": "CVE-2019-19332",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19332"
},
{
"name": "CVE-2019-16231",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16231"
},
{
"name": "CVE-2019-16234",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16234"
},
{
"name": "CVE-2019-19319",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19319"
},
{
"name": "CVE-2019-19536",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19536"
},
{
"name": "CVE-2019-19062",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19062"
},
{
"name": "CVE-2019-18683",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18683"
},
{
"name": "CVE-2019-15213",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15213"
},
{
"name": "CVE-2019-19063",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19063"
},
{
"name": "CVE-2019-19767",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19767"
},
{
"name": "CVE-2019-19078",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19078"
},
{
"name": "CVE-2019-19532",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19532"
},
{
"name": "CVE-2019-11135",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11135"
},
{
"name": "CVE-2019-19046",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19046"
},
{
"name": "CVE-2019-16232",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16232"
},
{
"name": "CVE-2019-19338",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19338"
},
{
"name": "CVE-2019-19523",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19523"
},
{
"name": "CVE-2019-18805",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18805"
},
{
"name": "CVE-2019-19083",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19083"
},
{
"name": "CVE-2019-19052",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19052"
},
{
"name": "CVE-2019-17666",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17666"
},
{
"name": "CVE-2019-16746",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16746"
},
{
"name": "CVE-2019-19049",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19049"
},
{
"name": "CVE-2019-19077",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19077"
},
{
"name": "CVE-2019-19067",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19067"
},
{
"name": "CVE-2019-19080",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19080"
},
{
"name": "CVE-2019-19057",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19057"
},
{
"name": "CVE-2019-18808",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18808"
},
{
"name": "CVE-2019-17056",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17056"
},
{
"name": "CVE-2019-19528",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19528"
},
{
"name": "CVE-2019-14835",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14835"
},
{
"name": "CVE-2019-15031",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15031"
},
{
"name": "CVE-2019-19056",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19056"
},
{
"name": "CVE-2019-19058",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19058"
},
{
"name": "CVE-2018-12207",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12207"
},
{
"name": "CVE-2019-19525",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19525"
},
{
"name": "CVE-2019-19075",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19075"
},
{
"name": "CVE-2019-17133",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17133"
},
{
"name": "CVE-2019-10220",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10220"
},
{
"name": "CVE-2019-19534",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19534"
},
{
"name": "CVE-2019-19537",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19537"
},
{
"name": "CVE-2019-20054",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20054"
},
{
"name": "CVE-2019-19051",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19051"
},
{
"name": "CVE-2019-19530",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19530"
},
{
"name": "CVE-2019-19068",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19068"
},
{
"name": "CVE-2019-19081",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19081"
},
{
"name": "CVE-2019-19066",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19066"
},
{
"name": "CVE-2019-16233",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16233"
},
{
"name": "CVE-2019-19447",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19447"
},
{
"name": "CVE-2017-18595",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18595"
},
{
"name": "CVE-2019-20095",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20095"
},
{
"name": "CVE-2019-17055",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17055"
},
{
"name": "CVE-2019-19065",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19065"
},
{
"name": "CVE-2019-9506",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9506"
},
{
"name": "CVE-2019-20096",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20096"
},
{
"name": "CVE-2019-18660",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18660"
},
{
"name": "CVE-2019-19074",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19074"
},
{
"name": "CVE-2019-9456",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9456"
},
{
"name": "CVE-2019-14895",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14895"
},
{
"name": "CVE-2019-19531",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19531"
},
{
"name": "CVE-2019-19535",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19535"
}
],
"initial_release_date": "2020-01-15T00:00:00",
"last_revision_date": "2020-01-15T00:00:00",
"links": [],
"reference": "CERTFR-2020-AVI-029",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2020-01-15T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un\nprobl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, une ex\u00e9cution de code\narbitraire \u00e0 distance et un d\u00e9ni de service \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20200093-1 du 14 janvier 2020",
"url": "https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1/"
}
]
}
CERTFR-2020-AVI-436
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans Oracle Systems. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Oracle ZFS Storage Appliance Kit 8.8 sans les derniers correctifs de s\u00e9curit\u00e9",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Solaris 11.x sans les derniers correctifs de s\u00e9curit\u00e9",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2020-14724",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14724"
},
{
"name": "CVE-2020-11656",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11656"
},
{
"name": "CVE-2019-5489",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5489"
},
{
"name": "CVE-2020-14542",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14542"
},
{
"name": "CVE-2020-14545",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14545"
},
{
"name": "CVE-2018-12207",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12207"
},
{
"name": "CVE-2020-14537",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14537"
}
],
"initial_release_date": "2020-07-15T00:00:00",
"last_revision_date": "2020-07-15T00:00:00",
"links": [],
"reference": "CERTFR-2020-AVI-436",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2020-07-15T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Oracle Systems.\nElles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code\narbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0\nla confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Oracle Systems",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 d\u00e9taill\u00e9 Oracle cpujul2020 du 14 juillet 2020",
"url": "https://www.oracle.com/security-alerts/cpujul2020verbose.html#SUNS"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Oracle cpujul2020 du 14 juillet 2020",
"url": "https://www.oracle.com/security-alerts/cpujul2020.html"
}
]
}
CERTFR-2020-AVI-056
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de Red Hat. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Update Services for SAP Solutions 8.0 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 8.0 ppc64le |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Red Hat Enterprise Linux Server - Update Services for SAP Solutions 8.0 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 8.0 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2019-14821",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14821"
},
{
"name": "CVE-2019-0155",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0155"
},
{
"name": "CVE-2019-0154",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0154"
},
{
"name": "CVE-2019-14901",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14901"
},
{
"name": "CVE-2019-11135",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11135"
},
{
"name": "CVE-2019-5489",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5489"
},
{
"name": "CVE-2019-3900",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3900"
},
{
"name": "CVE-2018-12207",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12207"
},
{
"name": "CVE-2018-16884",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16884"
},
{
"name": "CVE-2019-10126",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10126"
},
{
"name": "CVE-2019-14816",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14816"
},
{
"name": "CVE-2019-9506",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9506"
}
],
"initial_release_date": "2020-01-24T00:00:00",
"last_revision_date": "2020-01-24T00:00:00",
"links": [],
"reference": "CERTFR-2020-AVI-056",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2020-01-24T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nRed Hat. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nune ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0\ndistance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de Red Hat",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2020:0204 du 22 janvier 2020",
"url": "https://access.redhat.com/errata/RHSA-2020:0204"
}
]
}
CERTFR-2019-AVI-635
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, un déni de service et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise Module for Realtime 15-SP1",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Real Time Extension 12-SP4",
"product": {
"name": "SUSE Linux Enterprise Real Time",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Open Buildservice Development Tools 15-SP1",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2019-15916",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15916"
},
{
"name": "CVE-2019-16995",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16995"
},
{
"name": "CVE-2019-14821",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14821"
},
{
"name": "CVE-2019-0155",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0155"
},
{
"name": "CVE-2019-0154",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0154"
},
{
"name": "CVE-2019-16231",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16231"
},
{
"name": "CVE-2019-15291",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15291"
},
{
"name": "CVE-2019-16234",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16234"
},
{
"name": "CVE-2019-11135",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11135"
},
{
"name": "CVE-2019-16232",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16232"
},
{
"name": "CVE-2019-18805",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18805"
},
{
"name": "CVE-2019-17666",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17666"
},
{
"name": "CVE-2019-17056",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17056"
},
{
"name": "CVE-2018-12207",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12207"
},
{
"name": "CVE-2019-17133",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17133"
},
{
"name": "CVE-2019-10220",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10220"
},
{
"name": "CVE-2019-16233",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16233"
},
{
"name": "CVE-2017-18595",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18595"
},
{
"name": "CVE-2019-17055",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17055"
},
{
"name": "CVE-2019-9506",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9506"
}
],
"initial_release_date": "2019-12-16T00:00:00",
"last_revision_date": "2019-12-16T00:00:00",
"links": [],
"reference": "CERTFR-2019-AVI-635",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2019-12-16T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un\nprobl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, un d\u00e9ni de service et\nun contournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20193295-1 du 13 d\u00e9cembre 2019",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20193295-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20193294-1 du 13 d\u00e9cembre 2019",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20193294-1/"
}
]
}
CERTFR-2019-AVI-575
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, une exécution de code arbitraire à distance et un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP2-LTSS | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 12-SP2 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP2-BCL | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP 12-SP2 | ||
| SUSE | N/A | SUSE OpenStack Cloud 7 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise Server 12-SP2-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 12-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-SP2-BCL",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP 12-SP2",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE OpenStack Cloud 7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2017-18509",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18509"
},
{
"name": "CVE-2019-15505",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15505"
},
{
"name": "CVE-2019-16995",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16995"
},
{
"name": "CVE-2019-15221",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15221"
},
{
"name": "CVE-2019-14821",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14821"
},
{
"name": "CVE-2019-15215",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15215"
},
{
"name": "CVE-2019-0155",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0155"
},
{
"name": "CVE-2019-16413",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16413"
},
{
"name": "CVE-2019-18680",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18680"
},
{
"name": "CVE-2019-0154",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0154"
},
{
"name": "CVE-2019-15217",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15217"
},
{
"name": "CVE-2019-16231",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16231"
},
{
"name": "CVE-2019-15214",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15214"
},
{
"name": "CVE-2019-15291",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15291"
},
{
"name": "CVE-2019-16234",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16234"
},
{
"name": "CVE-2019-15212",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15212"
},
{
"name": "CVE-2016-10906",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-10906"
},
{
"name": "CVE-2019-15927",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15927"
},
{
"name": "CVE-2019-11135",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11135"
},
{
"name": "CVE-2019-16232",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16232"
},
{
"name": "CVE-2019-18805",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18805"
},
{
"name": "CVE-2019-13272",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13272"
},
{
"name": "CVE-2019-14814",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14814"
},
{
"name": "CVE-2019-14815",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14815"
},
{
"name": "CVE-2019-15924",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15924"
},
{
"name": "CVE-2019-17666",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17666"
},
{
"name": "CVE-2019-15807",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15807"
},
{
"name": "CVE-2019-15098",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15098"
},
{
"name": "CVE-2019-15220",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15220"
},
{
"name": "CVE-2018-20976",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20976"
},
{
"name": "CVE-2019-17056",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17056"
},
{
"name": "CVE-2019-14835",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14835"
},
{
"name": "CVE-2019-15219",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15219"
},
{
"name": "CVE-2019-15211",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15211"
},
{
"name": "CVE-2018-12207",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12207"
},
{
"name": "CVE-2019-17133",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17133"
},
{
"name": "CVE-2019-10220",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10220"
},
{
"name": "CVE-2019-15290",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15290"
},
{
"name": "CVE-2019-15218",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15218"
},
{
"name": "CVE-2019-16233",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16233"
},
{
"name": "CVE-2017-18595",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18595"
},
{
"name": "CVE-2019-17055",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17055"
},
{
"name": "CVE-2019-14816",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14816"
},
{
"name": "CVE-2019-9506",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9506"
},
{
"name": "CVE-2019-15902",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15902"
},
{
"name": "CVE-2019-9456",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9456"
},
{
"name": "CVE-2019-15666",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15666"
},
{
"name": "CVE-2019-15216",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15216"
},
{
"name": "CVE-2019-15926",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15926"
}
],
"initial_release_date": "2019-11-18T00:00:00",
"last_revision_date": "2019-11-18T00:00:00",
"links": [],
"reference": "CERTFR-2019-AVI-575",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2019-11-18T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un\nprobl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, une ex\u00e9cution de code\narbitraire \u00e0 distance et un d\u00e9ni de service \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20192984-1 du 15 novembre 2019",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192984-1/"
}
]
}
CERTFR-2019-AVI-568
Vulnerability from certfr_avis
De multiples vulnérabilités ont été corrigées dans Microsoft Windows. Elles permettent à un attaquant de provoquer une élévation de privilèges, un contournement de la fonctionnalité de sécurité, une usurpation d'identité, un déni de service, une atteinte à la confidentialité des données et une exécution de code à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Microsoft | Windows | Windows Server 2012 | ||
| Microsoft | Windows | Windows 10 pour systèmes x64 | ||
| Microsoft | Windows | Windows 10 Version 1809 pour systèmes x64 | ||
| Microsoft | Windows | Windows 10 Version 1903 pour systèmes x64 | ||
| Microsoft | Windows | Windows Server 2019 (Server Core installation) | ||
| Microsoft | Windows | Windows Server 2019 | ||
| Microsoft | Windows | Windows Server 2012 R2 | ||
| Microsoft | Windows | Windows Server 2008 R2 pour systèmes Itanium Service Pack 1 | ||
| Microsoft | Windows | Windows 10 Version 1803 pour systèmes 32 bits | ||
| Microsoft | Windows | Windows 10 Version 1607 pour systèmes 32 bits | ||
| Microsoft | Windows | Windows 10 Version 1803 pour systèmes x64 | ||
| Microsoft | Windows | Windows Server 2008 pour systèmes x64 Service Pack 2 | ||
| Microsoft | Windows | Windows Defender | ||
| Microsoft | Windows | Windows 10 Version 1809 pour systèmes 32 bits | ||
| Microsoft | Windows | Windows Server, version 1803 (Server Core Installation) | ||
| Microsoft | Windows | Windows 10 Version 1709 pour systèmes 32 bits | ||
| Microsoft | Windows | Windows Server 2016 (Server Core installation) | ||
| Microsoft | Windows | Windows 10 Version 1903 pour systèmes 32 bits | ||
| Microsoft | Windows | Windows RT 8.1 | ||
| Microsoft | Windows | Windows 10 Mobile | ||
| Microsoft | Windows | Windows 7 pour systèmes x64 Service Pack 1 | ||
| Microsoft | Windows | Windows 10 Version 1809 pour ARM64-based Systems | ||
| Microsoft | Windows | Windows 10 Version 1709 pour ARM64-based Systems | ||
| Microsoft | Windows | Windows Server 2008 pour systèmes x64 Service Pack 2 (Server Core installation) | ||
| Microsoft | Windows | Windows Server 2008 pour systèmes 32 bits Service Pack 2 (Server Core installation) | ||
| Microsoft | Windows | Windows 10 Version 1607 pour systèmes x64 | ||
| Microsoft | Windows | Windows Update Assistant | ||
| Microsoft | Windows | Windows 10 Version 1703 pour systèmes x64 | ||
| Microsoft | Windows | Windows Server 2012 (Server Core installation) | ||
| Microsoft | Windows | Windows 10 Version 1803 pour ARM64-based Systems | ||
| Microsoft | Windows | Windows Server 2008 pour systèmes 32 bits Service Pack 2 | ||
| Microsoft | Windows | Windows Server 2008 R2 pour systèmes x64 Service Pack 1 | ||
| Microsoft | Windows | Windows 8.1 pour systèmes x64 | ||
| Microsoft | Windows | Windows 10 Version 1703 pour systèmes 32 bits | ||
| Microsoft | Windows | Windows Server 2016 | ||
| Microsoft | Windows | Windows Server 2008 pour systèmes Itanium Service Pack 2 | ||
| Microsoft | Windows | Windows 10 Version 1903 pour ARM64-based Systems | ||
| Microsoft | Windows | Windows 8.1 pour systèmes 32 bits | ||
| Microsoft | Windows | Windows Server 2008 R2 pour systèmes x64 Service Pack 1 (Server Core installation) | ||
| Microsoft | Windows | Windows Server 2012 R2 (Server Core installation) | ||
| Microsoft | Windows | Windows 10 pour systèmes 32 bits | ||
| Microsoft | Windows | Windows 7 pour systèmes 32 bits Service Pack 1 | ||
| Microsoft | Windows | Windows 10 Version 1709 pour 64-based Systems | ||
| Microsoft | Windows | Windows Server, version 1903 (Server Core installation) |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Windows Server 2012",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 pour syst\u00e8mes x64",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1809 pour syst\u00e8mes x64",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1903 pour syst\u00e8mes x64",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2019 (Server Core installation)",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2019",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 R2",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 R2 pour syst\u00e8mes Itanium Service Pack 1",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1803 pour syst\u00e8mes 32 bits",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1607 pour syst\u00e8mes 32 bits",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1803 pour syst\u00e8mes x64",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes x64 Service Pack 2",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Defender",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1809 pour syst\u00e8mes 32 bits",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server, version 1803 (Server Core Installation)",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1709 pour syst\u00e8mes 32 bits",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2016 (Server Core installation)",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1903 pour syst\u00e8mes 32 bits",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows RT 8.1",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Mobile",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 7 pour syst\u00e8mes x64 Service Pack 1",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1809 pour ARM64-based Systems",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1709 pour ARM64-based Systems",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes x64 Service Pack 2 (Server Core installation)",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes 32 bits Service Pack 2 (Server Core installation)",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1607 pour syst\u00e8mes x64",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Update Assistant",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1703 pour syst\u00e8mes x64",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 (Server Core installation)",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1803 pour ARM64-based Systems",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes 32 bits Service Pack 2",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 R2 pour syst\u00e8mes x64 Service Pack 1",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 8.1 pour syst\u00e8mes x64",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1703 pour syst\u00e8mes 32 bits",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2016",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes Itanium Service Pack 2",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1903 pour ARM64-based Systems",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 8.1 pour syst\u00e8mes 32 bits",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 R2 pour syst\u00e8mes x64 Service Pack 1 (Server Core installation)",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 R2 (Server Core installation)",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 pour syst\u00e8mes 32 bits",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 7 pour syst\u00e8mes 32 bits Service Pack 1",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1709 pour 64-based Systems",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server, version 1903 (Server Core installation)",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2019-1230",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1230"
},
{
"name": "CVE-2019-1319",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1319"
},
{
"name": "CVE-2019-1256",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1256"
},
{
"name": "CVE-2019-1405",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1405"
},
{
"name": "CVE-2019-1291",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1291"
},
{
"name": "CVE-2019-1253",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1253"
},
{
"name": "CVE-2019-1274",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1274"
},
{
"name": "CVE-2019-1272",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1272"
},
{
"name": "CVE-2019-1249",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1249"
},
{
"name": "CVE-2019-1391",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1391"
},
{
"name": "CVE-2019-1379",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1379"
},
{
"name": "CVE-2019-1248",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1248"
},
{
"name": "CVE-2019-1337",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1337"
},
{
"name": "CVE-2019-1294",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1294"
},
{
"name": "CVE-2019-1439",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1439"
},
{
"name": "CVE-2019-1215",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1215"
},
{
"name": "CVE-2019-1418",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1418"
},
{
"name": "CVE-2019-1361",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1361"
},
{
"name": "CVE-2019-0787",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0787"
},
{
"name": "CVE-2019-1244",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1244"
},
{
"name": "CVE-2019-1255",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1255"
},
{
"name": "CVE-2019-1282",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1282"
},
{
"name": "CVE-2019-1314",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1314"
},
{
"name": "CVE-2019-1166",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1166"
},
{
"name": "CVE-2019-1383",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1383"
},
{
"name": "CVE-2019-1456",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1456"
},
{
"name": "CVE-2019-1368",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1368"
},
{
"name": "CVE-2019-1340",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1340"
},
{
"name": "CVE-2019-1420",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1420"
},
{
"name": "CVE-2019-1232",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1232"
},
{
"name": "CVE-2019-0928",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0928"
},
{
"name": "CVE-2019-1323",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1323"
},
{
"name": "CVE-2019-1365",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1365"
},
{
"name": "CVE-2019-1408",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1408"
},
{
"name": "CVE-2019-1374",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1374"
},
{
"name": "CVE-2019-1409",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1409"
},
{
"name": "CVE-2019-1399",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1399"
},
{
"name": "CVE-2019-1454",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1454"
},
{
"name": "CVE-2019-1320",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1320"
},
{
"name": "CVE-2019-1270",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1270"
},
{
"name": "CVE-2019-1436",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1436"
},
{
"name": "CVE-2019-1440",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1440"
},
{
"name": "CVE-2019-1433",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1433"
},
{
"name": "CVE-2019-1415",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1415"
},
{
"name": "CVE-2019-1359",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1359"
},
{
"name": "CVE-2019-1434",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1434"
},
{
"name": "CVE-2019-1378",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1378"
},
{
"name": "CVE-2019-1388",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1388"
},
{
"name": "CVE-2019-1363",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1363"
},
{
"name": "CVE-2019-1334",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1334"
},
{
"name": "CVE-2019-1235",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1235"
},
{
"name": "CVE-2019-11135",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11135"
},
{
"name": "CVE-2019-1411",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1411"
},
{
"name": "CVE-2019-1393",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1393"
},
{
"name": "CVE-2019-1293",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1293"
},
{
"name": "CVE-2019-1289",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1289"
},
{
"name": "CVE-2019-1362",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1362"
},
{
"name": "CVE-2019-1381",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1381"
},
{
"name": "CVE-2019-1246",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1246"
},
{
"name": "CVE-2019-1269",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1269"
},
{
"name": "CVE-2019-1423",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1423"
},
{
"name": "CVE-2019-1324",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1324"
},
{
"name": "CVE-2019-1303",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1303"
},
{
"name": "CVE-2019-1389",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1389"
},
{
"name": "CVE-2019-1394",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1394"
},
{
"name": "CVE-2019-1317",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1317"
},
{
"name": "CVE-2019-1333",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1333"
},
{
"name": "CVE-2019-1284",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1284"
},
{
"name": "CVE-2019-1316",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1316"
},
{
"name": "CVE-2019-1273",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1273"
},
{
"name": "CVE-2019-1347",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1347"
},
{
"name": "CVE-2019-1346",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1346"
},
{
"name": "CVE-2019-1419",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1419"
},
{
"name": "CVE-2019-1396",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1396"
},
{
"name": "CVE-2019-1392",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1392"
},
{
"name": "CVE-2019-1310",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1310"
},
{
"name": "CVE-2019-1417",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1417"
},
{
"name": "CVE-2019-1214",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1214"
},
{
"name": "CVE-2019-1254",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1254"
},
{
"name": "CVE-2019-1267",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1267"
},
{
"name": "CVE-2019-1311",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1311"
},
{
"name": "CVE-2019-1345",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1345"
},
{
"name": "CVE-2019-1241",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1241"
},
{
"name": "CVE-2019-1252",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1252"
},
{
"name": "CVE-2019-1286",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1286"
},
{
"name": "CVE-2019-1280",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1280"
},
{
"name": "CVE-2019-1430",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1430"
},
{
"name": "CVE-2019-1292",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1292"
},
{
"name": "CVE-2019-1435",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1435"
},
{
"name": "CVE-2019-1441",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1441"
},
{
"name": "CVE-2018-12207",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12207"
},
{
"name": "CVE-2019-1407",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1407"
},
{
"name": "CVE-2019-1277",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1277"
},
{
"name": "CVE-2019-1325",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1325"
},
{
"name": "CVE-2019-1271",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1271"
},
{
"name": "CVE-2019-1432",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1432"
},
{
"name": "CVE-2019-1412",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1412"
},
{
"name": "CVE-2019-1336",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1336"
},
{
"name": "CVE-2019-1344",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1344"
},
{
"name": "CVE-2019-1385",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1385"
},
{
"name": "CVE-2019-1406",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1406"
},
{
"name": "CVE-2019-1250",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1250"
},
{
"name": "CVE-2019-1364",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1364"
},
{
"name": "CVE-2019-1060",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1060"
},
{
"name": "CVE-2019-1422",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1422"
},
{
"name": "CVE-2019-1326",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1326"
},
{
"name": "CVE-2019-0719",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0719"
},
{
"name": "CVE-2019-1398",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1398"
},
{
"name": "CVE-2019-1245",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1245"
},
{
"name": "CVE-2019-0721",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0721"
},
{
"name": "CVE-2019-1338",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1338"
},
{
"name": "CVE-2019-1339",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1339"
},
{
"name": "CVE-2019-1242",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1242"
},
{
"name": "CVE-2019-1318",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1318"
},
{
"name": "CVE-2019-0712",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0712"
},
{
"name": "CVE-2019-1358",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1358"
},
{
"name": "CVE-2019-1437",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1437"
},
{
"name": "CVE-2019-1424",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1424"
},
{
"name": "CVE-2019-1315",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1315"
},
{
"name": "CVE-2019-1382",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1382"
},
{
"name": "CVE-2019-1283",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1283"
},
{
"name": "CVE-2019-1216",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1216"
},
{
"name": "CVE-2019-0788",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0788"
},
{
"name": "CVE-2019-1342",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1342"
},
{
"name": "CVE-2019-1247",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1247"
},
{
"name": "CVE-2019-1268",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1268"
},
{
"name": "CVE-2019-1321",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1321"
},
{
"name": "CVE-2019-1287",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1287"
},
{
"name": "CVE-2019-1380",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1380"
},
{
"name": "CVE-2019-1341",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1341"
},
{
"name": "CVE-2019-1290",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1290"
},
{
"name": "CVE-2019-1343",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1343"
},
{
"name": "CVE-2019-1251",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1251"
},
{
"name": "CVE-2019-1219",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1219"
},
{
"name": "CVE-2019-1322",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1322"
},
{
"name": "CVE-2019-1278",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1278"
},
{
"name": "CVE-2019-1416",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1416"
},
{
"name": "CVE-2019-1384",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1384"
},
{
"name": "CVE-2019-1309",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1309"
},
{
"name": "CVE-2019-1395",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1395"
},
{
"name": "CVE-2019-1438",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1438"
},
{
"name": "CVE-2019-1240",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1240"
},
{
"name": "CVE-2019-1243",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1243"
},
{
"name": "CVE-2019-1285",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1285"
},
{
"name": "CVE-2019-1397",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1397"
}
],
"initial_release_date": "2019-11-13T00:00:00",
"last_revision_date": "2019-11-13T00:00:00",
"links": [],
"reference": "CERTFR-2019-AVI-568",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2019-11-13T00:00:00.000000"
}
],
"risks": [
{
"description": "Usurpation d\u0027identit\u00e9"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la fonctionnalit\u00e9 de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eMicrosoft Windows\u003c/span\u003e. Elles permettent \u00e0 un attaquant\nde provoquer une \u00e9l\u00e9vation de privil\u00e8ges, un contournement de la\nfonctionnalit\u00e9 de s\u00e9curit\u00e9, une usurpation d\u0027identit\u00e9, un d\u00e9ni de\nservice, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une ex\u00e9cution\nde code \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Microsoft Windows",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft du 12 novembre 2019",
"url": "https://portal.msrc.microsoft.com/fr-FR/security-guidance"
}
]
}
CERTFR-2019-AVI-554
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de Red Hat. Elles permettent à un attaquant de provoquer un déni de service et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time for NFV 7 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder pour Power, little endian 8 ppc64le | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder pour x86_64 - Extended Update Support 8.1 x86_64 | ||
| Red Hat | N/A | MRG Realtime 2 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 6.5 et 6.6 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for x86_64 - Extended Update Support 7.5 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux pour Power, little endian - Extended Update Support 7.5, 7, 7.7, 8 et 8.1 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux pour IBM z Systems - Extended Update Support 7.5, 7.7 et 8.1 s390x | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, big endian - Extended Update Support 7.5 ppc64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder pour Power, little endian - Extended Update Support 8.1 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux pour x86_64 8 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux pour Power, big endian - Extended Update Support 7.7 ppc64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux pour x86_64 - Extended Update Support 7.5 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server 6 i386 et x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux pour Power, big endian 6 et 7 ppc64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 7.3, 7.4 et 7.7 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - TUS 7.2, 7.3, 7.4 et 7.7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 7.5 s390x | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux Workstation 6 i386 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux pour x86_64 - Extended Update Support 7.7 et 8.1 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux Workstation 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux EUS Compute Node 7.5 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux pour Power, big endian - Extended Update Support 7.5 ppc64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Power, little endian - Extended Update Support 7.5 ppc64le | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - AUS 7.2, 7.3, 7.4, 7.6 et 7.7 x86_64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder pour ARM 64 8 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux EUS Compute Node 7.7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux pour Scientific Computing 6 et 7 x86_64 | ||
| Red Hat | N/A | Red Hat Virtualization Host 4 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux Desktop 6 i386 et x86_64 | ||
| Red Hat | Red Hat Enterprise Linux Server | Red Hat Enterprise Linux Server - Update Services for SAP Solutions 7.2, 7.3, 7.4 et 7.7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux Desktop 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux for Real Time 7 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux pour ARM 64 8 aarch64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder pour ARM 64 - Extended Update Support 8.1 aarch64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux pour ARM 64 - Extended Update Support 8.1 aarch64 | ||
| Red Hat | Red Hat CodeReady Linux Builder | Red Hat CodeReady Linux Builder pour x86_64 8 x86_64 | ||
| Red Hat | Red Hat Enterprise Linux | Red Hat Enterprise Linux pour IBM z Systems 6, 7 et 8 s390x |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Red Hat Enterprise Linux for Real Time for NFV 7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder pour Power, little endian 8 ppc64le",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder pour x86_64 - Extended Update Support 8.1 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "MRG Realtime 2 x86_64",
"product": {
"name": "N/A",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - AUS 6.5 et 6.6 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for x86_64 - Extended Update Support 7.5 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux pour Power, little endian - Extended Update Support 7.5, 7, 7.7, 8 et 8.1 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux pour IBM z Systems - Extended Update Support 7.5, 7.7 et 8.1 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, big endian - Extended Update Support 7.5 ppc64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder pour Power, little endian - Extended Update Support 8.1 ppc64le",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux pour x86_64 8 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux pour Power, big endian - Extended Update Support 7.7 ppc64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux pour x86_64 - Extended Update Support 7.5 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server 7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server 6 i386 et x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux pour Power, big endian 6 et 7 ppc64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 7.3, 7.4 et 7.7 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - TUS 7.2, 7.3, 7.4 et 7.7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 7.5 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Workstation 6 i386 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux pour x86_64 - Extended Update Support 7.7 et 8.1 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Workstation 7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux EUS Compute Node 7.5 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux pour Power, big endian - Extended Update Support 7.5 ppc64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Power, little endian - Extended Update Support 7.5 ppc64le",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - AUS 7.2, 7.3, 7.4, 7.6 et 7.7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder pour ARM 64 8 aarch64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux EUS Compute Node 7.7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux pour Scientific Computing 6 et 7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Virtualization Host 4 x86_64",
"product": {
"name": "N/A",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Desktop 6 i386 et x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Server - Update Services for SAP Solutions 7.2, 7.3, 7.4 et 7.7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux Server",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux Desktop 7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux for Real Time 7 x86_64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux pour ARM 64 8 aarch64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder pour ARM 64 - Extended Update Support 8.1 aarch64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux pour ARM 64 - Extended Update Support 8.1 aarch64",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat CodeReady Linux Builder pour x86_64 8 x86_64",
"product": {
"name": "Red Hat CodeReady Linux Builder",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Red Hat Enterprise Linux pour IBM z Systems 6, 7 et 8 s390x",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2019-0154",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0154"
},
{
"name": "CVE-2019-11135",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11135"
},
{
"name": "CVE-2019-3900",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3900"
},
{
"name": "CVE-2018-12207",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12207"
}
],
"initial_release_date": "2019-11-13T00:00:00",
"last_revision_date": "2019-11-15T00:00:00",
"links": [],
"reference": "CERTFR-2019-AVI-554",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2019-11-13T00:00:00.000000"
},
{
"description": "Nouveaux correctifs",
"revision_date": "2019-11-14T00:00:00.000000"
},
{
"description": "Ajout des bulletins de s\u00e9curit\u00e9 Redhat RHSA-2019:3887 et RHSA-2019:3889 du 14 octobre 2019",
"revision_date": "2019-11-15T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nRed Hat. Elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service\net une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de Red Hat",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Redhat RHSA-2019:3889 du 14 novembre 2019",
"url": "https://access.redhat.com/errata/RHSA-2019:3889"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Redhat RHSA-2019:3873 du 13 novembre 2019",
"url": "https://access.redhat.com/errata/RHSA-2019:3873"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Redhat RHSA-2019:3838 du 12 novembre 2019",
"url": "https://access.redhat.com/errata/RHSA-2019:3838"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Redhat RHSA-2019:3840 du 12 novembre 2019",
"url": "https://access.redhat.com/errata/RHSA-2019:3840"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Redhat RHSA-2019:3841 du 12 novembre 2019",
"url": "https://access.redhat.com/errata/RHSA-2019:3841"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Redhat RHSA-2019:3836 du 12 novembre 2019",
"url": "https://access.redhat.com/errata/RHSA-2019:3836"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Redhat RHSA-2019:3883 du 14 novembre 2019",
"url": "https://access.redhat.com/errata/RHSA-2019:3883"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Redhat RHSA-2019:3878 du 13 novembre 2019",
"url": "https://access.redhat.com/errata/RHSA-2019:3878"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Redhat RHSA-2019:3832 du 12 novembre 2019",
"url": "https://access.redhat.com/errata/RHSA-2019:3832"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Redhat RHSA-2019:3870 du 13 novembre 2019",
"url": "https://access.redhat.com/errata/RHSA-2019:3870"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Redhat RHSA-2019:3842 du 12 novembre 2019",
"url": "https://access.redhat.com/errata/RHSA-2019:3842"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Redhat RHSA-2019:3843 du 12 novembre 2019",
"url": "https://access.redhat.com/errata/RHSA-2019:3843"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Redhat RHSA-2019:3871 du 13 novembre 2019",
"url": "https://access.redhat.com/errata/RHSA-2019:3871"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Redhat RHSA-2019:3844 du 12 novembre 2019",
"url": "https://access.redhat.com/errata/RHSA-2019:3844"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Redhat RHSA-2019:3839 du 12 novembre 2019",
"url": "https://access.redhat.com/errata/RHSA-2019:3839"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Redhat RHSA-2019:3834 du 12 novembre 2019",
"url": "https://access.redhat.com/errata/RHSA-2019:3834"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Redhat RHSA-2019:3877 du 13 novembre 2019",
"url": "https://access.redhat.com/errata/RHSA-2019:3877"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Redhat RHSA-2019:3887 du 14 novembre 2019",
"url": "https://access.redhat.com/errata/RHSA-2019:3887"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Redhat RHSA-2019:3872 du 13 novembre 2019",
"url": "https://access.redhat.com/errata/RHSA-2019:3872"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Redhat RHSA-2019:3833 du 12 novembre 2019",
"url": "https://access.redhat.com/errata/RHSA-2019:3833"
}
]
}
suse-su-2019:2947-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\nThe SUSE Linux Enterprise 15-SP1 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2018-12207: Untrusted virtual machines on Intel CPUs could exploit a race\n condition in the Instruction Fetch Unit of the Intel CPU to cause a Machine\n Exception during Page Size Change, causing the CPU core to be non-functional.\n\n The Linux Kernel kvm hypervisor was adjusted to avoid page size changes in\n executable pages by splitting / merging huge pages into small pages as\n needed. More information can be found on https://www.suse.com/support/kb/doc/?id=7023735\n\n- CVE-2019-11135: Aborting an asynchronous TSX operation on Intel CPUs with\n Transactional Memory support could be used to facilitate sidechannel\n information leaks out of microarchitectural buffers, similar to the\n previously described \u0027Microarchitectural Data Sampling\u0027 attack.\n\n The Linux kernel was supplemented with the option to disable TSX operation\n altogether (requiring CPU Microcode updates on older systems) and better\n flushing of microarchitectural buffers (VERW).\n\n The set of options available is described in our TID at https://www.suse.com/support/kb/doc/?id=7024251\n\n- CVE-2019-16995: Fix a memory leak in hsr_dev_finalize() if hsr_add_port\n failed to add a port, which may have caused denial of service (bsc#1152685).\n\n- CVE-2019-16233: drivers/scsi/qla2xxx/qla_os.c did not check the\n alloc_workqueue return value, leading to a NULL pointer dereference.\n (bsc#1150457).\n\n- CVE-2019-10220: Added sanity checks on the pathnames passed to the user\n space. (bsc#1144903).\n\n- CVE-2019-17666: rtlwifi: Fix potential overflow in P2P code (bsc#1154372).\n\n- CVE-2019-16232: Fix a potential NULL pointer dereference in the Marwell\n libertas driver (bsc#1150465).\n\n- CVE-2019-16234: iwlwifi pcie driver did not check the alloc_workqueue return\n value, leading to a NULL pointer dereference. (bsc#1150452).\n\n- CVE-2019-17133: cfg80211 wireless extension did not reject a long SSID IE,\n leading to a Buffer Overflow (bsc#1153158).\n\n- CVE-2019-17056: The AF_NFC network module did not enforce CAP_NET_RAW, which\n meant that unprivileged users could create a raw socket (bsc#1152788).\n\nThe following non-security bugs were fixed:\n\n- 9p: avoid attaching writeback_fid on mmap with type PRIVATE (bsc#1051510).\n- acpi: cppc: Set pcc_data[pcc_ss_id] to NULL in acpi_cppc_processor_exit() (bsc#1051510).\n- acpi: cppc: do not require the _PSD method (bsc#1051510).\n- acpi: processor: do not print errors for processorIDs == 0xff (bsc#1051510).\n- act_mirred: Fix mirred_init_module error handling (bsc#1051510).\n- alsa: bebob: Fix prototype of helper function to return negative value (bsc#1051510).\n- alsa: firewire-motu: add support for MOTU 4pre (bsc#1111666).\n- alsa: hda/hdmi: Do not report spurious jack state changes (bsc#1051510).\n- alsa: hda/hdmi: remove redundant assignment to variable pcm_idx (bsc#1051510).\n- alsa: hda/realtek: Add support for ALC623 (bsc#1051510).\n- alsa: hda/realtek: Add support for ALC711 (bsc#1051510).\n- alsa: hda/realtek: Check beep whitelist before assigning in all codecs (bsc#1051510).\n- alsa: hda/realtek: Enable headset mic on Asus MJ401TA (bsc#1051510).\n- alsa: hda/realtek: Fix 2 front mics of codec 0x623 (bsc#1051510).\n- alsa: hda/realtek: Fix alienware headset mic (bsc#1051510).\n- alsa: hda/realtek: PCI quirk for Medion E4254 (bsc#1051510).\n- alsa: hda/realtek: Reduce the Headphone static noise on XPS 9350/9360 (bsc#1051510).\n- alsa: hda/sigmatel: remove unused variable \u0027stac9200_core_init\u0027 (bsc#1051510).\n- alsa: hda: Add Elkhart Lake PCI ID (bsc#1051510).\n- alsa: hda: Add Tigerlake/Jasperlake PCI ID (bsc#1051510).\n- alsa: hda: Add a quirk model for fixing Huawei Matebook X right speaker (bsc#1051510).\n- alsa: hda: Add laptop imic fixup for ASUS M9V laptop (bsc#1051510).\n- alsa: hda: Add support of Zhaoxin controller (bsc#1051510).\n- alsa: hda: Apply AMD controller workaround for Raven platform (bsc#1051510).\n- alsa: hda: Define a fallback_pin_fixup_tbl for alc269 family (bsc#1051510).\n- alsa: hda: Drop unsol event handler for Intel HDMI codecs (bsc#1051510).\n- alsa: hda: Expand pin_match function to match upcoming new tbls (bsc#1051510).\n- alsa: hda: Flush interrupts on disabling (bsc#1051510).\n- alsa: hda: Force runtime PM on Nvidia HDMI codecs (bsc#1051510).\n- alsa: hda: Inform too slow responses (bsc#1051510).\n- alsa: hda: Set fifo_size for both playback and capture streams (bsc#1051510).\n- alsa: hda: Show the fatal CORB/RIRB error more clearly (bsc#1051510).\n- alsa: i2c: ak4xxx-adda: Fix a possible null pointer dereference in build_adc_controls() (bsc#1051510).\n- alsa: line6: sizeof (byte) is always 1, use that fact (bsc#1051510).\n- alsa: timer: Fix mutex deadlock at releasing card (bsc#1051510).\n- alsa: usb-audio: Add DSD support for EVGA NU Audio (bsc#1051510).\n- alsa: usb-audio: Add DSD support for Gustard U16/X26 USB Interface (bsc#1051510).\n- alsa: usb-audio: Add Hiby device family to quirks for native DSD support (bsc#1051510).\n- alsa: usb-audio: Add Pioneer DDJ-SX3 PCM quirck (bsc#1051510).\n- alsa: usb-audio: Clean up check_input_term() (bsc#1051510).\n- alsa: usb-audio: DSD auto-detection for Playback Designs (bsc#1051510).\n- alsa: usb-audio: Disable quirks for BOSS Katana amplifiers (bsc#1051510).\n- alsa: usb-audio: Disable quirks for BOSS Katana amplifiers (bsc#1111666).\n- alsa: usb-audio: Fix copy\u0026paste error in the validator (bsc#1111666).\n- alsa: usb-audio: Fix possible NULL dereference at create_yamaha_midi_quirk() (bsc#1051510).\n- alsa: usb-audio: More validations of descriptor units (bsc#1051510).\n- alsa: usb-audio: Remove superfluous bLength checks (bsc#1051510).\n- alsa: usb-audio: Simplify parse_audio_unit() (bsc#1051510).\n- alsa: usb-audio: Skip bSynchAddress endpoint check if it is invalid (bsc#1051510).\n- alsa: usb-audio: Unify audioformat release code (bsc#1051510).\n- alsa: usb-audio: Unify the release of usb_mixer_elem_info objects (bsc#1051510).\n- alsa: usb-audio: Update DSD support quirks for Oppo and Rotel (bsc#1051510).\n- alsa: usb-audio: fix PCM device order (bsc#1051510).\n- alsa: usb-audio: remove some dead code (bsc#1051510).\n- appletalk: enforce CAP_NET_RAW for raw sockets (bsc#1051510).\n- arcnet: provide a buffer big enough to actually receive packets (networking-stable-19_09_30).\n- asoc: Define a set of DAPM pre/post-up events (bsc#1051510).\n- asoc: dmaengine: Make the pcm-\u003ename equal to pcm-\u003eid if the name is not set (bsc#1051510).\n- asoc: intel: Fix use of potentially uninitialized variable (bsc#1051510).\n- asoc: intel: nhlt: Fix debug print format (bsc#1051510).\n- asoc: rockchip: i2s: Fix RPM imbalance (bsc#1051510).\n- asoc: rsnd: Reinitialize bit clock inversion flag for every format setting (bsc#1051510).\n- asoc: sgtl5000: Fix charge pump source assignment (bsc#1051510).\n- auxdisplay: panel: need to delete scan_timer when misc_register fails in panel_attach (bsc#1051510).\n- ax25: enforce CAP_NET_RAW for raw sockets (bsc#1051510).\n- blk-wbt: abstract out end IO completion handler (bsc#1135873).\n- blk-wbt: fix has-sleeper queueing check (bsc#1135873).\n- blk-wbt: improve waking of tasks (bsc#1135873).\n- blk-wbt: move disable check into get_limit() (bsc#1135873).\n- blk-wbt: use wq_has_sleeper() for wq active check (bsc#1135873).\n- block: add io timeout to sysfs (bsc#1148410).\n- block: add io timeout to sysfs (bsc#1148410).\n- block: do not show io_timeout if driver has no timeout handler (bsc#1148410).\n- block: do not show io_timeout if driver has no timeout handler (bsc#1148410).\n- bluetooth: btrtl: Additional Realtek 8822CE Bluetooth devices (bsc#1051510).\n- bnx2x: Fix VF\u0027s VLAN reconfiguration in reload (bsc#1086323 ).\n- bnxt_en: Add PCI IDs for 57500 series NPAR devices (bsc#1153607).\n- bpf: fix use after free in prog symbol exposure (bsc#1083647).\n- brcmfmac: sdio: Disable auto-tuning around commands expected to fail (bsc#1111666).\n- brcmfmac: sdio: Do not tune while the card is off (bsc#1111666).\n- bridge/mdb: remove wrong use of NLM_F_MULTI (networking-stable-19_09_15).\n- btrfs: Ensure btrfs_init_dev_replace_tgtdev sees up to date values (bsc#1154651).\n- btrfs: Ensure replaced device does not have pending chunk allocation (bsc#1154607).\n- btrfs: bail out gracefully rather than BUG_ON (bsc#1153646).\n- btrfs: block-group: Fix a memory leak due to missing btrfs_put_block_group() (bsc#1155178).\n- btrfs: check for the full sync flag while holding the inode lock during fsync (bsc#1153713).\n- btrfs: qgroup: Always free PREALLOC META reserve in btrfs_delalloc_release_extents() (bsc#1155179).\n- btrfs: remove wrong use of volume_mutex from btrfs_dev_replace_start (bsc#1154651).\n- btrfs: tracepoints: Fix bad entry members of qgroup events (bsc#1155186).\n- btrfs: tracepoints: Fix wrong parameter order for qgroup events (bsc#1155184).\n- can: mcp251x: mcp251x_hw_reset(): allow more time after a reset (bsc#1051510).\n- can: xilinx_can: xcan_probe(): skip error message on deferred probe (bsc#1051510).\n- cdc_ether: fix rndis support for Mediatek based smartphones (networking-stable-19_09_15).\n- cdc_ncm: fix divide-by-zero caused by invalid wMaxPacketSize (bsc#1051510).\n- ceph: fix directories inode i_blkbits initialization (bsc#1153717).\n- ceph: reconnect connection if session hang in opening state (bsc#1153718).\n- ceph: update the mtime when truncating up (bsc#1153719).\n- cfg80211: Purge frame registrations on iftype change (bsc#1051510).\n- cfg80211: add and use strongly typed element iteration macros (bsc#1051510).\n- clk: at91: select parent if main oscillator or bypass is enabled (bsc#1051510).\n- clk: qoriq: Fix -Wunused-const-variable (bsc#1051510).\n- clk: sirf: Do not reference clk_init_data after registration (bsc#1051510).\n- clk: zx296718: Do not reference clk_init_data after registration (bsc#1051510).\n- crypto: af_alg: Fix race around ctx-\u003ercvused by making it atomic_t (bsc#1154737).\n- crypto: af_alg: Initialize sg_num_bytes in error code path (bsc#1051510).\n- crypto: af_alg: consolidation of duplicate code (bsc#1154737).\n- crypto: af_alg: fix race accessing cipher request (bsc#1154737).\n- crypto: af_alg: remove locking in async callback (bsc#1154737).\n- crypto: af_alg: update correct dst SGL entry (bsc#1051510).\n- crypto: af_alg: wait for data at beginning of recvmsg (bsc#1154737).\n- crypto: algif: return error code when no data was processed (bsc#1154737).\n- crypto: algif_aead: copy AAD from src to dst (bsc#1154737).\n- crypto: algif_aead: fix reference counting of null skcipher (bsc#1154737).\n- crypto: algif_aead: overhaul memory management (bsc#1154737).\n- crypto: algif_aead: skip SGL entries with NULL page (bsc#1154737).\n- crypto: algif_skcipher: overhaul memory management (bsc#1154737).\n- crypto: talitos: fix missing break in switch statement (bsc#1142635).\n- cxgb4: Signedness bug in init_one() (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).\n- cxgb4: do not dma memory off of the stack (bsc#1152790).\n- cxgb4: fix endianness for vlan value in cxgb4_tc_flower (bsc#1064802 bsc#1066129).\n- cxgb4: offload VLAN flows regardless of VLAN ethtype (bsc#1064802 bsc#1066129).\n- cxgb4: reduce kernel stack usage in cudbg_collect_mem_region() (bsc#1073513).\n- cxgb4: smt: Add lock for atomic_dec_and_test (bsc#1064802 bsc#1066129).\n- cxgb4:Fix out-of-bounds MSI-X info array access (networking-stable-19_10_05).\n- drm/amd/display: Restore backlight brightness after system resume (bsc#1112178)\n- drm/amd/display: fix issue where 252-255 values are clipped (bsc#1111666).\n- drm/amd/display: reprogram VM config when system resume (bsc#1111666).\n- drm/amd/display: support spdif (bsc#1111666).\n- drm/amd/dm: Understand why attaching path/tile properties are needed (bsc#1111666).\n- drm/amd/powerplay/smu7: enforce minimal VBITimeout (v2) (bsc#1051510).\n- drm/amd/pp: Fix truncated clock value when set watermark (bsc#1111666).\n- drm/amdgpu/gfx9: Update gfx9 golden settings (bsc#1111666).\n- drm/amdgpu/si: fix ASIC tests (git-fixes).\n- drm/amdgpu: Check for valid number of registers to read (bsc#1051510).\n- drm/amdgpu: Fix KFD-related kernel oops on Hawaii (bsc#1111666).\n- drm/amdgpu: Update gc_9_0 golden settings (bsc#1111666).\n- drm/amdkfd: Add missing Polaris10 ID (bsc#1111666).\n- drm/ast: Fixed reboot test may cause system hanged (bsc#1051510).\n- drm/atomic_helper: Allow DPMS On\u003c-\u003eOff changes for unregistered connectors (bsc#1111666).\n- drm/atomic_helper: Disallow new modesets on unregistered connectors (bsc#1111666).\n- drm/atomic_helper: Stop modesets on unregistered connectors harder (bsc#1111666).\n- drm/bridge: tc358767: Increase AUX transfer length limit (bsc#1051510).\n- drm/bridge: tfp410: fix memleak in get_modes() (bsc#1111666).\n- drm/edid: Add 6 bpc quirk for SDC panel in Lenovo G50 (bsc#1051510).\n- drm/i915/cmdparser: Add support for backward jumps (bsc#1135967)\n- drm/i915/cmdparser: Ignore Length operands during (bsc#1135967)\n- drm/i915/cmdparser: Use explicit goto for error paths (bsc#1135967)\n- drm/i915/gen8+: Add RC6 CTX corruption WA (bsc#1135967)\n- drm/i915/gvt: update vgpu workload head pointer correctly (bsc#1112178)\n- drm/i915: Add gen9 BCS cmdparsing (bsc#1135967)\n- drm/i915: Add support for mandatory cmdparsing (bsc#1135967)\n- drm/i915: Allow parsing of unsized batches (bsc#1135967)\n- drm/i915: Cleanup gt powerstate from gem (bsc#1111666).\n- drm/i915: Disable Secure Batches for gen6+ (bsc#1135967)\n- drm/i915: Fix intel_dp_mst_best_encoder() (bsc#1111666).\n- drm/i915: Lower RM timeout to avoid DSI hard hangs (bsc#1135967)\n- drm/i915: Remove Master tables from cmdparser (bsc#1135967)\n- drm/i915: Rename gen7 cmdparser tables (bsc#1135967)\n- drm/i915: Restore sane defaults for KMS on GEM error load (bsc#1111666).\n- drm/i915: Support ro ppgtt mapped cmdparser shadow (bsc#1135967)\n- drm/mediatek: set DMA max segment size (bsc#1111666).\n- drm/msm/dsi: Fix return value check for clk_get_parent (bsc#1111666).\n- drm/msm/dsi: Implement reset correctly (bsc#1051510).\n- drm/nouveau/disp/nv50-: fix center/aspect-corrected scaling (bsc#1111666).\n- drm/nouveau/kms/nv50-: Do not create MSTMs for eDP connectors (bsc#1112178)\n- drm/nouveau/volt: Fix for some cards having 0 maximum voltage (bsc#1111666).\n- drm/omap: fix max fclk divider for omap36xx (bsc#1111666).\n- drm/panel: check failure cases in the probe func (bsc#1111666).\n- drm/panel: make drm_panel.h self-contained (bsc#1111666).\n- drm/panel: simple: fix AUO g185han01 horizontal blanking (bsc#1051510).\n- drm/radeon: Bail earlier when radeon.cik_/si_support=0 is passed (bsc#1111666).\n- drm/radeon: Fix EEH during kexec (bsc#1051510).\n- drm/rockchip: Check for fast link training before enabling psr (bsc#1111666).\n- drm/stm: attach gem fence to atomic state (bsc#1111666).\n- drm/tilcdc: Register cpufreq notifier after we have initialized crtc (bsc#1051510).\n- drm/vmwgfx: Fix double free in vmw_recv_msg() (bsc#1051510).\n- drm: Flush output polling on shutdown (bsc#1051510).\n- drm: add __user attribute to ptr_to_compat() (bsc#1111666).\n- drm: panel-orientation-quirks: Add extra quirk table entry for GPD MicroPC (bsc#1111666).\n- drm: rcar-du: lvds: Fix bridge_to_rcar_lvds (bsc#1111666).\n- e1000e: add workaround for possible stalled packet (bsc#1051510).\n- efi/arm: Show SMBIOS bank/device location in CPER and GHES error logs (bsc#1152033).\n- efi/memattr: Do not bail on zero VA if it equals the region\u0027s PA (bsc#1051510).\n- efi: cper: print AER info of PCIe fatal error (bsc#1051510).\n- efivar/ssdt: Do not iterate over EFI vars if no SSDT override was specified (bsc#1051510).\n- firmware: dmi: Fix unlikely out-of-bounds read in save_mem_devices (git-fixes).\n- gpu: drm: radeon: Fix a possible null-pointer dereference in radeon_connector_set_property() (bsc#1051510).\n- hid: apple: Fix stuck function keys when using FN (bsc#1051510).\n- hid: fix error message in hid_open_report() (bsc#1051510).\n- hid: hidraw: Fix invalid read in hidraw_ioctl (bsc#1051510).\n- hid: logitech-hidpp: do all FF cleanup in hidpp_ff_destroy() (bsc#1051510).\n- hid: logitech: Fix general protection fault caused by Logitech driver (bsc#1051510).\n- hid: prodikeys: Fix general protection fault during probe (bsc#1051510).\n- hid: sony: Fix memory corruption issue on cleanup (bsc#1051510).\n- hso: fix NULL-deref on tty open (bsc#1051510).\n- hwmon: (acpi_power_meter) Change log level for \u0027unsafe software power cap\u0027 (bsc#1051510).\n- hwrng: core: do not wait on add_early_randomness() (git-fixes).\n- hyperv: set nvme msi interrupts to unmanaged (jsc#SLE-8953, jsc#SLE-9221, jsc#SLE-4941, bsc#1119461, bsc#1119465, bsc#1138190, bsc#1154905).\n- i2c: riic: Clear NACK in tend isr (bsc#1051510).\n- ib/core, ipoib: Do not overreact to SM LID change event (bsc#1154108)\n- ib/core: Add mitigation for Spectre V1 (bsc#1155671)\n- ib/hfi1: Remove overly conservative VM_EXEC flag check (bsc#1144449).\n- ib/mlx5: Consolidate use_umr checks into single function (bsc#1093205).\n- ib/mlx5: Fix MR re-registration flow to use UMR properly (bsc#1093205).\n- ib/mlx5: Report correctly tag matching rendezvous capability (bsc#1046305).\n- ieee802154: atusb: fix use-after-free at disconnect (bsc#1051510).\n- ieee802154: ca8210: prevent memory leak (bsc#1051510).\n- ieee802154: enforce CAP_NET_RAW for raw sockets (bsc#1051510).\n- iio: adc: ad799x: fix probe error handling (bsc#1051510).\n- iio: light: opt3001: fix mutex unlock race (bsc#1051510).\n- ima: always return negative code for error (bsc#1051510).\n- input: da9063: fix capability and drop KEY_SLEEP (bsc#1051510).\n- input: synaptics-rmi4: avoid processing unknown IRQs (bsc#1051510).\n- integrity: prevent deadlock during digsig verification (bsc#1090631).\n- iommu/amd: Apply the same IVRS IOAPIC workaround to Acer Aspire A315-41 (bsc#1137799).\n- iommu/amd: Check PM_LEVEL_SIZE() condition in locked section (bsc#1154608).\n- iommu/amd: Override wrong IVRS IOAPIC on Raven Ridge systems (bsc#1137799).\n- iommu/amd: Remove domain-\u003eupdated (bsc#1154610).\n- iommu/amd: Wait for completion of IOTLB flush in attach_device (bsc#1154611).\n- ipmi_si: Only schedule continuously in the thread in maintenance mode (bsc#1051510).\n- ipv6: Fix the link time qualifier of \u0027ping_v6_proc_exit_net()\u0027 (networking-stable-19_09_15).\n- ipv6: Handle missing host route in __ipv6_ifa_notify (networking-stable-19_10_05).\n- ipv6: drop incoming packets having a v4mapped source address (networking-stable-19_10_05).\n- iwlwifi: pcie: fix memory leaks in iwl_pcie_ctxt_info_gen3_init (bsc#1111666).\n- ixgbe: Fix secpath usage for IPsec TX offload (bsc#1113994 bsc#1151807).\n- ixgbe: Prevent u8 wrapping of ITR value to something less than 10us (bsc#1101674).\n- ixgbe: sync the first fragment unconditionally (bsc#1133140).\n- kABI workaround for crypto/af_alg changes (bsc#1154737).\n- kABI workaround for drm_connector.registered type changes (bsc#1111666).\n- kABI workaround for mmc_host retune_crc_disable flag addition (bsc#1111666).\n- kABI workaround for snd_hda_pick_pin_fixup() changes (bsc#1051510).\n- kabi/severities: Whitelist functions internal to radix mm. To call these functions you have to first detect if you are running in radix mm mode which can\u0027t be expected of OOT code.\n- kabi: net: sched: act_sample: fix psample group handling on overwrite (networking-stable-19_09_05).\n- kernel-binary.spec.in: Fix build of non-modular kernels (boo#1154578).\n- kernel-binary.spec.in: Obsolete kgraft packages only when not building them.\n- kernel-binary: Drop .kernel-binary.spec.buildenv (boo#1154578). Without this patch, /usr/src/linux-@VERSION@-@RELEASE_SHORT@-obj/x86_64/vanilla/.kernel-binary.spec.buildenv contained rpm %_smp_mflags in a line like export MAKE_ARGS=\u0027 --output-sync -j4\u0027 This made it hard to produce bit-identical builds.\n- kernel-binary: check also bzImage on s390/s390x Starting with 4.19-rc1, uncompressed image is no longer built on s390x. If file \u0027image\u0027 is not found in arch/s390/boot after the build, try bzImage instead. For now, install bzImage under the name image-* until we know grub2 and our grub2 scripts can handle correct name.\n- kernel-subpackage-build: create zero size ghost for uncompressed vmlinux (bsc#1154354). It is not strictly necessary to uncompress it so maybe the ghost file can be 0 size in this case.\n- kernel/sysctl.c: do not override max_threads provided by userspace (bnc#1150875).\n- ksm: cleanup stable_node chain collapse case (bnc#1144338).\n- ksm: fix use after free with merge_across_nodes = 0 (bnc#1144338).\n- ksm: introduce ksm_max_page_sharing per page deduplication limit (bnc#1144338).\n- ksm: optimize refile of stable_node_dup at the head of the chain (bnc#1144338).\n- ksm: swap the two output parameters of chain/chain_prune (bnc#1144338).\n- kvm: Convert kvm_lock to a mutex (bsc#1117665).\n- kvm: mmu: drop vcpu param in gpte_access (bsc#1117665).\n- kvm: ppc: book3s hv: use smp_mb() when setting/clearing host_ipi flag (bsc#1061840).\n- kvm: vmx, svm: always run with EFER.NXE=1 when shadow paging is active (bsc#1117665).\n- kvm: x86, powerpc: do not allow clearing largepages debugfs entry (bsc#1117665).\n- kvm: x86: Do not release the page inside mmu_set_spte() (bsc#1117665).\n- kvm: x86: add tracepoints around __direct_map and FNAME(fetch) (bsc#1117665).\n- kvm: x86: adjust kvm_mmu_page member to save 8 bytes (bsc#1117665).\n- kvm: x86: change kvm_mmu_page_get_gfn BUG_ON to WARN_ON (bsc#1117665).\n- kvm: x86: make FNAME(fetch) and __direct_map more similar (bsc#1117665).\n- kvm: x86: remove now unneeded hugepage gfn adjustment (bsc#1117665).\n- lib/mpi: Fix karactx leak in mpi_powm (bsc#1051510).\n- libertas: Add missing sentinel at end of if_usb.c fw_table (bsc#1051510).\n- libnvdimm/security: provide fix for secure-erase to use zero-key (bsc#1149853).\n- lpfc: Add FA-WWN Async Event reporting (bsc#1154521).\n- lpfc: Add FC-AL support to lpe32000 models (bsc#1154521).\n- lpfc: Add additional discovery log messages (bsc#1154521).\n- lpfc: Add log macros to allow print by serverity or verbocity setting (bsc#1154521).\n- lpfc: Fix SLI3 hba in loop mode not discovering devices (bsc#1154521).\n- lpfc: Fix bad ndlp ptr in xri aborted handling (bsc#1154521).\n- lpfc: Fix hardlockup in lpfc_abort_handler (bsc#1154521).\n- lpfc: Fix lockdep errors in sli_ringtx_put (bsc#1154521).\n- lpfc: Fix reporting of read-only fw error errors (bsc#1154521).\n- lpfc: Make FW logging dynamically configurable (bsc#1154521).\n- lpfc: Remove lock contention target write path (bsc#1154521).\n- lpfc: Revise interrupt coalescing for missing scenarios (bsc#1154521).\n- lpfc: Slight fast-path Performance optimizations (bsc#1154521).\n- lpfc: Update lpfc version to 12.6.0.0 (bsc#1154521).\n- lpfc: fix coverity error of dereference after null check (bsc#1154521).\n- lpfc: fix lpfc_nvmet_mrq to be bound by hdw queue count (bsc#1154521).\n- mac80211: Reject malformed SSID elements (bsc#1051510).\n- mac80211: accept deauth frames in IBSS mode (bsc#1051510).\n- mac80211: fix txq null pointer dereference (bsc#1051510).\n- macsec: drop skb sk before calling gro_cells_receive (bsc#1051510).\n- md/raid0: avoid RAID0 data corruption due to layout confusion (bsc#1140090).\n- md/raid0: fix warning message for parameter default_layout (bsc#1140090).\n- media: atmel: atmel-isc: fix asd memory allocation (bsc#1135642).\n- media: cpia2_usb: fix memory leaks (bsc#1051510).\n- media: dvb-core: fix a memory leak bug (bsc#1051510).\n- media: exynos4-is: fix leaked of_node references (bsc#1051510).\n- media: gspca: zero usb_buf on error (bsc#1051510).\n- media: hdpvr: Add device num check and handling (bsc#1051510).\n- media: hdpvr: add terminating 0 at end of string (bsc#1051510).\n- media: i2c: ov5645: Fix power sequence (bsc#1051510).\n- media: iguanair: add sanity checks (bsc#1051510).\n- media: omap3isp: Do not set streaming state on random subdevs (bsc#1051510).\n- media: omap3isp: Set device on omap3isp subdevs (bsc#1051510).\n- media: ov9650: add a sanity check (bsc#1051510).\n- media: radio/si470x: kill urb on error (bsc#1051510).\n- media: saa7134: fix terminology around saa7134_i2c_eeprom_md7134_gate() (bsc#1051510).\n- media: saa7146: add cleanup in hexium_attach() (bsc#1051510).\n- media: sn9c20x: Add MSI MS-1039 laptop to flip_dmi_table (bsc#1051510).\n- media: stkwebcam: fix runtime PM after driver unbind (bsc#1051510).\n- media: ttusb-dec: Fix info-leak in ttusb_dec_send_command() (bsc#1051510).\n- memstick: jmb38x_ms: Fix an error handling path in \u0027jmb38x_ms_probe()\u0027 (bsc#1051510).\n- mfd: intel-lpss: Remove D3cold delay (bsc#1051510).\n- misdn: enforce CAP_NET_RAW for raw sockets (bsc#1051510).\n- mld: fix memory leak in mld_del_delrec() (networking-stable-19_09_05).\n- mmc: core: API to temporarily disable retuning for SDIO CRC errors (bsc#1111666).\n- mmc: core: Add sdio_retune_hold_now() and sdio_retune_release() (bsc#1111666).\n- mmc: sdhci-of-esdhc: set DMA snooping based on DMA coherence (bsc#1051510).\n- mmc: sdhci: Fix incorrect switch to HS mode (bsc#1051510).\n- mmc: sdhci: improve ADMA error reporting (bsc#1051510).\n- net/ibmvnic: Fix EOI when running in XIVE mode (bsc#1089644, ltc#166495, ltc#165544, git-fixes).\n- net/mlx4_en: fix a memory leak bug (bsc#1046299).\n- net/mlx5: Add device ID of upcoming BlueField-2 (bsc#1046303 ).\n- net/mlx5: Fix error handling in mlx5_load() (bsc#1046305 ).\n- net/phy: fix DP83865 10 Mbps HDX loopback disable function (networking-stable-19_09_30).\n- net/rds: Fix error handling in rds_ib_add_one() (networking-stable-19_10_05).\n- net/rds: fix warn in rds_message_alloc_sgs (bsc#1154848).\n- net/rds: remove user triggered WARN_ON in rds_sendmsg (bsc#1154848).\n- net/sched: act_sample: do not push mac header on ip6gre ingress (networking-stable-19_09_30).\n- net: Fix null de-reference of device refcount (networking-stable-19_09_15).\n- net: Replace NF_CT_ASSERT() with WARN_ON() (bsc#1146612).\n- net: Unpublish sk from sk_reuseport_cb before call_rcu (networking-stable-19_10_05).\n- net: fix skb use after free in netpoll (networking-stable-19_09_05).\n- net: gso: Fix skb_segment splat when splitting gso_size mangled skb having linear-headed frag_list (networking-stable-19_09_15).\n- net: openvswitch: free vport unless register_netdevice() succeeds (git-fixes).\n- net: qlogic: Fix memory leak in ql_alloc_large_buffers (networking-stable-19_10_05).\n- net: qrtr: Stop rx_worker before freeing node (networking-stable-19_09_30).\n- net: sched: act_sample: fix psample group handling on overwrite (networking-stable-19_09_05).\n- net: stmmac: dwmac-rk: Do not fail if phy regulator is absent (networking-stable-19_09_05).\n- net_sched: add policy validation for action attributes (networking-stable-19_09_30).\n- net_sched: fix backward compatibility for TCA_ACT_KIND (git-fixes).\n- netfilter: nf_nat: do not bug when mapping already exists (bsc#1146612).\n- nfc: fix attrs checks in netlink interface (bsc#1051510).\n- nfc: fix memory leak in llcp_sock_bind() (bsc#1051510).\n- nfc: pn533: fix use-after-free and memleaks (bsc#1051510).\n- nfsv4.1: backchannel request should hold ref on xprt (bsc#1152624).\n- nl80211: fix null pointer dereference (bsc#1051510).\n- objtool: Clobber user CFLAGS variable (bsc#1153236).\n- openvswitch: change type of UPCALL_PID attribute to NLA_UNSPEC (networking-stable-19_09_30).\n- packaging: add support for riscv64\n- pci: Correct pci=resource_alignment parameter example (bsc#1051510).\n- pci: dra7xx: Fix legacy INTD IRQ handling (bsc#1087092).\n- pci: hv: Use bytes 4 and 5 from instance ID as the PCI domain numbers (bsc#1153263).\n- pci: pm: Fix pci_power_up() (bsc#1051510).\n- pinctrl: cherryview: restore Strago DMI workaround for all versions (bsc#1111666).\n- pinctrl: tegra: Fix write barrier placement in pmx_writel (bsc#1051510).\n- platform/x86: classmate-laptop: remove unused variable (bsc#1051510).\n- platform/x86: i2c-multi-instantiate: Derive the device name from parent (bsc#1111666).\n- platform/x86: i2c-multi-instantiate: Fail the probe if no IRQ provided (bsc#1111666).\n- platform/x86: pmc_atom: Add Siemens SIMATIC IPC277E to critclk_systems DMI table (bsc#1051510).\n- power: supply: sysfs: ratelimit property read error message (bsc#1051510).\n- powerpc/64s/pseries: radix flush translations before MMU is enabled at boot (bsc#1055186).\n- powerpc/64s/radix: keep kernel ERAT over local process/guest invalidates (bsc#1055186).\n- powerpc/64s/radix: tidy up TLB flushing code (bsc#1055186).\n- powerpc/64s: Rename PPC_INVALIDATE_ERAT to PPC_ISA_3_0_INVALIDATE_ERAT (bsc#1055186).\n- powerpc/mm/book3s64: Move book3s64 code to pgtable-book3s64 (bsc#1055186).\n- powerpc/mm/radix: mark __radix__flush_tlb_range_psize() as __always_inline (bsc#1055186).\n- powerpc/mm/radix: mark as __tlbie_pid() and friends as__always_inline (bsc#1055186).\n- powerpc/mm: Properly invalidate when setting process table base (bsc#1055186).\n- powerpc/mm: mark more tlb functions as __always_inline (bsc#1055186).\n- powerpc/pseries/mobility: use cond_resched when updating device tree (bsc#1153112 ltc#181778).\n- powerpc/pseries: Remove confusing warning message (bsc#1109158).\n- powerpc/rtas: allow rescheduling while changing cpu states (bsc#1153112 ltc#181778).\n- powerplay: Respect units on max dcfclk watermark (bsc#1111666).\n- qed: iwarp: Fix default window size to be based on chip (bsc#1050536 bsc#1050545).\n- qed: iwarp: Fix tc for MPA ll2 connection (bsc#1050536 bsc#1050545).\n- qed: iwarp: Use READ_ONCE and smp_store_release to access ep-\u003estate (bsc#1050536 bsc#1050545).\n- qed: iwarp: fix uninitialized callback (bsc#1050536 bsc#1050545).\n- qmi_wwan: add support for Cinterion CLS8 devices (networking-stable-19_10_05).\n- r8152: Set macpassthru in reset_resume callback (bsc#1051510).\n- rdma/bnxt_re: Fix spelling mistake \u0027missin_resp\u0027 -\u003e \u0027missing_resp\u0027 (bsc#1050244).\n- rdma/hns: Add reset process for function-clear (bsc#1155061).\n- rdma/hns: Remove the some magic number (bsc#1155061).\n- rdma: Fix goto target to release the allocated memory (bsc#1050244).\n- rds: Fix warning (bsc#1154848).\n- rpm/config.sh: Enable livepatch.\n- rpm/constraints.in: lower disk space required for ARM With a requirement of 35GB, only 2 slow workers are usable for ARM. Current aarch64 build requires 27G and armv6/7 requires 14G. Set requirements respectively to 30GB and 20GB.\n- rpm/dtb.spec.in.in: do not make dtb directory inaccessible There is no reason to lock down the dtb directory for ordinary users.\n- rpm/kernel-binary.spec.in: Fix kernel-livepatch description typo.\n- rpm/kernel-binary.spec.in: build kernel-*-kgraft only for default SLE kernel RT and Azure variants are excluded for the moment. (bsc#1141600)\n- rpm/kernel-binary.spec.in: handle modules.builtin.modinfo It was added in 5.2.\n- rpm/kernel-binary.spec.in: support partial rt debug config.\n- rpm/kernel-subpackage-spec: Mention debuginfo in the subpackage description (bsc#1149119).\n- rpm/macros.kernel-source: KMPs should depend on kmod-compat to build. kmod-compat links are used in find-provides.ksyms, find-requires.ksyms, and find-supplements.ksyms in rpm-config-SUSE.\n- rpm/mkspec: Correct tarball URL for rc kernels.\n- rpm/mkspec: Make building DTBs optional.\n- rpm/modflist: Simplify compression support.\n- rpm: raise required disk space for binary packages Current disk space constraints (10 GB on s390x, 25 GB on other architectures) no longer suffice for 5.3 kernel builds. The statistics show ~30 GB of disk consumption on x86_64 and ~11 GB on s390x so raise the constraints to 35 GB in general and 14 GB on s390x.\n- rpm: support compressed modules Some of our scripts and scriptlets in rpm/ do not expect module files not ending with \u0027.ko\u0027 which currently leads to failure in preuninstall scriptlet of cluster-md-kmp-default (and probably also other subpackages). Let those which could be run on compressed module files recognize \u0027.ko.xz\u0027 in addition to \u0027.ko\u0027.\n- rtlwifi: rtl8192cu: Fix value set in descriptor (bsc#1142635).\n- s390/cmf: set_schib_wait add timeout (bsc#1153509, bsc#1153476).\n- s390/cpumsf: Check for CPU Measurement sampling (bsc#1153681 LTC#181855).\n- s390/crypto: fix gcm-aes-s390 selftest failures (bsc#1137861 LTC#178091).\n- s390/pci: add mio_enabled attribute (bsc#1152665 LTC#181729).\n- s390/pci: correctly handle MIO opt-out (bsc#1152665 LTC#181729).\n- s390/pci: deal with devices that have no support for MIO instructions (bsc#1152665 LTC#181729).\n- s390/pci: fix MSI message data (bsc#1152697 LTC#181730).\n- s390: add support for IBM z15 machines (bsc#1152696 LTC#181731).\n- s390: fix setting of mio addressing control (bsc#1152665 LTC#181729).\n- sch_cbq: validate TCA_CBQ_WRROPT to avoid crash (networking-stable-19_10_05).\n- sch_dsmark: fix potential NULL deref in dsmark_init() (networking-stable-19_10_05).\n- sch_hhf: ensure quantum and hhf_non_hh_weight are non-zero (networking-stable-19_09_15).\n- sch_netem: fix a divide by zero in tabledist() (networking-stable-19_09_30).\n- sched/fair: Avoid divide by zero when rebalancing domains (bsc#1096254).\n- scripts/arch-symbols: add missing link.\n- scsi: lpfc: Check queue pointer before use (bsc#1154242).\n- scsi: lpfc: Complete removal of FCoE T10 PI support on SLI-4 adapters (bsc#1154521).\n- scsi: lpfc: Convert existing %pf users to %ps (bsc#1154521).\n- scsi: lpfc: Fix GPF on scsi command completion (bsc#1154521).\n- scsi: lpfc: Fix NVME io abort failures causing hangs (bsc#1154521).\n- scsi: lpfc: Fix NVMe ABTS in response to receiving an ABTS (bsc#1154521).\n- scsi: lpfc: Fix coverity errors on NULL pointer checks (bsc#1154521).\n- scsi: lpfc: Fix device recovery errors after PLOGI failures (bsc#1154521).\n- scsi: lpfc: Fix devices that do not return after devloss followed by rediscovery (bsc#1137040).\n- scsi: lpfc: Fix discovery failures when target device connectivity bounces (bsc#1154521).\n- scsi: lpfc: Fix hdwq sgl locks and irq handling (bsc#1154521).\n- scsi: lpfc: Fix host hang at boot or slow boot (bsc#1154521).\n- scsi: lpfc: Fix list corruption detected in lpfc_put_sgl_per_hdwq (bsc#1154521).\n- scsi: lpfc: Fix list corruption in lpfc_sli_get_iocbq (bsc#1154521).\n- scsi: lpfc: Fix locking on mailbox command completion (bsc#1154521).\n- scsi: lpfc: Fix miss of register read failure check (bsc#1154521).\n- scsi: lpfc: Fix null ptr oops updating lpfc_devloss_tmo via sysfs attribute (bsc#1140845).\n- scsi: lpfc: Fix premature re-enabling of interrupts in lpfc_sli_host_down (bsc#1154521).\n- scsi: lpfc: Fix propagation of devloss_tmo setting to nvme transport (bsc#1140883).\n- scsi: lpfc: Fix pt2pt discovery on SLI3 HBAs (bsc#1154521).\n- scsi: lpfc: Fix rpi release when deleting vport (bsc#1154521).\n- scsi: lpfc: Fix spinlock_irq issues in lpfc_els_flush_cmd() (bsc#1154521).\n- scsi: lpfc: Make function lpfc_defer_pt2pt_acc static (bsc#1154521).\n- scsi: lpfc: Remove bg debugfs buffers (bsc#1144375).\n- scsi: lpfc: Update async event logging (bsc#1154521).\n- scsi: lpfc: Update lpfc version to 12.4.0.1 (bsc#1154521).\n- scsi: lpfc: cleanup: remove unused fcp_txcmlpq_cnt (bsc#1154521).\n- scsi: lpfc: remove left-over BUILD_NVME defines (bsc#1154268).\n- scsi: qedf: Modify abort and tmf handler to handle edge condition and flush (bsc#1098291).\n- scsi: qedf: fc_rport_priv reference counting fixes (bsc#1098291).\n- scsi: qla2xxx: Add error handling for PLOGI ELS passthrough (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Add error handling for PLOGI ELS passthrough (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Capture FW dump on MPI heartbeat stop event (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Capture FW dump on MPI heartbeat stop event (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Check for MB timeout while capturing ISP27/28xx FW dump (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Check for MB timeout while capturing ISP27/28xx FW dump (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Dual FCP-NVMe target port support (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Dual FCP-NVMe target port support (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Fix N2N link reset (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Fix N2N link reset (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Fix N2N link up fail (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Fix N2N link up fail (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Fix partial flash write of MBI (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Fix stale mem access on driver unload (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Fix stale mem access on driver unload (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Fix unbound sleep in fcport delete path (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Fix unbound sleep in fcport delete path (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Fix wait condition in loop (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Improve logging for scan thread (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Improve logging for scan thread (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Initialized mailbox to prevent driver load failure (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Optimize NPIV tear down process (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Optimize NPIV tear down process (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Remove WARN_ON_ONCE in qla2x00_status_cont_entry() (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Set remove flag for all VP (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Set remove flag for all VP (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Silence fwdump template message (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Silence fwdump template message (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Update driver version to 10.01.00.20-k (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Update driver version to 10.01.00.20-k (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: fixup incorrect usage of host_byte (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: remove redundant assignment to pointer host (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: remove redundant assignment to pointer host (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: stop timer in shutdown path (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: storvsc: setup 1:1 mapping between hardware queue and CPU queue (bsc#1140729).\n- scsi: zfcp: fix reaction on bit error threshold notification (bsc#1154956 LTC#182054).\n- sctp: Fix the link time qualifier of \u0027sctp_ctrlsock_exit()\u0027 (networking-stable-19_09_15).\n- sctp: use transport pf_retrans in sctp_do_8_2_transport_strike (networking-stable-19_09_15).\n- skge: fix checksum byte order (networking-stable-19_09_30).\n- sock_diag: fix autoloading of the raw_diag module (bsc#1152791).\n- sock_diag: request _diag module only when the family or proto has been registered (bsc#1152791).\n- staging: bcm2835-audio: Fix draining behavior regression (bsc#1111666).\n- staging: vt6655: Fix memory leak in vt6655_probe (bsc#1051510).\n- staging: wlan-ng: fix exit return when sme-\u003ekey_idx \u003e= NUM_WEPKEYS (bsc#1051510).\n- supporte.conf: add efivarfs to kernel-default-base (bsc#1154858).\n- tcp: Do not dequeue SYN/FIN-segments from write-queue (git-gixes).\n- tcp: fix tcp_ecn_withdraw_cwr() to clear TCP_ECN_QUEUE_CWR (networking-stable-19_09_15).\n- tcp: inherit timestamp on mtu probe (networking-stable-19_09_05).\n- tcp: remove empty skb from write queue in error cases (networking-stable-19_09_05).\n- thermal: Fix use-after-free when unregistering thermal zone device (bsc#1051510).\n- thermal_hwmon: Sanitize thermal_zone type (bsc#1051510).\n- tipc: add NULL pointer check before calling kfree_rcu (networking-stable-19_09_15).\n- tipc: fix unlimited bundling of small messages (networking-stable-19_10_05).\n- tracing: Initialize iter-\u003eseq after zeroing in tracing_read_pipe() (bsc#1151508).\n- tun: fix use-after-free when register netdev failed (networking-stable-19_09_15).\n- tuntap: correctly set SOCKWQ_ASYNC_NOSPACE (bsc#1145099).\n- usb: adutux: fix NULL-derefs on disconnect (bsc#1142635).\n- usb: adutux: fix use-after-free on disconnect (bsc#1142635).\n- usb: adutux: fix use-after-free on release (bsc#1051510).\n- usb: chaoskey: fix use-after-free on release (bsc#1051510).\n- usb: dummy-hcd: fix power budget for SuperSpeed mode (bsc#1051510).\n- usb: iowarrior: fix use-after-free after driver unbind (bsc#1051510).\n- usb: iowarrior: fix use-after-free on disconnect (bsc#1051510).\n- usb: iowarrior: fix use-after-free on release (bsc#1051510).\n- usb: ldusb: fix NULL-derefs on driver unbind (bsc#1051510).\n- usb: ldusb: fix memleak on disconnect (bsc#1051510).\n- usb: ldusb: fix read info leaks (bsc#1051510).\n- usb: legousbtower: fix a signedness bug in tower_probe() (bsc#1051510).\n- usb: legousbtower: fix deadlock on disconnect (bsc#1142635).\n- usb: legousbtower: fix memleak on disconnect (bsc#1051510).\n- usb: legousbtower: fix open after failed reset request (bsc#1142635).\n- usb: legousbtower: fix potential NULL-deref on disconnect (bsc#1142635).\n- usb: legousbtower: fix slab info leak at probe (bsc#1142635).\n- usb: legousbtower: fix use-after-free on release (bsc#1051510).\n- usb: microtek: fix info-leak at probe (bsc#1142635).\n- usb: serial: fix runtime PM after driver unbind (bsc#1051510).\n- usb: serial: ftdi_sio: add device IDs for Sienna and Echelon PL-20 (bsc#1051510).\n- usb: serial: keyspan: fix NULL-derefs on open() and write() (bsc#1051510).\n- usb: serial: option: add Telit FN980 compositions (bsc#1051510).\n- usb: serial: option: add support for Cinterion CLS8 devices (bsc#1051510).\n- usb: serial: ti_usb_3410_5052: fix port-close races (bsc#1051510).\n- usb: udc: lpc32xx: fix bad bit shift operation (bsc#1051510).\n- usb: usb-skeleton: fix NULL-deref on disconnect (bsc#1051510).\n- usb: usb-skeleton: fix runtime PM after driver unbind (bsc#1051510).\n- usb: usb-skeleton: fix use-after-free after driver unbind (bsc#1051510).\n- usb: usblcd: fix I/O after disconnect (bsc#1142635).\n- usb: usblp: fix runtime PM after driver unbind (bsc#1051510).\n- usb: usblp: fix use-after-free on disconnect (bsc#1051510).\n- usb: xhci: wait for CNR controller not ready bit in xhci resume (bsc#1051510).\n- usb: yurex: Do not retry on unexpected errors (bsc#1051510).\n- usb: yurex: fix NULL-derefs on disconnect (bsc#1051510).\n- usbnet: ignore endpoints with invalid wMaxPacketSize (bsc#1051510).\n- usbnet: sanity checking of packet sizes and device mtu (bsc#1051510).\n- vfio_pci: Restore original state on release (bsc#1051510).\n- vhost_net: conditionally enable tx polling (bsc#1145099).\n- video: of: display_timing: Add of_node_put() in of_get_display_timing() (bsc#1051510).\n- vsock: Fix a lockdep warning in __vsock_release() (networking-stable-19_10_05).\n- watchdog: imx2_wdt: fix min() calculation in imx2_wdt_set_timeout (bsc#1051510).\n- x86/asm: Fix MWAITX C-state hint value (bsc#1114279).\n- x86/boot/64: Make level2_kernel_pgt pages invalid outside kernel area (bnc#1153969).\n- x86/boot/64: Round memory hole size up to next PMD page (bnc#1153969).\n- x86/mm: Use WRITE_ONCE() when setting PTEs (bsc#1114279).\n- xen/netback: fix error path of xenvif_connect_data() (bsc#1065600).\n- xen/pv: Fix Xen PV guest int3 handling (bsc#1153811).\n- xhci: Check all endpoints for LPM timeout (bsc#1051510).\n- xhci: Fix false warning message about wrong bounce buffer write length (bsc#1051510).\n- xhci: Increase STS_SAVE timeout in xhci_suspend() (bsc#1051510).\n- xhci: Prevent device initiated U1/U2 link pm if exit latency is too long (bsc#1051510).\n\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2019-2947,SUSE-SLE-Module-Basesystem-15-SP1-2019-2947,SUSE-SLE-Module-Development-Tools-15-SP1-2019-2947,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-2947,SUSE-SLE-Module-Legacy-15-SP1-2019-2947,SUSE-SLE-Module-Live-Patching-15-SP1-2019-2947,SUSE-SLE-Product-HA-15-SP1-2019-2947,SUSE-SLE-Product-WE-15-SP1-2019-2947",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_2947-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2019:2947-1",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192947-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2019:2947-1",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192947-1.html"
},
{
"category": "self",
"summary": "SUSE Bug 1046299",
"url": "https://bugzilla.suse.com/1046299"
},
{
"category": "self",
"summary": "SUSE Bug 1046303",
"url": "https://bugzilla.suse.com/1046303"
},
{
"category": "self",
"summary": "SUSE Bug 1046305",
"url": "https://bugzilla.suse.com/1046305"
},
{
"category": "self",
"summary": "SUSE Bug 1050244",
"url": "https://bugzilla.suse.com/1050244"
},
{
"category": "self",
"summary": "SUSE Bug 1050536",
"url": "https://bugzilla.suse.com/1050536"
},
{
"category": "self",
"summary": "SUSE Bug 1050545",
"url": "https://bugzilla.suse.com/1050545"
},
{
"category": "self",
"summary": "SUSE Bug 1051510",
"url": "https://bugzilla.suse.com/1051510"
},
{
"category": "self",
"summary": "SUSE Bug 1055186",
"url": "https://bugzilla.suse.com/1055186"
},
{
"category": "self",
"summary": "SUSE Bug 1061840",
"url": "https://bugzilla.suse.com/1061840"
},
{
"category": "self",
"summary": "SUSE Bug 1064802",
"url": "https://bugzilla.suse.com/1064802"
},
{
"category": "self",
"summary": "SUSE Bug 1065600",
"url": "https://bugzilla.suse.com/1065600"
},
{
"category": "self",
"summary": "SUSE Bug 1066129",
"url": "https://bugzilla.suse.com/1066129"
},
{
"category": "self",
"summary": "SUSE Bug 1073513",
"url": "https://bugzilla.suse.com/1073513"
},
{
"category": "self",
"summary": "SUSE Bug 1082635",
"url": "https://bugzilla.suse.com/1082635"
},
{
"category": "self",
"summary": "SUSE Bug 1083647",
"url": "https://bugzilla.suse.com/1083647"
},
{
"category": "self",
"summary": "SUSE Bug 1086323",
"url": "https://bugzilla.suse.com/1086323"
},
{
"category": "self",
"summary": "SUSE Bug 1087092",
"url": "https://bugzilla.suse.com/1087092"
},
{
"category": "self",
"summary": "SUSE Bug 1089644",
"url": "https://bugzilla.suse.com/1089644"
},
{
"category": "self",
"summary": "SUSE Bug 1090631",
"url": "https://bugzilla.suse.com/1090631"
},
{
"category": "self",
"summary": "SUSE Bug 1093205",
"url": "https://bugzilla.suse.com/1093205"
},
{
"category": "self",
"summary": "SUSE Bug 1096254",
"url": "https://bugzilla.suse.com/1096254"
},
{
"category": "self",
"summary": "SUSE Bug 1097583",
"url": "https://bugzilla.suse.com/1097583"
},
{
"category": "self",
"summary": "SUSE Bug 1097584",
"url": "https://bugzilla.suse.com/1097584"
},
{
"category": "self",
"summary": "SUSE Bug 1097585",
"url": "https://bugzilla.suse.com/1097585"
},
{
"category": "self",
"summary": "SUSE Bug 1097586",
"url": "https://bugzilla.suse.com/1097586"
},
{
"category": "self",
"summary": "SUSE Bug 1097587",
"url": "https://bugzilla.suse.com/1097587"
},
{
"category": "self",
"summary": "SUSE Bug 1097588",
"url": "https://bugzilla.suse.com/1097588"
},
{
"category": "self",
"summary": "SUSE Bug 1098291",
"url": "https://bugzilla.suse.com/1098291"
},
{
"category": "self",
"summary": "SUSE Bug 1101674",
"url": "https://bugzilla.suse.com/1101674"
},
{
"category": "self",
"summary": "SUSE Bug 1109158",
"url": "https://bugzilla.suse.com/1109158"
},
{
"category": "self",
"summary": "SUSE Bug 1111666",
"url": "https://bugzilla.suse.com/1111666"
},
{
"category": "self",
"summary": "SUSE Bug 1112178",
"url": "https://bugzilla.suse.com/1112178"
},
{
"category": "self",
"summary": "SUSE Bug 1113994",
"url": "https://bugzilla.suse.com/1113994"
},
{
"category": "self",
"summary": "SUSE Bug 1114279",
"url": "https://bugzilla.suse.com/1114279"
},
{
"category": "self",
"summary": "SUSE Bug 1117665",
"url": "https://bugzilla.suse.com/1117665"
},
{
"category": "self",
"summary": "SUSE Bug 1119461",
"url": "https://bugzilla.suse.com/1119461"
},
{
"category": "self",
"summary": "SUSE Bug 1119465",
"url": "https://bugzilla.suse.com/1119465"
},
{
"category": "self",
"summary": "SUSE Bug 1123034",
"url": "https://bugzilla.suse.com/1123034"
},
{
"category": "self",
"summary": "SUSE Bug 1123080",
"url": "https://bugzilla.suse.com/1123080"
},
{
"category": "self",
"summary": "SUSE Bug 1133140",
"url": "https://bugzilla.suse.com/1133140"
},
{
"category": "self",
"summary": "SUSE Bug 1134303",
"url": "https://bugzilla.suse.com/1134303"
},
{
"category": "self",
"summary": "SUSE Bug 1135642",
"url": "https://bugzilla.suse.com/1135642"
},
{
"category": "self",
"summary": "SUSE Bug 1135854",
"url": "https://bugzilla.suse.com/1135854"
},
{
"category": "self",
"summary": "SUSE Bug 1135873",
"url": "https://bugzilla.suse.com/1135873"
},
{
"category": "self",
"summary": "SUSE Bug 1135967",
"url": "https://bugzilla.suse.com/1135967"
},
{
"category": "self",
"summary": "SUSE Bug 1137040",
"url": "https://bugzilla.suse.com/1137040"
},
{
"category": "self",
"summary": "SUSE Bug 1137799",
"url": "https://bugzilla.suse.com/1137799"
},
{
"category": "self",
"summary": "SUSE Bug 1137861",
"url": "https://bugzilla.suse.com/1137861"
},
{
"category": "self",
"summary": "SUSE Bug 1138190",
"url": "https://bugzilla.suse.com/1138190"
},
{
"category": "self",
"summary": "SUSE Bug 1139073",
"url": "https://bugzilla.suse.com/1139073"
},
{
"category": "self",
"summary": "SUSE Bug 1140090",
"url": "https://bugzilla.suse.com/1140090"
},
{
"category": "self",
"summary": "SUSE Bug 1140729",
"url": "https://bugzilla.suse.com/1140729"
},
{
"category": "self",
"summary": "SUSE Bug 1140845",
"url": "https://bugzilla.suse.com/1140845"
},
{
"category": "self",
"summary": "SUSE Bug 1140883",
"url": "https://bugzilla.suse.com/1140883"
},
{
"category": "self",
"summary": "SUSE Bug 1141600",
"url": "https://bugzilla.suse.com/1141600"
},
{
"category": "self",
"summary": "SUSE Bug 1142635",
"url": "https://bugzilla.suse.com/1142635"
},
{
"category": "self",
"summary": "SUSE Bug 1142667",
"url": "https://bugzilla.suse.com/1142667"
},
{
"category": "self",
"summary": "SUSE Bug 1143706",
"url": "https://bugzilla.suse.com/1143706"
},
{
"category": "self",
"summary": "SUSE Bug 1144338",
"url": "https://bugzilla.suse.com/1144338"
},
{
"category": "self",
"summary": "SUSE Bug 1144375",
"url": "https://bugzilla.suse.com/1144375"
},
{
"category": "self",
"summary": "SUSE Bug 1144449",
"url": "https://bugzilla.suse.com/1144449"
},
{
"category": "self",
"summary": "SUSE Bug 1144903",
"url": "https://bugzilla.suse.com/1144903"
},
{
"category": "self",
"summary": "SUSE Bug 1145099",
"url": "https://bugzilla.suse.com/1145099"
},
{
"category": "self",
"summary": "SUSE Bug 1146612",
"url": "https://bugzilla.suse.com/1146612"
},
{
"category": "self",
"summary": "SUSE Bug 1148410",
"url": "https://bugzilla.suse.com/1148410"
},
{
"category": "self",
"summary": "SUSE Bug 1149119",
"url": "https://bugzilla.suse.com/1149119"
},
{
"category": "self",
"summary": "SUSE Bug 1149853",
"url": "https://bugzilla.suse.com/1149853"
},
{
"category": "self",
"summary": "SUSE Bug 1150452",
"url": "https://bugzilla.suse.com/1150452"
},
{
"category": "self",
"summary": "SUSE Bug 1150457",
"url": "https://bugzilla.suse.com/1150457"
},
{
"category": "self",
"summary": "SUSE Bug 1150465",
"url": "https://bugzilla.suse.com/1150465"
},
{
"category": "self",
"summary": "SUSE Bug 1150875",
"url": "https://bugzilla.suse.com/1150875"
},
{
"category": "self",
"summary": "SUSE Bug 1151508",
"url": "https://bugzilla.suse.com/1151508"
},
{
"category": "self",
"summary": "SUSE Bug 1151807",
"url": "https://bugzilla.suse.com/1151807"
},
{
"category": "self",
"summary": "SUSE Bug 1152033",
"url": "https://bugzilla.suse.com/1152033"
},
{
"category": "self",
"summary": "SUSE Bug 1152624",
"url": "https://bugzilla.suse.com/1152624"
},
{
"category": "self",
"summary": "SUSE Bug 1152665",
"url": "https://bugzilla.suse.com/1152665"
},
{
"category": "self",
"summary": "SUSE Bug 1152685",
"url": "https://bugzilla.suse.com/1152685"
},
{
"category": "self",
"summary": "SUSE Bug 1152696",
"url": "https://bugzilla.suse.com/1152696"
},
{
"category": "self",
"summary": "SUSE Bug 1152697",
"url": "https://bugzilla.suse.com/1152697"
},
{
"category": "self",
"summary": "SUSE Bug 1152788",
"url": "https://bugzilla.suse.com/1152788"
},
{
"category": "self",
"summary": "SUSE Bug 1152790",
"url": "https://bugzilla.suse.com/1152790"
},
{
"category": "self",
"summary": "SUSE Bug 1152791",
"url": "https://bugzilla.suse.com/1152791"
},
{
"category": "self",
"summary": "SUSE Bug 1153112",
"url": "https://bugzilla.suse.com/1153112"
},
{
"category": "self",
"summary": "SUSE Bug 1153158",
"url": "https://bugzilla.suse.com/1153158"
},
{
"category": "self",
"summary": "SUSE Bug 1153236",
"url": "https://bugzilla.suse.com/1153236"
},
{
"category": "self",
"summary": "SUSE Bug 1153263",
"url": "https://bugzilla.suse.com/1153263"
},
{
"category": "self",
"summary": "SUSE Bug 1153476",
"url": "https://bugzilla.suse.com/1153476"
},
{
"category": "self",
"summary": "SUSE Bug 1153509",
"url": "https://bugzilla.suse.com/1153509"
},
{
"category": "self",
"summary": "SUSE Bug 1153607",
"url": "https://bugzilla.suse.com/1153607"
},
{
"category": "self",
"summary": "SUSE Bug 1153646",
"url": "https://bugzilla.suse.com/1153646"
},
{
"category": "self",
"summary": "SUSE Bug 1153681",
"url": "https://bugzilla.suse.com/1153681"
},
{
"category": "self",
"summary": "SUSE Bug 1153713",
"url": "https://bugzilla.suse.com/1153713"
},
{
"category": "self",
"summary": "SUSE Bug 1153717",
"url": "https://bugzilla.suse.com/1153717"
},
{
"category": "self",
"summary": "SUSE Bug 1153718",
"url": "https://bugzilla.suse.com/1153718"
},
{
"category": "self",
"summary": "SUSE Bug 1153719",
"url": "https://bugzilla.suse.com/1153719"
},
{
"category": "self",
"summary": "SUSE Bug 1153811",
"url": "https://bugzilla.suse.com/1153811"
},
{
"category": "self",
"summary": "SUSE Bug 1153969",
"url": "https://bugzilla.suse.com/1153969"
},
{
"category": "self",
"summary": "SUSE Bug 1154108",
"url": "https://bugzilla.suse.com/1154108"
},
{
"category": "self",
"summary": "SUSE Bug 1154189",
"url": "https://bugzilla.suse.com/1154189"
},
{
"category": "self",
"summary": "SUSE Bug 1154242",
"url": "https://bugzilla.suse.com/1154242"
},
{
"category": "self",
"summary": "SUSE Bug 1154268",
"url": "https://bugzilla.suse.com/1154268"
},
{
"category": "self",
"summary": "SUSE Bug 1154354",
"url": "https://bugzilla.suse.com/1154354"
},
{
"category": "self",
"summary": "SUSE Bug 1154372",
"url": "https://bugzilla.suse.com/1154372"
},
{
"category": "self",
"summary": "SUSE Bug 1154521",
"url": "https://bugzilla.suse.com/1154521"
},
{
"category": "self",
"summary": "SUSE Bug 1154578",
"url": "https://bugzilla.suse.com/1154578"
},
{
"category": "self",
"summary": "SUSE Bug 1154607",
"url": "https://bugzilla.suse.com/1154607"
},
{
"category": "self",
"summary": "SUSE Bug 1154608",
"url": "https://bugzilla.suse.com/1154608"
},
{
"category": "self",
"summary": "SUSE Bug 1154610",
"url": "https://bugzilla.suse.com/1154610"
},
{
"category": "self",
"summary": "SUSE Bug 1154611",
"url": "https://bugzilla.suse.com/1154611"
},
{
"category": "self",
"summary": "SUSE Bug 1154651",
"url": "https://bugzilla.suse.com/1154651"
},
{
"category": "self",
"summary": "SUSE Bug 1154737",
"url": "https://bugzilla.suse.com/1154737"
},
{
"category": "self",
"summary": "SUSE Bug 1154747",
"url": "https://bugzilla.suse.com/1154747"
},
{
"category": "self",
"summary": "SUSE Bug 1154848",
"url": "https://bugzilla.suse.com/1154848"
},
{
"category": "self",
"summary": "SUSE Bug 1154858",
"url": "https://bugzilla.suse.com/1154858"
},
{
"category": "self",
"summary": "SUSE Bug 1154905",
"url": "https://bugzilla.suse.com/1154905"
},
{
"category": "self",
"summary": "SUSE Bug 1154956",
"url": "https://bugzilla.suse.com/1154956"
},
{
"category": "self",
"summary": "SUSE Bug 1155061",
"url": "https://bugzilla.suse.com/1155061"
},
{
"category": "self",
"summary": "SUSE Bug 1155178",
"url": "https://bugzilla.suse.com/1155178"
},
{
"category": "self",
"summary": "SUSE Bug 1155179",
"url": "https://bugzilla.suse.com/1155179"
},
{
"category": "self",
"summary": "SUSE Bug 1155184",
"url": "https://bugzilla.suse.com/1155184"
},
{
"category": "self",
"summary": "SUSE Bug 1155186",
"url": "https://bugzilla.suse.com/1155186"
},
{
"category": "self",
"summary": "SUSE Bug 1155671",
"url": "https://bugzilla.suse.com/1155671"
},
{
"category": "self",
"summary": "SUSE Bug 802154",
"url": "https://bugzilla.suse.com/802154"
},
{
"category": "self",
"summary": "SUSE Bug 814594",
"url": "https://bugzilla.suse.com/814594"
},
{
"category": "self",
"summary": "SUSE Bug 919448",
"url": "https://bugzilla.suse.com/919448"
},
{
"category": "self",
"summary": "SUSE Bug 987367",
"url": "https://bugzilla.suse.com/987367"
},
{
"category": "self",
"summary": "SUSE Bug 998153",
"url": "https://bugzilla.suse.com/998153"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-12207 page",
"url": "https://www.suse.com/security/cve/CVE-2018-12207/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-10220 page",
"url": "https://www.suse.com/security/cve/CVE-2019-10220/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11135 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11135/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-16232 page",
"url": "https://www.suse.com/security/cve/CVE-2019-16232/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-16233 page",
"url": "https://www.suse.com/security/cve/CVE-2019-16233/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-16234 page",
"url": "https://www.suse.com/security/cve/CVE-2019-16234/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-16995 page",
"url": "https://www.suse.com/security/cve/CVE-2019-16995/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-17056 page",
"url": "https://www.suse.com/security/cve/CVE-2019-17056/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-17133 page",
"url": "https://www.suse.com/security/cve/CVE-2019-17133/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-17666 page",
"url": "https://www.suse.com/security/cve/CVE-2019-17666/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2019-11-12T18:08:00Z",
"generator": {
"date": "2019-11-12T18:08:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2019:2947-1",
"initial_release_date": "2019-11-12T18:08:00Z",
"revision_history": [
{
"date": "2019-11-12T18:08:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-197.26.1.aarch64",
"product": {
"name": "cluster-md-kmp-default-4.12.14-197.26.1.aarch64",
"product_id": "cluster-md-kmp-default-4.12.14-197.26.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-197.26.1.aarch64",
"product": {
"name": "dlm-kmp-default-4.12.14-197.26.1.aarch64",
"product_id": "dlm-kmp-default-4.12.14-197.26.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-197.26.1.aarch64",
"product": {
"name": "gfs2-kmp-default-4.12.14-197.26.1.aarch64",
"product_id": "gfs2-kmp-default-4.12.14-197.26.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-197.26.1.aarch64",
"product": {
"name": "kernel-default-4.12.14-197.26.1.aarch64",
"product_id": "kernel-default-4.12.14-197.26.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-197.26.1.aarch64",
"product": {
"name": "kernel-default-base-4.12.14-197.26.1.aarch64",
"product_id": "kernel-default-base-4.12.14-197.26.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-197.26.1.aarch64",
"product": {
"name": "kernel-default-devel-4.12.14-197.26.1.aarch64",
"product_id": "kernel-default-devel-4.12.14-197.26.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-197.26.1.aarch64",
"product": {
"name": "kernel-default-extra-4.12.14-197.26.1.aarch64",
"product_id": "kernel-default-extra-4.12.14-197.26.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-4.12.14-197.26.1.aarch64",
"product": {
"name": "kernel-default-livepatch-4.12.14-197.26.1.aarch64",
"product_id": "kernel-default-livepatch-4.12.14-197.26.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-4.12.14-197.26.1.aarch64",
"product": {
"name": "kernel-default-livepatch-devel-4.12.14-197.26.1.aarch64",
"product_id": "kernel-default-livepatch-devel-4.12.14-197.26.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-197.26.1.aarch64",
"product": {
"name": "kernel-obs-build-4.12.14-197.26.1.aarch64",
"product_id": "kernel-obs-build-4.12.14-197.26.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-197.26.1.aarch64",
"product": {
"name": "kernel-obs-qa-4.12.14-197.26.1.aarch64",
"product_id": "kernel-obs-qa-4.12.14-197.26.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-197.26.1.aarch64",
"product": {
"name": "kernel-syms-4.12.14-197.26.1.aarch64",
"product_id": "kernel-syms-4.12.14-197.26.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-197.26.1.aarch64",
"product": {
"name": "kernel-vanilla-4.12.14-197.26.1.aarch64",
"product_id": "kernel-vanilla-4.12.14-197.26.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-197.26.1.aarch64",
"product": {
"name": "kernel-vanilla-base-4.12.14-197.26.1.aarch64",
"product_id": "kernel-vanilla-base-4.12.14-197.26.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-197.26.1.aarch64",
"product": {
"name": "kernel-vanilla-devel-4.12.14-197.26.1.aarch64",
"product_id": "kernel-vanilla-devel-4.12.14-197.26.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-livepatch-devel-4.12.14-197.26.1.aarch64",
"product": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-197.26.1.aarch64",
"product_id": "kernel-vanilla-livepatch-devel-4.12.14-197.26.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-197.26.1.aarch64",
"product": {
"name": "kselftests-kmp-default-4.12.14-197.26.1.aarch64",
"product_id": "kselftests-kmp-default-4.12.14-197.26.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-197.26.1.aarch64",
"product": {
"name": "ocfs2-kmp-default-4.12.14-197.26.1.aarch64",
"product_id": "ocfs2-kmp-default-4.12.14-197.26.1.aarch64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-4.12.14-197.26.1.aarch64",
"product": {
"name": "reiserfs-kmp-default-4.12.14-197.26.1.aarch64",
"product_id": "reiserfs-kmp-default-4.12.14-197.26.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-4.12.14-197.26.1.noarch",
"product": {
"name": "kernel-devel-4.12.14-197.26.1.noarch",
"product_id": "kernel-devel-4.12.14-197.26.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-4.12.14-197.26.1.noarch",
"product": {
"name": "kernel-docs-4.12.14-197.26.1.noarch",
"product_id": "kernel-docs-4.12.14-197.26.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-html-4.12.14-197.26.1.noarch",
"product": {
"name": "kernel-docs-html-4.12.14-197.26.1.noarch",
"product_id": "kernel-docs-html-4.12.14-197.26.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-4.12.14-197.26.1.noarch",
"product": {
"name": "kernel-macros-4.12.14-197.26.1.noarch",
"product_id": "kernel-macros-4.12.14-197.26.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-4.12.14-197.26.1.noarch",
"product": {
"name": "kernel-source-4.12.14-197.26.1.noarch",
"product_id": "kernel-source-4.12.14-197.26.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-4.12.14-197.26.1.noarch",
"product": {
"name": "kernel-source-vanilla-4.12.14-197.26.1.noarch",
"product_id": "kernel-source-vanilla-4.12.14-197.26.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-197.26.1.ppc64le",
"product": {
"name": "cluster-md-kmp-default-4.12.14-197.26.1.ppc64le",
"product_id": "cluster-md-kmp-default-4.12.14-197.26.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-197.26.1.ppc64le",
"product": {
"name": "dlm-kmp-default-4.12.14-197.26.1.ppc64le",
"product_id": "dlm-kmp-default-4.12.14-197.26.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-197.26.1.ppc64le",
"product": {
"name": "gfs2-kmp-default-4.12.14-197.26.1.ppc64le",
"product_id": "gfs2-kmp-default-4.12.14-197.26.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-4.12.14-197.26.1.ppc64le",
"product": {
"name": "kernel-debug-4.12.14-197.26.1.ppc64le",
"product_id": "kernel-debug-4.12.14-197.26.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-4.12.14-197.26.1.ppc64le",
"product": {
"name": "kernel-debug-base-4.12.14-197.26.1.ppc64le",
"product_id": "kernel-debug-base-4.12.14-197.26.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-4.12.14-197.26.1.ppc64le",
"product": {
"name": "kernel-debug-devel-4.12.14-197.26.1.ppc64le",
"product_id": "kernel-debug-devel-4.12.14-197.26.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-livepatch-devel-4.12.14-197.26.1.ppc64le",
"product": {
"name": "kernel-debug-livepatch-devel-4.12.14-197.26.1.ppc64le",
"product_id": "kernel-debug-livepatch-devel-4.12.14-197.26.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-197.26.1.ppc64le",
"product": {
"name": "kernel-default-4.12.14-197.26.1.ppc64le",
"product_id": "kernel-default-4.12.14-197.26.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-197.26.1.ppc64le",
"product": {
"name": "kernel-default-base-4.12.14-197.26.1.ppc64le",
"product_id": "kernel-default-base-4.12.14-197.26.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-197.26.1.ppc64le",
"product": {
"name": "kernel-default-devel-4.12.14-197.26.1.ppc64le",
"product_id": "kernel-default-devel-4.12.14-197.26.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-197.26.1.ppc64le",
"product": {
"name": "kernel-default-extra-4.12.14-197.26.1.ppc64le",
"product_id": "kernel-default-extra-4.12.14-197.26.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-4.12.14-197.26.1.ppc64le",
"product": {
"name": "kernel-default-livepatch-4.12.14-197.26.1.ppc64le",
"product_id": "kernel-default-livepatch-4.12.14-197.26.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-4.12.14-197.26.1.ppc64le",
"product": {
"name": "kernel-default-livepatch-devel-4.12.14-197.26.1.ppc64le",
"product_id": "kernel-default-livepatch-devel-4.12.14-197.26.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-197_26-default-1-3.5.1.ppc64le",
"product": {
"name": "kernel-livepatch-4_12_14-197_26-default-1-3.5.1.ppc64le",
"product_id": "kernel-livepatch-4_12_14-197_26-default-1-3.5.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-197.26.1.ppc64le",
"product": {
"name": "kernel-obs-build-4.12.14-197.26.1.ppc64le",
"product_id": "kernel-obs-build-4.12.14-197.26.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-197.26.1.ppc64le",
"product": {
"name": "kernel-obs-qa-4.12.14-197.26.1.ppc64le",
"product_id": "kernel-obs-qa-4.12.14-197.26.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-197.26.1.ppc64le",
"product": {
"name": "kernel-syms-4.12.14-197.26.1.ppc64le",
"product_id": "kernel-syms-4.12.14-197.26.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-197.26.1.ppc64le",
"product": {
"name": "kernel-vanilla-4.12.14-197.26.1.ppc64le",
"product_id": "kernel-vanilla-4.12.14-197.26.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-197.26.1.ppc64le",
"product": {
"name": "kernel-vanilla-base-4.12.14-197.26.1.ppc64le",
"product_id": "kernel-vanilla-base-4.12.14-197.26.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-197.26.1.ppc64le",
"product": {
"name": "kernel-vanilla-devel-4.12.14-197.26.1.ppc64le",
"product_id": "kernel-vanilla-devel-4.12.14-197.26.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-livepatch-devel-4.12.14-197.26.1.ppc64le",
"product": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-197.26.1.ppc64le",
"product_id": "kernel-vanilla-livepatch-devel-4.12.14-197.26.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-197.26.1.ppc64le",
"product": {
"name": "kselftests-kmp-default-4.12.14-197.26.1.ppc64le",
"product_id": "kselftests-kmp-default-4.12.14-197.26.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-197.26.1.ppc64le",
"product": {
"name": "ocfs2-kmp-default-4.12.14-197.26.1.ppc64le",
"product_id": "ocfs2-kmp-default-4.12.14-197.26.1.ppc64le"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-4.12.14-197.26.1.ppc64le",
"product": {
"name": "reiserfs-kmp-default-4.12.14-197.26.1.ppc64le",
"product_id": "reiserfs-kmp-default-4.12.14-197.26.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-197.26.1.s390x",
"product": {
"name": "cluster-md-kmp-default-4.12.14-197.26.1.s390x",
"product_id": "cluster-md-kmp-default-4.12.14-197.26.1.s390x"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-197.26.1.s390x",
"product": {
"name": "dlm-kmp-default-4.12.14-197.26.1.s390x",
"product_id": "dlm-kmp-default-4.12.14-197.26.1.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-197.26.1.s390x",
"product": {
"name": "gfs2-kmp-default-4.12.14-197.26.1.s390x",
"product_id": "gfs2-kmp-default-4.12.14-197.26.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-197.26.1.s390x",
"product": {
"name": "kernel-default-4.12.14-197.26.1.s390x",
"product_id": "kernel-default-4.12.14-197.26.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-197.26.1.s390x",
"product": {
"name": "kernel-default-base-4.12.14-197.26.1.s390x",
"product_id": "kernel-default-base-4.12.14-197.26.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-197.26.1.s390x",
"product": {
"name": "kernel-default-devel-4.12.14-197.26.1.s390x",
"product_id": "kernel-default-devel-4.12.14-197.26.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-197.26.1.s390x",
"product": {
"name": "kernel-default-extra-4.12.14-197.26.1.s390x",
"product_id": "kernel-default-extra-4.12.14-197.26.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-4.12.14-197.26.1.s390x",
"product": {
"name": "kernel-default-livepatch-4.12.14-197.26.1.s390x",
"product_id": "kernel-default-livepatch-4.12.14-197.26.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-4.12.14-197.26.1.s390x",
"product": {
"name": "kernel-default-livepatch-devel-4.12.14-197.26.1.s390x",
"product_id": "kernel-default-livepatch-devel-4.12.14-197.26.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-man-4.12.14-197.26.1.s390x",
"product": {
"name": "kernel-default-man-4.12.14-197.26.1.s390x",
"product_id": "kernel-default-man-4.12.14-197.26.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-197.26.1.s390x",
"product": {
"name": "kernel-obs-build-4.12.14-197.26.1.s390x",
"product_id": "kernel-obs-build-4.12.14-197.26.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-197.26.1.s390x",
"product": {
"name": "kernel-obs-qa-4.12.14-197.26.1.s390x",
"product_id": "kernel-obs-qa-4.12.14-197.26.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-197.26.1.s390x",
"product": {
"name": "kernel-syms-4.12.14-197.26.1.s390x",
"product_id": "kernel-syms-4.12.14-197.26.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-197.26.1.s390x",
"product": {
"name": "kernel-vanilla-4.12.14-197.26.1.s390x",
"product_id": "kernel-vanilla-4.12.14-197.26.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-197.26.1.s390x",
"product": {
"name": "kernel-vanilla-base-4.12.14-197.26.1.s390x",
"product_id": "kernel-vanilla-base-4.12.14-197.26.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-197.26.1.s390x",
"product": {
"name": "kernel-vanilla-devel-4.12.14-197.26.1.s390x",
"product_id": "kernel-vanilla-devel-4.12.14-197.26.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-livepatch-devel-4.12.14-197.26.1.s390x",
"product": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-197.26.1.s390x",
"product_id": "kernel-vanilla-livepatch-devel-4.12.14-197.26.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-4.12.14-197.26.1.s390x",
"product": {
"name": "kernel-zfcpdump-4.12.14-197.26.1.s390x",
"product_id": "kernel-zfcpdump-4.12.14-197.26.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-man-4.12.14-197.26.1.s390x",
"product": {
"name": "kernel-zfcpdump-man-4.12.14-197.26.1.s390x",
"product_id": "kernel-zfcpdump-man-4.12.14-197.26.1.s390x"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-197.26.1.s390x",
"product": {
"name": "kselftests-kmp-default-4.12.14-197.26.1.s390x",
"product_id": "kselftests-kmp-default-4.12.14-197.26.1.s390x"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-197.26.1.s390x",
"product": {
"name": "ocfs2-kmp-default-4.12.14-197.26.1.s390x",
"product_id": "ocfs2-kmp-default-4.12.14-197.26.1.s390x"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-4.12.14-197.26.1.s390x",
"product": {
"name": "reiserfs-kmp-default-4.12.14-197.26.1.s390x",
"product_id": "reiserfs-kmp-default-4.12.14-197.26.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-197.26.1.x86_64",
"product": {
"name": "cluster-md-kmp-default-4.12.14-197.26.1.x86_64",
"product_id": "cluster-md-kmp-default-4.12.14-197.26.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-197.26.1.x86_64",
"product": {
"name": "dlm-kmp-default-4.12.14-197.26.1.x86_64",
"product_id": "dlm-kmp-default-4.12.14-197.26.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-197.26.1.x86_64",
"product": {
"name": "gfs2-kmp-default-4.12.14-197.26.1.x86_64",
"product_id": "gfs2-kmp-default-4.12.14-197.26.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-4.12.14-197.26.1.x86_64",
"product": {
"name": "kernel-debug-4.12.14-197.26.1.x86_64",
"product_id": "kernel-debug-4.12.14-197.26.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-4.12.14-197.26.1.x86_64",
"product": {
"name": "kernel-debug-base-4.12.14-197.26.1.x86_64",
"product_id": "kernel-debug-base-4.12.14-197.26.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-4.12.14-197.26.1.x86_64",
"product": {
"name": "kernel-debug-devel-4.12.14-197.26.1.x86_64",
"product_id": "kernel-debug-devel-4.12.14-197.26.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-livepatch-devel-4.12.14-197.26.1.x86_64",
"product": {
"name": "kernel-debug-livepatch-devel-4.12.14-197.26.1.x86_64",
"product_id": "kernel-debug-livepatch-devel-4.12.14-197.26.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-197.26.1.x86_64",
"product": {
"name": "kernel-default-4.12.14-197.26.1.x86_64",
"product_id": "kernel-default-4.12.14-197.26.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-197.26.1.x86_64",
"product": {
"name": "kernel-default-base-4.12.14-197.26.1.x86_64",
"product_id": "kernel-default-base-4.12.14-197.26.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-197.26.1.x86_64",
"product": {
"name": "kernel-default-devel-4.12.14-197.26.1.x86_64",
"product_id": "kernel-default-devel-4.12.14-197.26.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-197.26.1.x86_64",
"product": {
"name": "kernel-default-extra-4.12.14-197.26.1.x86_64",
"product_id": "kernel-default-extra-4.12.14-197.26.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-4.12.14-197.26.1.x86_64",
"product": {
"name": "kernel-default-livepatch-4.12.14-197.26.1.x86_64",
"product_id": "kernel-default-livepatch-4.12.14-197.26.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-4.12.14-197.26.1.x86_64",
"product": {
"name": "kernel-default-livepatch-devel-4.12.14-197.26.1.x86_64",
"product_id": "kernel-default-livepatch-devel-4.12.14-197.26.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-4.12.14-197.26.1.x86_64",
"product": {
"name": "kernel-kvmsmall-4.12.14-197.26.1.x86_64",
"product_id": "kernel-kvmsmall-4.12.14-197.26.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-base-4.12.14-197.26.1.x86_64",
"product": {
"name": "kernel-kvmsmall-base-4.12.14-197.26.1.x86_64",
"product_id": "kernel-kvmsmall-base-4.12.14-197.26.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-4.12.14-197.26.1.x86_64",
"product": {
"name": "kernel-kvmsmall-devel-4.12.14-197.26.1.x86_64",
"product_id": "kernel-kvmsmall-devel-4.12.14-197.26.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-livepatch-devel-4.12.14-197.26.1.x86_64",
"product": {
"name": "kernel-kvmsmall-livepatch-devel-4.12.14-197.26.1.x86_64",
"product_id": "kernel-kvmsmall-livepatch-devel-4.12.14-197.26.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-197_26-default-1-3.5.1.x86_64",
"product": {
"name": "kernel-livepatch-4_12_14-197_26-default-1-3.5.1.x86_64",
"product_id": "kernel-livepatch-4_12_14-197_26-default-1-3.5.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-197.26.1.x86_64",
"product": {
"name": "kernel-obs-build-4.12.14-197.26.1.x86_64",
"product_id": "kernel-obs-build-4.12.14-197.26.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-197.26.1.x86_64",
"product": {
"name": "kernel-obs-qa-4.12.14-197.26.1.x86_64",
"product_id": "kernel-obs-qa-4.12.14-197.26.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-197.26.1.x86_64",
"product": {
"name": "kernel-syms-4.12.14-197.26.1.x86_64",
"product_id": "kernel-syms-4.12.14-197.26.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-197.26.1.x86_64",
"product": {
"name": "kernel-vanilla-4.12.14-197.26.1.x86_64",
"product_id": "kernel-vanilla-4.12.14-197.26.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-197.26.1.x86_64",
"product": {
"name": "kernel-vanilla-base-4.12.14-197.26.1.x86_64",
"product_id": "kernel-vanilla-base-4.12.14-197.26.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-197.26.1.x86_64",
"product": {
"name": "kernel-vanilla-devel-4.12.14-197.26.1.x86_64",
"product_id": "kernel-vanilla-devel-4.12.14-197.26.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-livepatch-devel-4.12.14-197.26.1.x86_64",
"product": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-197.26.1.x86_64",
"product_id": "kernel-vanilla-livepatch-devel-4.12.14-197.26.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-197.26.1.x86_64",
"product": {
"name": "kselftests-kmp-default-4.12.14-197.26.1.x86_64",
"product_id": "kselftests-kmp-default-4.12.14-197.26.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-197.26.1.x86_64",
"product": {
"name": "ocfs2-kmp-default-4.12.14-197.26.1.x86_64",
"product_id": "ocfs2-kmp-default-4.12.14-197.26.1.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-4.12.14-197.26.1.x86_64",
"product": {
"name": "reiserfs-kmp-default-4.12.14-197.26.1.x86_64",
"product_id": "reiserfs-kmp-default-4.12.14-197.26.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product": {
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-basesystem:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP1",
"product": {
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-development-tools:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Legacy 15 SP1",
"product": {
"name": "SUSE Linux Enterprise Module for Legacy 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-legacy:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP1",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Availability Extension 15 SP1",
"product": {
"name": "SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-ha:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Workstation Extension 15 SP1",
"product": {
"name": "SUSE Linux Enterprise Workstation Extension 15 SP1",
"product_id": "SUSE Linux Enterprise Workstation Extension 15 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-we:15:sp1"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-197.26.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.aarch64"
},
"product_reference": "kernel-default-4.12.14-197.26.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-197.26.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.ppc64le"
},
"product_reference": "kernel-default-4.12.14-197.26.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-197.26.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.s390x"
},
"product_reference": "kernel-default-4.12.14-197.26.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-197.26.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-197.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-197.26.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.aarch64"
},
"product_reference": "kernel-default-base-4.12.14-197.26.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-197.26.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.ppc64le"
},
"product_reference": "kernel-default-base-4.12.14-197.26.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-197.26.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.s390x"
},
"product_reference": "kernel-default-base-4.12.14-197.26.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-197.26.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-197.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-197.26.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.aarch64"
},
"product_reference": "kernel-default-devel-4.12.14-197.26.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-197.26.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.ppc64le"
},
"product_reference": "kernel-default-devel-4.12.14-197.26.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-197.26.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.s390x"
},
"product_reference": "kernel-default-devel-4.12.14-197.26.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-197.26.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-197.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-4.12.14-197.26.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.26.1.s390x"
},
"product_reference": "kernel-default-man-4.12.14-197.26.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-197.26.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.26.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-197.26.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-197.26.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.26.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-197.26.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-4.12.14-197.26.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.26.1.s390x"
},
"product_reference": "kernel-zfcpdump-4.12.14-197.26.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.12.14-197.26.1.noarch as component of SUSE Linux Enterprise Module for Development Tools 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.26.1.noarch"
},
"product_reference": "kernel-docs-4.12.14-197.26.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-197.26.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.aarch64"
},
"product_reference": "kernel-obs-build-4.12.14-197.26.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-197.26.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.ppc64le"
},
"product_reference": "kernel-obs-build-4.12.14-197.26.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-197.26.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.s390x"
},
"product_reference": "kernel-obs-build-4.12.14-197.26.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-197.26.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.x86_64"
},
"product_reference": "kernel-obs-build-4.12.14-197.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-197.26.1.noarch as component of SUSE Linux Enterprise Module for Development Tools 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.26.1.noarch"
},
"product_reference": "kernel-source-4.12.14-197.26.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-197.26.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.aarch64"
},
"product_reference": "kernel-syms-4.12.14-197.26.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-197.26.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.ppc64le"
},
"product_reference": "kernel-syms-4.12.14-197.26.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-197.26.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.s390x"
},
"product_reference": "kernel-syms-4.12.14-197.26.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-197.26.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-197.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-197.26.1.aarch64 as component of SUSE Linux Enterprise Module for Legacy 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.aarch64"
},
"product_reference": "reiserfs-kmp-default-4.12.14-197.26.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-197.26.1.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.ppc64le"
},
"product_reference": "reiserfs-kmp-default-4.12.14-197.26.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-197.26.1.s390x as component of SUSE Linux Enterprise Module for Legacy 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.s390x"
},
"product_reference": "reiserfs-kmp-default-4.12.14-197.26.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-197.26.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.x86_64"
},
"product_reference": "reiserfs-kmp-default-4.12.14-197.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-4.12.14-197.26.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.26.1.ppc64le"
},
"product_reference": "kernel-default-livepatch-4.12.14-197.26.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-4.12.14-197.26.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.26.1.x86_64"
},
"product_reference": "kernel-default-livepatch-4.12.14-197.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-4.12.14-197.26.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.26.1.ppc64le"
},
"product_reference": "kernel-default-livepatch-devel-4.12.14-197.26.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-4.12.14-197.26.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.26.1.x86_64"
},
"product_reference": "kernel-default-livepatch-devel-4.12.14-197.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_26-default-1-3.5.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-1-3.5.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-197_26-default-1-3.5.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-197_26-default-1-3.5.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-1-3.5.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-197_26-default-1-3.5.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-197.26.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.aarch64"
},
"product_reference": "cluster-md-kmp-default-4.12.14-197.26.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-197.26.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.ppc64le"
},
"product_reference": "cluster-md-kmp-default-4.12.14-197.26.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-197.26.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.s390x"
},
"product_reference": "cluster-md-kmp-default-4.12.14-197.26.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-197.26.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.x86_64"
},
"product_reference": "cluster-md-kmp-default-4.12.14-197.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-197.26.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.aarch64"
},
"product_reference": "dlm-kmp-default-4.12.14-197.26.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-197.26.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.ppc64le"
},
"product_reference": "dlm-kmp-default-4.12.14-197.26.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-197.26.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.s390x"
},
"product_reference": "dlm-kmp-default-4.12.14-197.26.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-197.26.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.x86_64"
},
"product_reference": "dlm-kmp-default-4.12.14-197.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-197.26.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.aarch64"
},
"product_reference": "gfs2-kmp-default-4.12.14-197.26.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-197.26.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.ppc64le"
},
"product_reference": "gfs2-kmp-default-4.12.14-197.26.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-197.26.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.s390x"
},
"product_reference": "gfs2-kmp-default-4.12.14-197.26.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-197.26.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.x86_64"
},
"product_reference": "gfs2-kmp-default-4.12.14-197.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-197.26.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.aarch64"
},
"product_reference": "ocfs2-kmp-default-4.12.14-197.26.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-197.26.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.ppc64le"
},
"product_reference": "ocfs2-kmp-default-4.12.14-197.26.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-197.26.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.s390x"
},
"product_reference": "ocfs2-kmp-default-4.12.14-197.26.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-197.26.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.x86_64"
},
"product_reference": "ocfs2-kmp-default-4.12.14-197.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-4.12.14-197.26.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15 SP1",
"product_id": "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.26.1.x86_64"
},
"product_reference": "kernel-default-extra-4.12.14-197.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 15 SP1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-12207",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-12207"
}
],
"notes": [
{
"category": "general",
"text": "Improper invalidation for page table updates by a virtual guest operating system for multiple Intel(R) Processors may allow an authenticated user to potentially enable denial of service of the host system via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.26.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.26.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.26.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.26.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.26.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-12207",
"url": "https://www.suse.com/security/cve/CVE-2018-12207"
},
{
"category": "external",
"summary": "SUSE Bug 1117665 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1117665"
},
{
"category": "external",
"summary": "SUSE Bug 1139073 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1139073"
},
{
"category": "external",
"summary": "SUSE Bug 1152505 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1152505"
},
{
"category": "external",
"summary": "SUSE Bug 1155812 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1155812"
},
{
"category": "external",
"summary": "SUSE Bug 1155817 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1155817"
},
{
"category": "external",
"summary": "SUSE Bug 1155945 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1155945"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1201877"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.26.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.26.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.26.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.26.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.26.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.26.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.26.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.26.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.26.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.26.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:08:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-12207"
},
{
"cve": "CVE-2019-10220",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-10220"
}
],
"notes": [
{
"category": "general",
"text": "Linux kernel CIFS implementation, version 4.9.0 is vulnerable to a relative paths injection in directory entry lists.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.26.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.26.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.26.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.26.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.26.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-10220",
"url": "https://www.suse.com/security/cve/CVE-2019-10220"
},
{
"category": "external",
"summary": "SUSE Bug 1144903 for CVE-2019-10220",
"url": "https://bugzilla.suse.com/1144903"
},
{
"category": "external",
"summary": "SUSE Bug 1153108 for CVE-2019-10220",
"url": "https://bugzilla.suse.com/1153108"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.26.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.26.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.26.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.26.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.26.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.26.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.26.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.26.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.26.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.26.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:08:00Z",
"details": "important"
}
],
"title": "CVE-2019-10220"
},
{
"cve": "CVE-2019-11135",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11135"
}
],
"notes": [
{
"category": "general",
"text": "TSX Asynchronous Abort condition on some CPUs utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.26.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.26.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.26.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.26.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.26.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11135",
"url": "https://www.suse.com/security/cve/CVE-2019-11135"
},
{
"category": "external",
"summary": "SUSE Bug 1139073 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1139073"
},
{
"category": "external",
"summary": "SUSE Bug 1152497 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1152497"
},
{
"category": "external",
"summary": "SUSE Bug 1152505 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1152505"
},
{
"category": "external",
"summary": "SUSE Bug 1152506 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1152506"
},
{
"category": "external",
"summary": "SUSE Bug 1160120 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1160120"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1201877"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.26.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.26.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.26.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.26.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.26.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.26.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.26.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.26.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.26.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.26.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:08:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-11135"
},
{
"cve": "CVE-2019-16232",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-16232"
}
],
"notes": [
{
"category": "general",
"text": "drivers/net/wireless/marvell/libertas/if_sdio.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.26.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.26.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.26.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.26.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.26.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-16232",
"url": "https://www.suse.com/security/cve/CVE-2019-16232"
},
{
"category": "external",
"summary": "SUSE Bug 1150465 for CVE-2019-16232",
"url": "https://bugzilla.suse.com/1150465"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.26.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.26.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.26.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.26.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.26.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.26.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.26.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.26.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.26.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.26.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:08:00Z",
"details": "low"
}
],
"title": "CVE-2019-16232"
},
{
"cve": "CVE-2019-16233",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-16233"
}
],
"notes": [
{
"category": "general",
"text": "drivers/scsi/qla2xxx/qla_os.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.26.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.26.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.26.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.26.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.26.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-16233",
"url": "https://www.suse.com/security/cve/CVE-2019-16233"
},
{
"category": "external",
"summary": "SUSE Bug 1150457 for CVE-2019-16233",
"url": "https://bugzilla.suse.com/1150457"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.26.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.26.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.26.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.26.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.26.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.26.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.26.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.26.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.26.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.26.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:08:00Z",
"details": "low"
}
],
"title": "CVE-2019-16233"
},
{
"cve": "CVE-2019-16234",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-16234"
}
],
"notes": [
{
"category": "general",
"text": "drivers/net/wireless/intel/iwlwifi/pcie/trans.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.26.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.26.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.26.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.26.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.26.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-16234",
"url": "https://www.suse.com/security/cve/CVE-2019-16234"
},
{
"category": "external",
"summary": "SUSE Bug 1150452 for CVE-2019-16234",
"url": "https://bugzilla.suse.com/1150452"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.26.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.26.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.26.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.26.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.26.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.26.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.26.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.26.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.26.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.26.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:08:00Z",
"details": "low"
}
],
"title": "CVE-2019-16234"
},
{
"cve": "CVE-2019-16995",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-16995"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel before 5.0.3, a memory leak exits in hsr_dev_finalize() in net/hsr/hsr_device.c if hsr_add_port fails to add a port, which may cause denial of service, aka CID-6caabe7f197d.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.26.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.26.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.26.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.26.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.26.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-16995",
"url": "https://www.suse.com/security/cve/CVE-2019-16995"
},
{
"category": "external",
"summary": "SUSE Bug 1152685 for CVE-2019-16995",
"url": "https://bugzilla.suse.com/1152685"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.26.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.26.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.26.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.26.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.26.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.26.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.26.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.26.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.26.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.26.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:08:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-16995"
},
{
"cve": "CVE-2019-17056",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-17056"
}
],
"notes": [
{
"category": "general",
"text": "llcp_sock_create in net/nfc/llcp_sock.c in the AF_NFC network module in the Linux kernel through 5.3.2 does not enforce CAP_NET_RAW, which means that unprivileged users can create a raw socket, aka CID-3a359798b176.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.26.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.26.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.26.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.26.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.26.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-17056",
"url": "https://www.suse.com/security/cve/CVE-2019-17056"
},
{
"category": "external",
"summary": "SUSE Bug 1152788 for CVE-2019-17056",
"url": "https://bugzilla.suse.com/1152788"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.26.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.26.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.26.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.26.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.26.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.26.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.26.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.26.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.26.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.26.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:08:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-17056"
},
{
"cve": "CVE-2019-17133",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-17133"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel through 5.3.2, cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c does not reject a long SSID IE, leading to a Buffer Overflow.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.26.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.26.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.26.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.26.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.26.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-17133",
"url": "https://www.suse.com/security/cve/CVE-2019-17133"
},
{
"category": "external",
"summary": "SUSE Bug 1153158 for CVE-2019-17133",
"url": "https://bugzilla.suse.com/1153158"
},
{
"category": "external",
"summary": "SUSE Bug 1153161 for CVE-2019-17133",
"url": "https://bugzilla.suse.com/1153161"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.26.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.26.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.26.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.26.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.26.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.26.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.26.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.26.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.26.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.26.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:08:00Z",
"details": "important"
}
],
"title": "CVE-2019-17133"
},
{
"cve": "CVE-2019-17666",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-17666"
}
],
"notes": [
{
"category": "general",
"text": "rtl_p2p_noa_ie in drivers/net/wireless/realtek/rtlwifi/ps.c in the Linux kernel through 5.3.6 lacks a certain upper-bound check, leading to a buffer overflow.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.26.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.26.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.26.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.26.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.26.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-17666",
"url": "https://www.suse.com/security/cve/CVE-2019-17666"
},
{
"category": "external",
"summary": "SUSE Bug 1154372 for CVE-2019-17666",
"url": "https://bugzilla.suse.com/1154372"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.26.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.26.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.26.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.26.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.26.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_26-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.26.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.26.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-zfcpdump-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.26.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.26.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.26.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.26.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:08:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-17666"
}
]
}
suse-su-2019:2952-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\n\nThe SUSE Linux Enterprise 15-SP1 Azure kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2018-12207: Untrusted virtual machines on Intel CPUs could exploit a race\n condition in the Instruction Fetch Unit of the Intel CPU to cause a Machine\n Exception during Page Size Change, causing the CPU core to be non-functional.\n\n The Linux Kernel kvm hypervisor was adjusted to avoid page size changes in\n executable pages by splitting / merging huge pages into small pages as\n More information can be found on https://www.suse.com/support/kb/doc/?id=7023735\n\n- CVE-2019-11135: Aborting an asynchronous TSX operation on Intel CPUs with\n Transactional Memory support could be used to facilitate sidechannel\n information leaks out of microarchitectural buffers, similar to the\n previously described \u0027Microarchitectural Data Sampling\u0027 attack.\n\n The Linux kernel was supplemented with the option to disable TSX operation\n altogether (requiring CPU Microcode updates on older systems) and better\n flushing of microarchitectural buffers (VERW).\n\n The set of options available is described in our TID at https://www.suse.com/support/kb/doc/?id=7024251\n\n- CVE-2019-16995: Fix a memory leak in hsr_dev_finalize() if hsr_add_port\n failed to add a port, which may have caused denial of service (bsc#1152685).\n\n- CVE-2019-16233: drivers/scsi/qla2xxx/qla_os.c did not check the\n alloc_workqueue return value, leading to a NULL pointer dereference.\n (bsc#1150457).\n\n- CVE-2019-10220: Added sanity checks on the pathnames passed to the user\n space. (bsc#1144903).\n\n- CVE-2019-17666: rtlwifi: Fix potential overflow in P2P code (bsc#1154372).\n\n- CVE-2019-16232: Fix a potential NULL pointer dereference in the Marwell\n libertas driver (bsc#1150465).\n\n- CVE-2019-16234: iwlwifi pcie driver did not check the alloc_workqueue return\n value, leading to a NULL pointer dereference. (bsc#1150452).\n\n- CVE-2019-17133: cfg80211 wireless extension did not reject a long SSID IE,\n leading to a Buffer Overflow (bsc#1153158).\n\n- CVE-2019-17056: The AF_NFC network module did not enforce CAP_NET_RAW, which\n meant that unprivileged users could create a raw socket (bsc#1152788).\n\nThe following non-security bugs were fixed:\n\n- 9p: avoid attaching writeback_fid on mmap with type PRIVATE (bsc#1051510).\n- Add kernel module compression support (bsc#1135854)\n- acpi / CPPC: do not require the _PSD method (bsc#1051510).\n- acpi / processor: do not print errors for processorIDs == 0xff (bsc#1051510).\n- acpi: CPPC: Set pcc_data[pcc_ss_id] to NULL in acpi_cppc_processor_exit() (bsc#1051510).\n- act_mirred: Fix mirred_init_module error handling (bsc#1051510).\n- alsa: bebob: Fix prototype of helper function to return negative value (bsc#1051510).\n- alsa: firewire-motu: add support for MOTU 4pre (bsc#1111666).\n- alsa: hda - Add a quirk model for fixing Huawei Matebook X right speaker (bsc#1051510).\n- alsa: hda - Add laptop imic fixup for ASUS M9V laptop (bsc#1051510).\n- alsa: hda - Apply AMD controller workaround for Raven platform (bsc#1051510).\n- alsa: hda - Define a fallback_pin_fixup_tbl for alc269 family (bsc#1051510).\n- alsa: hda - Drop unsol event handler for Intel HDMI codecs (bsc#1051510).\n- alsa: hda - Expand pin_match function to match upcoming new tbls (bsc#1051510).\n- alsa: hda - Force runtime PM on Nvidia HDMI codecs (bsc#1051510).\n- alsa: hda - Inform too slow responses (bsc#1051510).\n- alsa: hda - Show the fatal CORB/RIRB error more clearly (bsc#1051510).\n- alsa: hda/hdmi - Do not report spurious jack state changes (bsc#1051510).\n- alsa: hda/hdmi: remove redundant assignment to variable pcm_idx (bsc#1051510).\n- alsa: hda/realtek - Add support for ALC623 (bsc#1051510).\n- alsa: hda/realtek - Add support for ALC711 (bsc#1051510).\n- alsa: hda/realtek - Blacklist PC beep for Lenovo ThinkCentre M73/93 (bsc#1051510).\n- alsa: hda/realtek - Check beep whitelist before assigning in all codecs (bsc#1051510).\n- alsa: hda/realtek - Enable headset mic on Asus MJ401TA (bsc#1051510).\n- alsa: hda/realtek - Fix 2 front mics of codec 0x623 (bsc#1051510).\n- alsa: hda/realtek - Fix alienware headset mic (bsc#1051510).\n- alsa: hda/realtek - pci quirk for Medion E4254 (bsc#1051510).\n- alsa: hda/realtek: Reduce the Headphone static noise on XPS 9350/9360 (bsc#1051510).\n- alsa: hda/sigmatel - remove unused variable \u0027stac9200_core_init\u0027 (bsc#1051510).\n- alsa: hda: Add Elkhart Lake pci ID (bsc#1051510).\n- alsa: hda: Add Tigerlake/Jasperlake pci ID (bsc#1051510).\n- alsa: hda: Add support of Zhaoxin controller (bsc#1051510).\n- alsa: hda: Flush interrupts on disabling (bsc#1051510).\n- alsa: hda: Set fifo_size for both playback and capture streams (bsc#1051510).\n- alsa: i2c: ak4xxx-adda: Fix a possible null pointer dereference in build_adc_controls() (bsc#1051510).\n- alsa: line6: sizeof (byte) is always 1, use that fact (bsc#1051510).\n- alsa: timer: Fix mutex deadlock at releasing card (bsc#1051510).\n- alsa: usb-audio: Add DSD support for EVGA NU Audio (bsc#1051510).\n- alsa: usb-audio: Add DSD support for Gustard U16/X26 USB Interface (bsc#1051510).\n- alsa: usb-audio: Add Hiby device family to quirks for native DSD support (bsc#1051510).\n- alsa: usb-audio: Add Pioneer DDJ-SX3 PCM quirck (bsc#1051510).\n- alsa: usb-audio: Clean up check_input_term() (bsc#1051510).\n- alsa: usb-audio: DSD auto-detection for Playback Designs (bsc#1051510).\n- alsa: usb-audio: Disable quirks for BOSS Katana amplifiers (bsc#1051510).\n- alsa: usb-audio: Disable quirks for BOSS Katana amplifiers (bsc#1111666).\n- alsa: usb-audio: Fix copy\u0026paste error in the validator (bsc#1111666).\n- alsa: usb-audio: Fix possible NULL dereference at create_yamaha_midi_quirk() (bsc#1051510).\n- alsa: usb-audio: More validations of descriptor units (bsc#1051510).\n- alsa: usb-audio: Remove superfluous bLength checks (bsc#1051510).\n- alsa: usb-audio: Simplify parse_audio_unit() (bsc#1051510).\n- alsa: usb-audio: Skip bSynchAddress endpoint check if it is invalid (bsc#1051510).\n- alsa: usb-audio: Unify audioformat release code (bsc#1051510).\n- alsa: usb-audio: Unify the release of usb_mixer_elem_info objects (bsc#1051510).\n- alsa: usb-audio: Update DSD support quirks for Oppo and Rotel (bsc#1051510).\n- alsa: usb-audio: fix PCM device order (bsc#1051510).\n- alsa: usb-audio: remove some dead code (bsc#1051510).\n- appletalk: enforce CAP_NET_RAW for raw sockets (bsc#1051510).\n- arcnet: provide a buffer big enough to actually receive packets (networking-stable-19_09_30).\n- arm64/cpufeature: Convert hook_lock to raw_spin_lock_t in cpu_enable_ssbs() (jsc#ECO-561).\n- arm64: Add decoding macros for CP15_32 and CP15_64 traps (jsc#ECO-561).\n- arm64: Add part number for Neoverse N1 (jsc#ECO-561).\n- arm64: Add silicon-errata.txt entry for ARM erratum 1188873 (jsc#ECO-561).\n- arm64: Apply ARM64_ERRATUM_1188873 to Neoverse-N1 (jsc#ECO-561).\n- arm64: Fake the IminLine size on systems affected by Neoverse-N1 #1542419 (jsc#ECO-561,jsc#SLE-10671).\n- arm64: Fix mismatched cache line size detection (jsc#ECO-561,jsc#SLE-10671).\n- arm64: Fix silly typo in comment (jsc#ECO-561).\n- arm64: Force SSBS on context switch (jsc#ECO-561).\n- arm64: Introduce sysreg_clear_set() (jsc#ECO-561).\n- arm64: Make ARM64_ERRATUM_1188873 depend on COMPAT (jsc#ECO-561).\n- arm64: Restrict ARM64_ERRATUM_1188873 mitigation to AArch32 (jsc#ECO-561).\n- arm64: arch_timer: avoid unused function warning (jsc#ECO-561).\n- arm64: compat: Add CNTFRQ trap handler (jsc#ECO-561).\n- arm64: compat: Add CNTVCT trap handler (jsc#ECO-561).\n- arm64: compat: Add condition code checks and IT advance (jsc#ECO-561).\n- arm64: compat: Add cp15_32 and cp15_64 handler arrays (jsc#ECO-561).\n- arm64: compat: Add separate CP15 trapping hook (jsc#ECO-561).\n- arm64: compat: Workaround Neoverse-N1 #1542419 for compat user-space (jsc#ECO-561,jsc#SLE-10671).\n- arm64: cpu: Move errata and feature enable callbacks closer to callers (jsc#ECO-561).\n- arm64: cpu_errata: Remove ARM64_MISMATCHED_CACHE_LINE_SIZE (jsc#ECO-561,jsc#SLE-10671).\n- arm64: cpufeature: Fix handling of CTR_EL0.IDC field (jsc#ECO-561,jsc#SLE-10671).\n- arm64: cpufeature: Trap CTR_EL0 access only where it is necessary (jsc#ECO-561,jsc#SLE-10671).\n- arm64: cpufeature: ctr: Fix cpu capability check for late CPUs (jsc#ECO-561,jsc#SLE-10671).\n- arm64: entry: Allow handling of undefined instructions from EL1 (jsc#ECO-561).\n- arm64: errata: Hide CTR_EL0.DIC on systems affected by Neoverse-N1 #1542419 (jsc#ECO-561,jsc#SLE-10671).\n- arm64: fix SSBS sanitization (jsc#ECO-561).\n- arm64: force_signal_inject: WARN if called from kernel context (jsc#ECO-561).\n- arm64: kill change_cpacr() (jsc#ECO-561).\n- arm64: kill config_sctlr_el1() (jsc#ECO-561).\n- arm64: kvm: Add invalidate_icache_range helper (jsc#ECO-561,jsc#SLE-10671).\n- arm64: kvm: PTE/PMD S2 XN bit definition (jsc#ECO-561,jsc#SLE-10671).\n- arm64: move SCTLR_EL{1,2} assertions to \u0026lt;asm/sysreg.h\u003e (jsc#ECO-561).\n- arm64: ssbd: Drop #ifdefs for PR_SPEC_STORE_BYPASS (jsc#ECO-561).\n- arm: kvm: Add optimized PIPT icache flushing (jsc#ECO-561,jsc#SLE-10671).\n- asoc: Define a set of DAPM pre/post-up events (bsc#1051510).\n- asoc: Intel: Fix use of potentially uninitialized variable (bsc#1051510).\n- asoc: Intel: NHLT: Fix debug print format (bsc#1051510).\n- asoc: dmaengine: Make the pcm-\u003ename equal to pcm-\u003eid if the name is not set (bsc#1051510).\n- asoc: rockchip: i2s: Fix RPM imbalance (bsc#1051510).\n- asoc: rsnd: Reinitialize bit clock inversion flag for every format setting (bsc#1051510).\n- asoc: sgtl5000: Fix charge pump source assignment (bsc#1051510).\n- auxdisplay: panel: need to delete scan_timer when misc_register fails in panel_attach (bsc#1051510).\n- ax25: enforce CAP_NET_RAW for raw sockets (bsc#1051510).\n- blk-wbt: abstract out end IO completion handler (bsc#1135873).\n- blk-wbt: fix has-sleeper queueing check (bsc#1135873).\n- blk-wbt: improve waking of tasks (bsc#1135873).\n- blk-wbt: move disable check into get_limit() (bsc#1135873).\n- blk-wbt: use wq_has_sleeper() for wq active check (bsc#1135873).\n- block: add io timeout to sysfs (bsc#1148410).\n- block: add io timeout to sysfs (bsc#1148410).\n- block: do not show io_timeout if driver has no timeout handler (bsc#1148410).\n- block: do not show io_timeout if driver has no timeout handler (bsc#1148410).\n- bluetooth: btrtl: Additional Realtek 8822CE Bluetooth devices (bsc#1051510).\n- bnx2x: Fix VF\u0027s VLAN reconfiguration in reload (bsc#1086323 ).\n- bnxt_en: Add pci IDs for 57500 series NPAR devices (bsc#1153607).\n- boot: Sign non-x86 kernels when possible (boo#1134303)\n- bpf: fix use after free in prog symbol exposure (bsc#1083647).\n- brcmfmac: sdio: Disable auto-tuning around commands expected to fail (bsc#1111666).\n- brcmfmac: sdio: Do not tune while the card is off (bsc#1111666).\n- bridge/mdb: remove wrong use of NLM_F_MULTI (networking-stable-19_09_15).\n- btrfs: Ensure btrfs_init_dev_replace_tgtdev sees up to date values (bsc#1154651).\n- btrfs: Ensure replaced device does not have pending chunk allocation (bsc#1154607).\n- btrfs: bail out gracefully rather than BUG_ON (bsc#1153646).\n- btrfs: block-group: Fix a memory leak due to missing btrfs_put_block_group() (bsc#1155178).\n- btrfs: check for the full sync flag while holding the inode lock during fsync (bsc#1153713).\n- btrfs: qgroup: Always free PREALLOC META reserve in btrfs_delalloc_release_extents() (bsc#1155179).\n- btrfs: remove wrong use of volume_mutex from btrfs_dev_replace_start (bsc#1154651).\n- btrfs: tracepoints: Fix bad entry members of qgroup events (bsc#1155186).\n- btrfs: tracepoints: Fix wrong parameter order for qgroup events (bsc#1155184).\n- can: mcp251x: mcp251x_hw_reset(): allow more time after a reset (bsc#1051510).\n- can: xilinx_can: xcan_probe(): skip error message on deferred probe (bsc#1051510).\n- cdc_ether: fix rndis support for Mediatek based smartphones (networking-stable-19_09_15).\n- cdc_ncm: fix divide-by-zero caused by invalid wMaxPacketSize (bsc#1051510).\n- ceph: fix directories inode i_blkbits initialization (bsc#1153717).\n- ceph: reconnect connection if session hang in opening state (bsc#1153718).\n- ceph: update the mtime when truncating up (bsc#1153719).\n- cfg80211: Purge frame registrations on iftype change (bsc#1051510).\n- cfg80211: add and use strongly typed element iteration macros (bsc#1051510).\n- clk: at91: select parent if main oscillator or bypass is enabled (bsc#1051510).\n- clk: qoriq: Fix -Wunused-const-variable (bsc#1051510).\n- clk: sirf: Do not reference clk_init_data after registration (bsc#1051510).\n- clk: zx296718: Do not reference clk_init_data after registration (bsc#1051510).\n- config: arm64: enable erratum 1418040 and 1542419\n- crypto: af_alg - Fix race around ctx-\u003ercvused by making it atomic_t (bsc#1154737).\n- crypto: af_alg - Initialize sg_num_bytes in error code path (bsc#1051510).\n- crypto: af_alg - consolidation of duplicate code (bsc#1154737).\n- crypto: af_alg - fix race accessing cipher request (bsc#1154737).\n- crypto: af_alg - remove locking in async callback (bsc#1154737).\n- crypto: af_alg - update correct dst SGL entry (bsc#1051510).\n- crypto: af_alg - wait for data at beginning of recvmsg (bsc#1154737).\n- crypto: algif - return error code when no data was processed (bsc#1154737).\n- crypto: algif_aead - copy AAD from src to dst (bsc#1154737).\n- crypto: algif_aead - fix reference counting of null skcipher (bsc#1154737).\n- crypto: algif_aead - overhaul memory management (bsc#1154737).\n- crypto: algif_aead - skip SGL entries with NULL page (bsc#1154737).\n- crypto: algif_skcipher - overhaul memory management (bsc#1154737).\n- crypto: talitos - fix missing break in switch statement (bsc#1142635).\n- cxgb4: Signedness bug in init_one() (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).\n- cxgb4: do not dma memory off of the stack (bsc#1152790).\n- cxgb4: fix endianness for vlan value in cxgb4_tc_flower (bsc#1064802 bsc#1066129).\n- cxgb4: offload VLAN flows regardless of VLAN ethtype (bsc#1064802 bsc#1066129).\n- cxgb4: reduce kernel stack usage in cudbg_collect_mem_region() (bsc#1073513).\n- cxgb4: smt: Add lock for atomic_dec_and_test (bsc#1064802 bsc#1066129).\n- cxgb4:Fix out-of-bounds MSI-X info array access (networking-stable-19_10_05).\n- dasd_fba: Display \u002700000000\u0027 for zero page when dumping sense (bsc#1123080).\n- drm/amd/display: Restore backlight brightness after system resume (bsc#1112178)\n- drm/amd/display: fix issue where 252-255 values are clipped (bsc#1111666).\n- drm/amd/display: reprogram VM config when system resume (bsc#1111666).\n- drm/amd/display: support spdif (bsc#1111666).\n- drm/amd/dm: Understand why attaching path/tile properties are needed (bsc#1111666).\n- drm/amd/powerplay/smu7: enforce minimal VBITimeout (v2) (bsc#1051510).\n- drm/amd/pp: Fix truncated clock value when set watermark (bsc#1111666).\n- drm/amdgpu/gfx9: Update gfx9 golden settings (bsc#1111666).\n- drm/amdgpu/si: fix ASIC tests (git-fixes).\n- drm/amdgpu: Check for valid number of registers to read (bsc#1051510).\n- drm/amdgpu: Fix KFD-related kernel oops on Hawaii (bsc#1111666).\n- drm/amdgpu: Update gc_9_0 golden settings (bsc#1111666).\n- drm/amdkfd: Add missing Polaris10 ID (bsc#1111666).\n- drm/ast: Fixed reboot test may cause system hanged (bsc#1051510).\n- drm/atomic_helper: Allow DPMS On\u0026lt;-\u003eOff changes for unregistered connectors (bsc#1111666).\n- drm/atomic_helper: Disallow new modesets on unregistered connectors (bsc#1111666).\n- drm/atomic_helper: Stop modesets on unregistered connectors harder (bsc#1111666).\n- drm/bridge: tc358767: Increase AUX transfer length limit (bsc#1051510).\n- drm/bridge: tfp410: fix memleak in get_modes() (bsc#1111666).\n- drm/edid: Add 6 bpc quirk for SDC panel in Lenovo G50 (bsc#1051510).\n- drm/i915/cmdparser: Add support for backward jumps (bsc#1135967)\n- drm/i915/cmdparser: Ignore Length operands during (bsc#1135967)\n- drm/i915/cmdparser: Use explicit goto for error paths (bsc#1135967)\n- drm/i915/gen8+: Add RC6 CTX corruption WA (bsc#1135967)\n- drm/i915/gvt: update vgpu workload head pointer correctly (bsc#1112178)\n- drm/i915: Add gen9 BCS cmdparsing (bsc#1135967)\n- drm/i915: Add support for mandatory cmdparsing (bsc#1135967)\n- drm/i915: Allow parsing of unsized batches (bsc#1135967)\n- drm/i915: Cleanup gt powerstate from gem (bsc#1111666).\n- drm/i915: Disable Secure Batches for gen6+ (bsc#1135967)\n- drm/i915: Fix intel_dp_mst_best_encoder() (bsc#1111666).\n- drm/i915: Lower RM timeout to avoid DSI hard hangs (bsc#1135967)\n- drm/i915: Remove Master tables from cmdparser (bsc#1135967)\n- drm/i915: Rename gen7 cmdparser tables (bsc#1135967)\n- drm/i915: Restore sane defaults for KMS on GEM error load (bsc#1111666).\n- drm/i915: Support ro ppgtt mapped cmdparser shadow (bsc#1135967)\n- drm/mediatek: set DMA max segment size (bsc#1111666).\n- drm/msm/dsi: Fix return value check for clk_get_parent (bsc#1111666).\n- drm/msm/dsi: Implement reset correctly (bsc#1051510).\n- drm/nouveau/disp/nv50-: fix center/aspect-corrected scaling (bsc#1111666).\n- drm/nouveau/kms/nv50-: Do not create MSTMs for eDP connectors (bsc#1112178)\n- drm/nouveau/volt: Fix for some cards having 0 maximum voltage (bsc#1111666).\n- drm/omap: fix max fclk divider for omap36xx (bsc#1111666).\n- drm/panel: check failure cases in the probe func (bsc#1111666).\n- drm/panel: make drm_panel.h self-contained (bsc#1111666).\n- drm/panel: simple: fix AUO g185han01 horizontal blanking (bsc#1051510).\n- drm/radeon: Bail earlier when radeon.cik_/si_support=0 is passed (bsc#1111666).\n- drm/radeon: Fix EEH during kexec (bsc#1051510).\n- drm/rockchip: Check for fast link training before enabling psr (bsc#1111666).\n- drm/stm: attach gem fence to atomic state (bsc#1111666).\n- drm/tilcdc: Register cpufreq notifier after we have initialized crtc (bsc#1051510).\n- drm/vmwgfx: Fix double free in vmw_recv_msg() (bsc#1051510).\n- drm: Flush output polling on shutdown (bsc#1051510).\n- drm: add __user attribute to ptr_to_compat() (bsc#1111666).\n- drm: panel-orientation-quirks: Add extra quirk table entry for GPD MicroPC (bsc#1111666).\n- drm: rcar-du: lvds: Fix bridge_to_rcar_lvds (bsc#1111666).\n- e1000e: add workaround for possible stalled packet (bsc#1051510).\n- efi/arm: Show SMBIOS bank/device location in CPER and GHES error logs (bsc#1152033).\n- efi/memattr: Do not bail on zero VA if it equals the region\u0027s PA (bsc#1051510).\n- efi: cper: print AER info of pcie fatal error (bsc#1051510).\n- efivar/ssdt: Do not iterate over EFI vars if no SSDT override was specified (bsc#1051510).\n- firmware: dmi: Fix unlikely out-of-bounds read in save_mem_devices (git-fixes).\n- gpu: drm: radeon: Fix a possible null-pointer dereference in radeon_connector_set_property() (bsc#1051510).\n- hid: apple: Fix stuck function keys when using FN (bsc#1051510).\n- hid: fix error message in hid_open_report() (bsc#1051510).\n- hid: hidraw: Fix invalid read in hidraw_ioctl (bsc#1051510).\n- hid: logitech-hidpp: do all FF cleanup in hidpp_ff_destroy() (bsc#1051510).\n- hid: logitech: Fix general protection fault caused by Logitech driver (bsc#1051510).\n- hid: prodikeys: Fix general protection fault during probe (bsc#1051510).\n- hid: sony: Fix memory corruption issue on cleanup (bsc#1051510).\n- hso: fix NULL-deref on tty open (bsc#1051510).\n- hwmon: (acpi_power_meter) Change log level for \u0027unsafe software power cap\u0027 (bsc#1051510).\n- hwrng: core - do not wait on add_early_randomness() (git-fixes).\n- hyperv: set nvme msi interrupts to unmanaged (jsc#SLE-8953, jsc#SLE-9221, jsc#SLE-4941, bsc#1119461, bsc#1119465, bsc#1138190, bsc#1154905).\n- i2c: riic: Clear NACK in tend isr (bsc#1051510).\n- ib/core, ipoib: Do not overreact to SM LID change event (bsc#1154108)\n- ib/core: Add mitigation for Spectre V1 (bsc#1155671)\n- ib/hfi1: Remove overly conservative VM_EXEC flag check (bsc#1144449).\n- ib/mlx5: Consolidate use_umr checks into single function (bsc#1093205).\n- ib/mlx5: Fix MR re-registration flow to use UMR properly (bsc#1093205).\n- ib/mlx5: Report correctly tag matching rendezvous capability (bsc#1046305).\n- ieee802154: atusb: fix use-after-free at disconnect (bsc#1051510).\n- ieee802154: ca8210: prevent memory leak (bsc#1051510).\n- ieee802154: enforce CAP_NET_RAW for raw sockets (bsc#1051510).\n- iio: adc: ad799x: fix probe error handling (bsc#1051510).\n- iio: light: opt3001: fix mutex unlock race (bsc#1051510).\n- ima: always return negative code for error (bsc#1051510).\n- input: da9063 - fix capability and drop KEY_SLEEP (bsc#1051510).\n- input: synaptics-rmi4 - avoid processing unknown IRQs (bsc#1051510).\n- integrity: prevent deadlock during digsig verification (bsc#1090631).\n- iommu/amd: Apply the same IVRS IOAPIC workaround to Acer Aspire A315-41 (bsc#1137799).\n- iommu/amd: Check PM_LEVEL_SIZE() condition in locked section (bsc#1154608).\n- iommu/amd: Override wrong IVRS IOAPIC on Raven Ridge systems (bsc#1137799).\n- iommu/amd: Remove domain-\u003eupdated (bsc#1154610).\n- iommu/amd: Wait for completion of IOTLB flush in attach_device (bsc#1154611).\n- ipmi_si: Only schedule continuously in the thread in maintenance mode (bsc#1051510).\n- ipv6: Fix the link time qualifier of \u0027ping_v6_proc_exit_net()\u0027 (networking-stable-19_09_15).\n- ipv6: Handle missing host route in __ipv6_ifa_notify (networking-stable-19_10_05).\n- ipv6: drop incoming packets having a v4mapped source address (networking-stable-19_10_05).\n- irqchip/gic-v3-its: Fix LPI release for Multi-MSI devices (jsc#ECO-561).\n- irqchip/gic-v3-its: Fix command queue pointer comparison bug (jsc#ECO-561).\n- irqchip/gic-v3-its: Fix misuse of GENMASK macro (jsc#ECO-561).\n- iwlwifi: pcie: fix memory leaks in iwl_pcie_ctxt_info_gen3_init (bsc#1111666).\n- ixgbe: Fix secpath usage for IPsec TX offload (bsc#1113994 bsc#1151807).\n- ixgbe: Prevent u8 wrapping of ITR value to something less than 10us (bsc#1101674).\n- ixgbe: sync the first fragment unconditionally (bsc#1133140).\n- kABI workaround for crypto/af_alg changes (bsc#1154737).\n- kABI workaround for drm_connector.registered type changes (bsc#1111666).\n- kABI workaround for mmc_host retune_crc_disable flag addition (bsc#1111666).\n- kABI workaround for snd_hda_pick_pin_fixup() changes (bsc#1051510).\n- kabi/severities: Whitelist functions internal to radix mm. To call these functions you have to first detect if you are running in radix mm mode which can\u0027t be expected of OOT code.\n- kabi: net: sched: act_sample: fix psample group handling on overwrite (networking-stable-19_09_05).\n- kernel-binary.spec.in: Fix build of non-modular kernels (boo#1154578).\n- kernel/sysctl.c: do not override max_threads provided by userspace (bnc#1150875).\n- ksm: cleanup stable_node chain collapse case (bnc#1144338).\n- ksm: fix use after free with merge_across_nodes = 0 (bnc#1144338).\n- ksm: introduce ksm_max_page_sharing per page deduplication limit (bnc#1144338).\n- ksm: optimize refile of stable_node_dup at the head of the chain (bnc#1144338).\n- ksm: swap the two output parameters of chain/chain_prune (bnc#1144338).\n- kvm: Convert kvm_lock to a mutex (bsc#1117665).\n- kvm: MMU: drop vcpu param in gpte_access (bsc#1117665).\n- kvm: PPC: Book3S HV: use smp_mb() when setting/clearing host_ipi flag (bsc#1061840).\n- kvm: arm/arm64: Clean dcache to PoC when changing PTE due to CoW (jsc#ECO-561,jsc#SLE-10671).\n- kvm: arm/arm64: Detangle kvm_mmu.h from kvm_hyp.h (jsc#ECO-561,jsc#SLE-10671).\n- kvm: arm/arm64: Drop vcpu parameter from guest cache maintenance operartions (jsc#ECO-561,jsc#SLE-10671).\n- kvm: arm/arm64: Limit icache invalidation to prefetch aborts (jsc#ECO-561,jsc#SLE-10671).\n- kvm: arm/arm64: Only clean the dcache on translation fault (jsc#ECO-561,jsc#SLE-10671).\n- kvm: arm/arm64: Preserve Exec permission across R/W permission faults (jsc#ECO-561,jsc#SLE-10671).\n- kvm: arm/arm64: Split dcache/icache flushing (jsc#ECO-561,jsc#SLE-10671).\n- kvm: arm64: Set SCTLR_EL2.DSSBS if SSBD is forcefully disabled and !vhe (jsc#ECO-561).\n- kvm: vmx, svm: always run with EFER.NXE=1 when shadow paging is active (bsc#1117665).\n- kvm: x86, powerpc: do not allow clearing largepages debugfs entry (bsc#1117665).\n- kvm: x86: Do not release the page inside mmu_set_spte() (bsc#1117665).\n- kvm: x86: add tracepoints around __direct_map and FNAME(fetch) (bsc#1117665).\n- kvm: x86: adjust kvm_mmu_page member to save 8 bytes (bsc#1117665).\n- kvm: x86: change kvm_mmu_page_get_gfn BUG_ON to WARN_ON (bsc#1117665).\n- kvm: x86: make FNAME(fetch) and __direct_map more similar (bsc#1117665).\n- kvm: x86: remove now unneeded hugepage gfn adjustment (bsc#1117665).\n- lib/mpi: Fix karactx leak in mpi_powm (bsc#1051510).\n- libertas: Add missing sentinel at end of if_usb.c fw_table (bsc#1051510).\n- libnvdimm/security: provide fix for secure-erase to use zero-key (bsc#1149853).\n- lpfc: Add FA-WWN Async Event reporting (bsc#1154521).\n- lpfc: Add FC-AL support to lpe32000 models (bsc#1154521).\n- lpfc: Add additional discovery log messages (bsc#1154521).\n- lpfc: Add log macros to allow print by serverity or verbocity setting (bsc#1154521).\n- lpfc: Fix SLI3 hba in loop mode not discovering devices (bsc#1154521).\n- lpfc: Fix bad ndlp ptr in xri aborted handling (bsc#1154521).\n- lpfc: Fix hardlockup in lpfc_abort_handler (bsc#1154521).\n- lpfc: Fix lockdep errors in sli_ringtx_put (bsc#1154521).\n- lpfc: Fix reporting of read-only fw error errors (bsc#1154521).\n- lpfc: Make FW logging dynamically configurable (bsc#1154521).\n- lpfc: Remove lock contention target write path (bsc#1154521).\n- lpfc: Revise interrupt coalescing for missing scenarios (bsc#1154521).\n- lpfc: Slight fast-path Performance optimizations (bsc#1154521).\n- lpfc: Update lpfc version to 12.6.0.0 (bsc#1154521).\n- lpfc: fix coverity error of dereference after null check (bsc#1154521).\n- lpfc: fix lpfc_nvmet_mrq to be bound by hdw queue count (bsc#1154521).\n- mISDN: enforce CAP_NET_RAW for raw sockets (bsc#1051510).\n- mac80211: Reject malformed SSID elements (bsc#1051510).\n- mac80211: accept deauth frames in IBSS mode (bsc#1051510).\n- mac80211: fix txq null pointer dereference (bsc#1051510).\n- macsec: drop skb sk before calling gro_cells_receive (bsc#1051510).\n- md/raid0: avoid RAID0 data corruption due to layout confusion (bsc#1140090).\n- md/raid0: fix warning message for parameter default_layout (bsc#1140090).\n- media: atmel: atmel-isc: fix asd memory allocation (bsc#1135642).\n- media: cpia2_usb: fix memory leaks (bsc#1051510).\n- media: dvb-core: fix a memory leak bug (bsc#1051510).\n- media: exynos4-is: fix leaked of_node references (bsc#1051510).\n- media: gspca: zero usb_buf on error (bsc#1051510).\n- media: hdpvr: Add device num check and handling (bsc#1051510).\n- media: hdpvr: add terminating 0 at end of string (bsc#1051510).\n- media: i2c: ov5645: Fix power sequence (bsc#1051510).\n- media: iguanair: add sanity checks (bsc#1051510).\n- media: omap3isp: Do not set streaming state on random subdevs (bsc#1051510).\n- media: omap3isp: Set device on omap3isp subdevs (bsc#1051510).\n- media: ov9650: add a sanity check (bsc#1051510).\n- media: radio/si470x: kill urb on error (bsc#1051510).\n- media: saa7134: fix terminology around saa7134_i2c_eeprom_md7134_gate() (bsc#1051510).\n- media: saa7146: add cleanup in hexium_attach() (bsc#1051510).\n- media: sn9c20x: Add MSI MS-1039 laptop to flip_dmi_table (bsc#1051510).\n- media: stkwebcam: fix runtime PM after driver unbind (bsc#1051510).\n- media: ttusb-dec: Fix info-leak in ttusb_dec_send_command() (bsc#1051510).\n- memstick: jmb38x_ms: Fix an error handling path in \u0027jmb38x_ms_probe()\u0027 (bsc#1051510).\n- mfd: intel-lpss: Remove D3cold delay (bsc#1051510).\n- mld: fix memory leak in mld_del_delrec() (networking-stable-19_09_05).\n- mmc: core: API to temporarily disable retuning for SDIO CRC errors (bsc#1111666).\n- mmc: core: Add sdio_retune_hold_now() and sdio_retune_release() (bsc#1111666).\n- mmc: sdhci-of-esdhc: set DMA snooping based on DMA coherence (bsc#1051510).\n- mmc: sdhci: Fix incorrect switch to HS mode (bsc#1051510).\n- mmc: sdhci: improve ADMA error reporting (bsc#1051510).\n- net/ibmvnic: Fix EOI when running in XIVE mode (bsc#1089644, ltc#166495, ltc#165544, git-fixes).\n- net/mlx4_en: fix a memory leak bug (bsc#1046299).\n- net/mlx5: Add device ID of upcoming BlueField-2 (bsc#1046303 ).\n- net/mlx5: Fix error handling in mlx5_load() (bsc#1046305 ).\n- net/phy: fix DP83865 10 Mbps HDX loopback disable function (networking-stable-19_09_30).\n- net/rds: Fix error handling in rds_ib_add_one() (networking-stable-19_10_05).\n- net/rds: fix warn in rds_message_alloc_sgs (bsc#1154848).\n- net/rds: remove user triggered WARN_ON in rds_sendmsg (bsc#1154848).\n- net/sched: act_sample: do not push mac header on ip6gre ingress (networking-stable-19_09_30).\n- net: Fix null de-reference of device refcount (networking-stable-19_09_15).\n- net: Replace NF_CT_ASSERT() with WARN_ON() (bsc#1146612).\n- net: Unpublish sk from sk_reuseport_cb before call_rcu (networking-stable-19_10_05).\n- net: fix skb use after free in netpoll (networking-stable-19_09_05).\n- net: gso: Fix skb_segment splat when splitting gso_size mangled skb having linear-headed frag_list (networking-stable-19_09_15).\n- net: openvswitch: free vport unless register_netdevice() succeeds (git-fixes).\n- net: qlogic: Fix memory leak in ql_alloc_large_buffers (networking-stable-19_10_05).\n- net: qrtr: Stop rx_worker before freeing node (networking-stable-19_09_30).\n- net: sched: act_sample: fix psample group handling on overwrite (networking-stable-19_09_05).\n- net: stmmac: dwmac-rk: Do not fail if phy regulator is absent (networking-stable-19_09_05).\n- net_sched: add policy validation for action attributes (networking-stable-19_09_30).\n- net_sched: fix backward compatibility for TCA_ACT_KIND (git-fixes).\n- netfilter: nf_nat: do not bug when mapping already exists (bsc#1146612).\n- nfc: fix attrs checks in netlink interface (bsc#1051510).\n- nfc: fix memory leak in llcp_sock_bind() (bsc#1051510).\n- nfc: pn533: fix use-after-free and memleaks (bsc#1051510).\n- nfs: fix incorrectly backported patch (boo#1154189 bsc#1154747).\n- nfsv4.1 - backchannel request should hold ref on xprt (bsc#1152624).\n- nl80211: fix null pointer dereference (bsc#1051510).\n- objtool: Clobber user CFLAGS variable (bsc#1153236).\n- openvswitch: change type of UPCALL_PID attribute to NLA_UNSPEC (networking-stable-19_09_30).\n- packaging: add support for riscv64\n- pci: Correct pci=resource_alignment parameter example (bsc#1051510).\n- pci: PM: Fix pci_power_up() (bsc#1051510).\n- pci: dra7xx: Fix legacy INTD IRQ handling (bsc#1087092).\n- pci: hv: Use bytes 4 and 5 from instance ID as the pci domain numbers (bsc#1153263).\n- pinctrl: cherryview: restore Strago DMI workaround for all versions (bsc#1111666).\n- pinctrl: tegra: Fix write barrier placement in pmx_writel (bsc#1051510).\n- platform/x86: classmate-laptop: remove unused variable (bsc#1051510).\n- platform/x86: i2c-multi-instantiate: Derive the device name from parent (bsc#1111666).\n- platform/x86: i2c-multi-instantiate: Fail the probe if no IRQ provided (bsc#1111666).\n- platform/x86: pmc_atom: Add Siemens SIMATIC IPC277E to critclk_systems DMI table (bsc#1051510).\n- power: supply: sysfs: ratelimit property read error message (bsc#1051510).\n- powerpc/64s/pseries: radix flush translations before MMU is enabled at boot (bsc#1055186).\n- powerpc/64s/radix: keep kernel ERAT over local process/guest invalidates (bsc#1055186).\n- powerpc/64s/radix: tidy up TLB flushing code (bsc#1055186).\n- powerpc/64s: Rename PPC_INVALIDATE_ERAT to PPC_ISA_3_0_INVALIDATE_ERAT (bsc#1055186).\n- powerpc/mm/book3s64: Move book3s64 code to pgtable-book3s64 (bsc#1055186).\n- powerpc/mm/radix: mark __radix__flush_tlb_range_psize() as __always_inline (bsc#1055186).\n- powerpc/mm/radix: mark as __tlbie_pid() and friends as__always_inline (bsc#1055186).\n- powerpc/mm: Properly invalidate when setting process table base (bsc#1055186).\n- powerpc/mm: mark more tlb functions as __always_inline (bsc#1055186).\n- powerpc/pseries/mobility: use cond_resched when updating device tree (bsc#1153112 ltc#181778).\n- powerpc/pseries: Remove confusing warning message (bsc#1109158).\n- powerpc/rtas: allow rescheduling while changing cpu states (bsc#1153112 ltc#181778).\n- powerplay: Respect units on max dcfclk watermark (bsc#1111666).\n- qed: iWARP - Fix default window size to be based on chip (bsc#1050536 bsc#1050545).\n- qed: iWARP - Fix tc for MPA ll2 connection (bsc#1050536 bsc#1050545).\n- qed: iWARP - Use READ_ONCE and smp_store_release to access ep-\u003estate (bsc#1050536 bsc#1050545).\n- qed: iWARP - fix uninitialized callback (bsc#1050536 bsc#1050545).\n- qmi_wwan: add support for Cinterion CLS8 devices (networking-stable-19_10_05).\n- r8152: Set macpassthru in reset_resume callback (bsc#1051510).\n- rdma/bnxt_re: Fix spelling mistake \u0027missin_resp\u0027 -\u003e \u0027missing_resp\u0027 (bsc#1050244).\n- rdma/hns: Add reset process for function-clear (bsc#1155061).\n- rdma/hns: Remove the some magic number (bsc#1155061).\n- rdma: Fix goto target to release the allocated memory (bsc#1050244).\n- rds: Fix warning (bsc#1154848).\n- rpm/constraints.in: lower disk space required for ARM With a requirement of 35GB, only 2 slow workers are usable for ARM. Current aarch64 build requires 27G and armv6/7 requires 14G. Set requirements respectively to 30GB and 20GB.\n- rpm/dtb.spec.in.in: do not make dtb directory inaccessible There is no reason to lock down the dtb directory for ordinary users.\n- rpm/kernel-binary.spec.in: build kernel-*-kgraft only for default SLE kernel RT and Azure variants are excluded for the moment. (bsc#1141600)\n- rpm/kernel-binary.spec.in: handle modules.builtin.modinfo It was added in 5.2.\n- rpm/kernel-binary.spec.in: support partial rt debug config.\n- rpm/kernel-subpackage-spec: Mention debuginfo in the subpackage description (bsc#1149119).\n- rpm/macros.kernel-source: KMPs should depend on kmod-compat to build. kmod-compat links are used in find-provides.ksyms, find-requires.ksyms, and find-supplements.ksyms in rpm-config-SUSE.\n- rpm/mkspec: Correct tarball URL for rc kernels.\n- rpm/mkspec: Make building DTBs optional.\n- rpm/modflist: Simplify compression support.\n- rpm: raise required disk space for binary packages Current disk space constraints (10 GB on s390x, 25 GB on other architectures) no longer suffice for 5.3 kernel builds. The statistics show ~30 GB of disk consumption on x86_64 and ~11 GB on s390x so raise the constraints to 35 GB in general and 14 GB on s390x.\n- rpm: support compressed modules Some of our scripts and scriptlets in rpm/ do not expect module files not ending with \u0027.ko\u0027 which currently leads to failure in preuninstall scriptlet of cluster-md-kmp-default (and probably also other subpackages). Let those which could be run on compressed module files recognize \u0027.ko.xz\u0027 in addition to \u0027.ko\u0027.\n- rtlwifi: rtl8192cu: Fix value set in descriptor (bsc#1142635).\n- s390/cmf: set_schib_wait add timeout (bsc#1153509, bsc#1153476).\n- s390/cpumsf: Check for CPU Measurement sampling (bsc#1153681 LTC#181855).\n- s390/crypto: fix gcm-aes-s390 selftest failures (bsc#1137861 LTC#178091).\n- s390/pci: add mio_enabled attribute (bsc#1152665 LTC#181729).\n- s390/pci: correctly handle MIO opt-out (bsc#1152665 LTC#181729).\n- s390/pci: deal with devices that have no support for MIO instructions (bsc#1152665 LTC#181729).\n- s390/pci: fix MSI message data (bsc#1152697 LTC#181730).\n- s390: add support for IBM z15 machines (bsc#1152696 LTC#181731).\n- s390: fix setting of mio addressing control (bsc#1152665 LTC#181729).\n- sch_cbq: validate TCA_CBQ_WRROPT to avoid crash (networking-stable-19_10_05).\n- sch_dsmark: fix potential NULL deref in dsmark_init() (networking-stable-19_10_05).\n- sch_hhf: ensure quantum and hhf_non_hh_weight are non-zero (networking-stable-19_09_15).\n- sch_netem: fix a divide by zero in tabledist() (networking-stable-19_09_30).\n- sched/fair: Avoid divide by zero when rebalancing domains (bsc#1096254).\n- scripts/arch-symbols: add missing link.\n- scsi: lpfc: Check queue pointer before use (bsc#1154242).\n- scsi: lpfc: Complete removal of FCoE T10 PI support on SLI-4 adapters (bsc#1154521).\n- scsi: lpfc: Convert existing %pf users to %ps (bsc#1154521).\n- scsi: lpfc: Fix GPF on scsi command completion (bsc#1154521).\n- scsi: lpfc: Fix NVME io abort failures causing hangs (bsc#1154521).\n- scsi: lpfc: Fix NVMe ABTS in response to receiving an ABTS (bsc#1154521).\n- scsi: lpfc: Fix coverity errors on NULL pointer checks (bsc#1154521).\n- scsi: lpfc: Fix device recovery errors after PLOGI failures (bsc#1154521).\n- scsi: lpfc: Fix devices that do not return after devloss followed by rediscovery (bsc#1137040).\n- scsi: lpfc: Fix discovery failures when target device connectivity bounces (bsc#1154521).\n- scsi: lpfc: Fix hdwq sgl locks and irq handling (bsc#1154521).\n- scsi: lpfc: Fix host hang at boot or slow boot (bsc#1154521).\n- scsi: lpfc: Fix list corruption detected in lpfc_put_sgl_per_hdwq (bsc#1154521).\n- scsi: lpfc: Fix list corruption in lpfc_sli_get_iocbq (bsc#1154521).\n- scsi: lpfc: Fix locking on mailbox command completion (bsc#1154521).\n- scsi: lpfc: Fix miss of register read failure check (bsc#1154521).\n- scsi: lpfc: Fix null ptr oops updating lpfc_devloss_tmo via sysfs attribute (bsc#1140845).\n- scsi: lpfc: Fix premature re-enabling of interrupts in lpfc_sli_host_down (bsc#1154521).\n- scsi: lpfc: Fix propagation of devloss_tmo setting to nvme transport (bsc#1140883).\n- scsi: lpfc: Fix pt2pt discovery on SLI3 HBAs (bsc#1154521).\n- scsi: lpfc: Fix rpi release when deleting vport (bsc#1154521).\n- scsi: lpfc: Fix spinlock_irq issues in lpfc_els_flush_cmd() (bsc#1154521).\n- scsi: lpfc: Make function lpfc_defer_pt2pt_acc static (bsc#1154521).\n- scsi: lpfc: Remove bg debugfs buffers (bsc#1144375).\n- scsi: lpfc: Update async event logging (bsc#1154521).\n- scsi: lpfc: Update lpfc version to 12.4.0.1 (bsc#1154521).\n- scsi: lpfc: cleanup: remove unused fcp_txcmlpq_cnt (bsc#1154521).\n- scsi: lpfc: remove left-over BUILD_NVME defines (bsc#1154268).\n- scsi: qedf: Modify abort and tmf handler to handle edge condition and flush (bsc#1098291).\n- scsi: qedf: fc_rport_priv reference counting fixes (bsc#1098291).\n- scsi: qla2xxx: Add error handling for PLOGI ELS passthrough (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Add error handling for PLOGI ELS passthrough (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Capture FW dump on MPI heartbeat stop event (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Capture FW dump on MPI heartbeat stop event (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Check for MB timeout while capturing ISP27/28xx FW dump (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Check for MB timeout while capturing ISP27/28xx FW dump (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Dual FCP-NVMe target port support (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Dual FCP-NVMe target port support (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Fix N2N link reset (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Fix N2N link reset (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Fix N2N link up fail (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Fix N2N link up fail (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Fix partial flash write of MBI (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Fix stale mem access on driver unload (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Fix stale mem access on driver unload (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Fix unbound sleep in fcport delete path (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Fix unbound sleep in fcport delete path (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Fix wait condition in loop (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Improve logging for scan thread (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Improve logging for scan thread (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Initialized mailbox to prevent driver load failure (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Optimize NPIV tear down process (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Optimize NPIV tear down process (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Remove WARN_ON_ONCE in qla2x00_status_cont_entry() (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Set remove flag for all VP (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Set remove flag for all VP (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Silence fwdump template message (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Silence fwdump template message (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Update driver version to 10.01.00.20-k (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Update driver version to 10.01.00.20-k (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: fixup incorrect usage of host_byte (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: remove redundant assignment to pointer host (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: remove redundant assignment to pointer host (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: stop timer in shutdown path (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: storvsc: setup 1:1 mapping between hardware queue and CPU queue (bsc#1140729).\n- scsi: zfcp: fix reaction on bit error threshold notification (bsc#1154956 LTC#182054).\n- sctp: Fix the link time qualifier of \u0027sctp_ctrlsock_exit()\u0027 (networking-stable-19_09_15).\n- sctp: use transport pf_retrans in sctp_do_8_2_transport_strike (networking-stable-19_09_15).\n- skge: fix checksum byte order (networking-stable-19_09_30).\n- sock_diag: fix autoloading of the raw_diag module (bsc#1152791).\n- sock_diag: request _diag module only when the family or proto has been registered (bsc#1152791).\n- staging: bcm2835-audio: Fix draining behavior regression (bsc#1111666).\n- staging: vt6655: Fix memory leak in vt6655_probe (bsc#1051510).\n- staging: wlan-ng: fix exit return when sme-\u003ekey_idx \u003e= NUM_WEPKEYS (bsc#1051510).\n- supporte.conf: add efivarfs to kernel-default-base (bsc#1154858).\n- tcp: Do not dequeue SYN/FIN-segments from write-queue (git-gixes).\n- tcp: fix tcp_ecn_withdraw_cwr() to clear TCP_ECN_QUEUE_CWR (networking-stable-19_09_15).\n- tcp: inherit timestamp on mtu probe (networking-stable-19_09_05).\n- tcp: remove empty skb from write queue in error cases (networking-stable-19_09_05).\n- thermal: Fix use-after-free when unregistering thermal zone device (bsc#1051510).\n- thermal_hwmon: Sanitize thermal_zone type (bsc#1051510).\n- tipc: add NULL pointer check before calling kfree_rcu (networking-stable-19_09_15).\n- tipc: fix unlimited bundling of small messages (networking-stable-19_10_05).\n- tracing: Initialize iter-\u003eseq after zeroing in tracing_read_pipe() (bsc#1151508).\n- tun: fix use-after-free when register netdev failed (networking-stable-19_09_15).\n- tuntap: correctly set SOCKWQ_ASYNC_NOSPACE (bsc#1145099).\n- usb: adutux: fix NULL-derefs on disconnect (bsc#1142635).\n- usb: adutux: fix use-after-free on disconnect (bsc#1142635).\n- usb: adutux: fix use-after-free on release (bsc#1051510).\n- usb: chaoskey: fix use-after-free on release (bsc#1051510).\n- usb: dummy-hcd: fix power budget for SuperSpeed mode (bsc#1051510).\n- usb: iowarrior: fix use-after-free after driver unbind (bsc#1051510).\n- usb: iowarrior: fix use-after-free on disconnect (bsc#1051510).\n- usb: iowarrior: fix use-after-free on release (bsc#1051510).\n- usb: ldusb: fix NULL-derefs on driver unbind (bsc#1051510).\n- usb: ldusb: fix memleak on disconnect (bsc#1051510).\n- usb: ldusb: fix read info leaks (bsc#1051510).\n- usb: legousbtower: fix a signedness bug in tower_probe() (bsc#1051510).\n- usb: legousbtower: fix deadlock on disconnect (bsc#1142635).\n- usb: legousbtower: fix memleak on disconnect (bsc#1051510).\n- usb: legousbtower: fix open after failed reset request (bsc#1142635).\n- usb: legousbtower: fix potential NULL-deref on disconnect (bsc#1142635).\n- usb: legousbtower: fix slab info leak at probe (bsc#1142635).\n- usb: legousbtower: fix use-after-free on release (bsc#1051510).\n- usb: microtek: fix info-leak at probe (bsc#1142635).\n- usb: serial: fix runtime PM after driver unbind (bsc#1051510).\n- usb: serial: ftdi_sio: add device IDs for Sienna and Echelon PL-20 (bsc#1051510).\n- usb: serial: keyspan: fix NULL-derefs on open() and write() (bsc#1051510).\n- usb: serial: option: add Telit FN980 compositions (bsc#1051510).\n- usb: serial: option: add support for Cinterion CLS8 devices (bsc#1051510).\n- usb: serial: ti_usb_3410_5052: fix port-close races (bsc#1051510).\n- usb: udc: lpc32xx: fix bad bit shift operation (bsc#1051510).\n- usb: usb-skeleton: fix NULL-deref on disconnect (bsc#1051510).\n- usb: usb-skeleton: fix runtime PM after driver unbind (bsc#1051510).\n- usb: usb-skeleton: fix use-after-free after driver unbind (bsc#1051510).\n- usb: usblcd: fix I/O after disconnect (bsc#1142635).\n- usb: usblp: fix runtime PM after driver unbind (bsc#1051510).\n- usb: usblp: fix use-after-free on disconnect (bsc#1051510).\n- usb: xhci: wait for CNR controller not ready bit in xhci resume (bsc#1051510).\n- usb: yurex: Do not retry on unexpected errors (bsc#1051510).\n- usb: yurex: fix NULL-derefs on disconnect (bsc#1051510).\n- usbnet: ignore endpoints with invalid wMaxPacketSize (bsc#1051510).\n- usbnet: sanity checking of packet sizes and device mtu (bsc#1051510).\n- vfio_pci: Restore original state on release (bsc#1051510).\n- vhost_net: conditionally enable tx polling (bsc#1145099).\n- video: of: display_timing: Add of_node_put() in of_get_display_timing() (bsc#1051510).\n- vsock: Fix a lockdep warning in __vsock_release() (networking-stable-19_10_05).\n- watchdog: imx2_wdt: fix min() calculation in imx2_wdt_set_timeout (bsc#1051510).\n- x86/asm: Fix MWAITX C-state hint value (bsc#1114279).\n- x86/boot/64: Make level2_kernel_pgt pages invalid outside kernel area (bnc#1153969).\n- x86/boot/64: Round memory hole size up to next PMD page (bnc#1153969).\n- x86/mm: Use WRITE_ONCE() when setting PTEs (bsc#1114279).\n- xen/netback: fix error path of xenvif_connect_data() (bsc#1065600).\n- xen/pv: Fix Xen PV guest int3 handling (bsc#1153811).\n- xhci: Check all endpoints for LPM timeout (bsc#1051510).\n- xhci: Fix false warning message about wrong bounce buffer write length (bsc#1051510).\n- xhci: Increase STS_SAVE timeout in xhci_suspend() (bsc#1051510).\n- xhci: Prevent device initiated U1/U2 link pm if exit latency is too long (bsc#1051510).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2019-2952,SUSE-SLE-Module-Public-Cloud-15-SP1-2019-2952",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_2952-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2019:2952-1",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192952-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2019:2952-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2019-November/006111.html"
},
{
"category": "self",
"summary": "SUSE Bug 1046299",
"url": "https://bugzilla.suse.com/1046299"
},
{
"category": "self",
"summary": "SUSE Bug 1046303",
"url": "https://bugzilla.suse.com/1046303"
},
{
"category": "self",
"summary": "SUSE Bug 1046305",
"url": "https://bugzilla.suse.com/1046305"
},
{
"category": "self",
"summary": "SUSE Bug 1050244",
"url": "https://bugzilla.suse.com/1050244"
},
{
"category": "self",
"summary": "SUSE Bug 1050536",
"url": "https://bugzilla.suse.com/1050536"
},
{
"category": "self",
"summary": "SUSE Bug 1050545",
"url": "https://bugzilla.suse.com/1050545"
},
{
"category": "self",
"summary": "SUSE Bug 1051510",
"url": "https://bugzilla.suse.com/1051510"
},
{
"category": "self",
"summary": "SUSE Bug 1055186",
"url": "https://bugzilla.suse.com/1055186"
},
{
"category": "self",
"summary": "SUSE Bug 1061840",
"url": "https://bugzilla.suse.com/1061840"
},
{
"category": "self",
"summary": "SUSE Bug 1064802",
"url": "https://bugzilla.suse.com/1064802"
},
{
"category": "self",
"summary": "SUSE Bug 1065600",
"url": "https://bugzilla.suse.com/1065600"
},
{
"category": "self",
"summary": "SUSE Bug 1066129",
"url": "https://bugzilla.suse.com/1066129"
},
{
"category": "self",
"summary": "SUSE Bug 1073513",
"url": "https://bugzilla.suse.com/1073513"
},
{
"category": "self",
"summary": "SUSE Bug 1082635",
"url": "https://bugzilla.suse.com/1082635"
},
{
"category": "self",
"summary": "SUSE Bug 1083647",
"url": "https://bugzilla.suse.com/1083647"
},
{
"category": "self",
"summary": "SUSE Bug 1086323",
"url": "https://bugzilla.suse.com/1086323"
},
{
"category": "self",
"summary": "SUSE Bug 1087092",
"url": "https://bugzilla.suse.com/1087092"
},
{
"category": "self",
"summary": "SUSE Bug 1089644",
"url": "https://bugzilla.suse.com/1089644"
},
{
"category": "self",
"summary": "SUSE Bug 1090631",
"url": "https://bugzilla.suse.com/1090631"
},
{
"category": "self",
"summary": "SUSE Bug 1093205",
"url": "https://bugzilla.suse.com/1093205"
},
{
"category": "self",
"summary": "SUSE Bug 1096254",
"url": "https://bugzilla.suse.com/1096254"
},
{
"category": "self",
"summary": "SUSE Bug 1097583",
"url": "https://bugzilla.suse.com/1097583"
},
{
"category": "self",
"summary": "SUSE Bug 1097584",
"url": "https://bugzilla.suse.com/1097584"
},
{
"category": "self",
"summary": "SUSE Bug 1097585",
"url": "https://bugzilla.suse.com/1097585"
},
{
"category": "self",
"summary": "SUSE Bug 1097586",
"url": "https://bugzilla.suse.com/1097586"
},
{
"category": "self",
"summary": "SUSE Bug 1097587",
"url": "https://bugzilla.suse.com/1097587"
},
{
"category": "self",
"summary": "SUSE Bug 1097588",
"url": "https://bugzilla.suse.com/1097588"
},
{
"category": "self",
"summary": "SUSE Bug 1098291",
"url": "https://bugzilla.suse.com/1098291"
},
{
"category": "self",
"summary": "SUSE Bug 1101674",
"url": "https://bugzilla.suse.com/1101674"
},
{
"category": "self",
"summary": "SUSE Bug 1109158",
"url": "https://bugzilla.suse.com/1109158"
},
{
"category": "self",
"summary": "SUSE Bug 1111666",
"url": "https://bugzilla.suse.com/1111666"
},
{
"category": "self",
"summary": "SUSE Bug 1112178",
"url": "https://bugzilla.suse.com/1112178"
},
{
"category": "self",
"summary": "SUSE Bug 1113994",
"url": "https://bugzilla.suse.com/1113994"
},
{
"category": "self",
"summary": "SUSE Bug 1114279",
"url": "https://bugzilla.suse.com/1114279"
},
{
"category": "self",
"summary": "SUSE Bug 1117665",
"url": "https://bugzilla.suse.com/1117665"
},
{
"category": "self",
"summary": "SUSE Bug 1119461",
"url": "https://bugzilla.suse.com/1119461"
},
{
"category": "self",
"summary": "SUSE Bug 1119465",
"url": "https://bugzilla.suse.com/1119465"
},
{
"category": "self",
"summary": "SUSE Bug 1123034",
"url": "https://bugzilla.suse.com/1123034"
},
{
"category": "self",
"summary": "SUSE Bug 1123080",
"url": "https://bugzilla.suse.com/1123080"
},
{
"category": "self",
"summary": "SUSE Bug 1133140",
"url": "https://bugzilla.suse.com/1133140"
},
{
"category": "self",
"summary": "SUSE Bug 1134303",
"url": "https://bugzilla.suse.com/1134303"
},
{
"category": "self",
"summary": "SUSE Bug 1135642",
"url": "https://bugzilla.suse.com/1135642"
},
{
"category": "self",
"summary": "SUSE Bug 1135854",
"url": "https://bugzilla.suse.com/1135854"
},
{
"category": "self",
"summary": "SUSE Bug 1135873",
"url": "https://bugzilla.suse.com/1135873"
},
{
"category": "self",
"summary": "SUSE Bug 1135967",
"url": "https://bugzilla.suse.com/1135967"
},
{
"category": "self",
"summary": "SUSE Bug 1137040",
"url": "https://bugzilla.suse.com/1137040"
},
{
"category": "self",
"summary": "SUSE Bug 1137799",
"url": "https://bugzilla.suse.com/1137799"
},
{
"category": "self",
"summary": "SUSE Bug 1137861",
"url": "https://bugzilla.suse.com/1137861"
},
{
"category": "self",
"summary": "SUSE Bug 1138190",
"url": "https://bugzilla.suse.com/1138190"
},
{
"category": "self",
"summary": "SUSE Bug 1140090",
"url": "https://bugzilla.suse.com/1140090"
},
{
"category": "self",
"summary": "SUSE Bug 1140729",
"url": "https://bugzilla.suse.com/1140729"
},
{
"category": "self",
"summary": "SUSE Bug 1140845",
"url": "https://bugzilla.suse.com/1140845"
},
{
"category": "self",
"summary": "SUSE Bug 1140883",
"url": "https://bugzilla.suse.com/1140883"
},
{
"category": "self",
"summary": "SUSE Bug 1141600",
"url": "https://bugzilla.suse.com/1141600"
},
{
"category": "self",
"summary": "SUSE Bug 1142635",
"url": "https://bugzilla.suse.com/1142635"
},
{
"category": "self",
"summary": "SUSE Bug 1142667",
"url": "https://bugzilla.suse.com/1142667"
},
{
"category": "self",
"summary": "SUSE Bug 1143706",
"url": "https://bugzilla.suse.com/1143706"
},
{
"category": "self",
"summary": "SUSE Bug 1144338",
"url": "https://bugzilla.suse.com/1144338"
},
{
"category": "self",
"summary": "SUSE Bug 1144375",
"url": "https://bugzilla.suse.com/1144375"
},
{
"category": "self",
"summary": "SUSE Bug 1144449",
"url": "https://bugzilla.suse.com/1144449"
},
{
"category": "self",
"summary": "SUSE Bug 1144903",
"url": "https://bugzilla.suse.com/1144903"
},
{
"category": "self",
"summary": "SUSE Bug 1145099",
"url": "https://bugzilla.suse.com/1145099"
},
{
"category": "self",
"summary": "SUSE Bug 1146612",
"url": "https://bugzilla.suse.com/1146612"
},
{
"category": "self",
"summary": "SUSE Bug 1148410",
"url": "https://bugzilla.suse.com/1148410"
},
{
"category": "self",
"summary": "SUSE Bug 1149119",
"url": "https://bugzilla.suse.com/1149119"
},
{
"category": "self",
"summary": "SUSE Bug 1149853",
"url": "https://bugzilla.suse.com/1149853"
},
{
"category": "self",
"summary": "SUSE Bug 1150452",
"url": "https://bugzilla.suse.com/1150452"
},
{
"category": "self",
"summary": "SUSE Bug 1150457",
"url": "https://bugzilla.suse.com/1150457"
},
{
"category": "self",
"summary": "SUSE Bug 1150465",
"url": "https://bugzilla.suse.com/1150465"
},
{
"category": "self",
"summary": "SUSE Bug 1150875",
"url": "https://bugzilla.suse.com/1150875"
},
{
"category": "self",
"summary": "SUSE Bug 1151508",
"url": "https://bugzilla.suse.com/1151508"
},
{
"category": "self",
"summary": "SUSE Bug 1151807",
"url": "https://bugzilla.suse.com/1151807"
},
{
"category": "self",
"summary": "SUSE Bug 1152033",
"url": "https://bugzilla.suse.com/1152033"
},
{
"category": "self",
"summary": "SUSE Bug 1152624",
"url": "https://bugzilla.suse.com/1152624"
},
{
"category": "self",
"summary": "SUSE Bug 1152665",
"url": "https://bugzilla.suse.com/1152665"
},
{
"category": "self",
"summary": "SUSE Bug 1152685",
"url": "https://bugzilla.suse.com/1152685"
},
{
"category": "self",
"summary": "SUSE Bug 1152696",
"url": "https://bugzilla.suse.com/1152696"
},
{
"category": "self",
"summary": "SUSE Bug 1152697",
"url": "https://bugzilla.suse.com/1152697"
},
{
"category": "self",
"summary": "SUSE Bug 1152788",
"url": "https://bugzilla.suse.com/1152788"
},
{
"category": "self",
"summary": "SUSE Bug 1152790",
"url": "https://bugzilla.suse.com/1152790"
},
{
"category": "self",
"summary": "SUSE Bug 1152791",
"url": "https://bugzilla.suse.com/1152791"
},
{
"category": "self",
"summary": "SUSE Bug 1153112",
"url": "https://bugzilla.suse.com/1153112"
},
{
"category": "self",
"summary": "SUSE Bug 1153158",
"url": "https://bugzilla.suse.com/1153158"
},
{
"category": "self",
"summary": "SUSE Bug 1153236",
"url": "https://bugzilla.suse.com/1153236"
},
{
"category": "self",
"summary": "SUSE Bug 1153263",
"url": "https://bugzilla.suse.com/1153263"
},
{
"category": "self",
"summary": "SUSE Bug 1153476",
"url": "https://bugzilla.suse.com/1153476"
},
{
"category": "self",
"summary": "SUSE Bug 1153509",
"url": "https://bugzilla.suse.com/1153509"
},
{
"category": "self",
"summary": "SUSE Bug 1153607",
"url": "https://bugzilla.suse.com/1153607"
},
{
"category": "self",
"summary": "SUSE Bug 1153646",
"url": "https://bugzilla.suse.com/1153646"
},
{
"category": "self",
"summary": "SUSE Bug 1153681",
"url": "https://bugzilla.suse.com/1153681"
},
{
"category": "self",
"summary": "SUSE Bug 1153713",
"url": "https://bugzilla.suse.com/1153713"
},
{
"category": "self",
"summary": "SUSE Bug 1153717",
"url": "https://bugzilla.suse.com/1153717"
},
{
"category": "self",
"summary": "SUSE Bug 1153718",
"url": "https://bugzilla.suse.com/1153718"
},
{
"category": "self",
"summary": "SUSE Bug 1153719",
"url": "https://bugzilla.suse.com/1153719"
},
{
"category": "self",
"summary": "SUSE Bug 1153811",
"url": "https://bugzilla.suse.com/1153811"
},
{
"category": "self",
"summary": "SUSE Bug 1153969",
"url": "https://bugzilla.suse.com/1153969"
},
{
"category": "self",
"summary": "SUSE Bug 1154108",
"url": "https://bugzilla.suse.com/1154108"
},
{
"category": "self",
"summary": "SUSE Bug 1154189",
"url": "https://bugzilla.suse.com/1154189"
},
{
"category": "self",
"summary": "SUSE Bug 1154242",
"url": "https://bugzilla.suse.com/1154242"
},
{
"category": "self",
"summary": "SUSE Bug 1154268",
"url": "https://bugzilla.suse.com/1154268"
},
{
"category": "self",
"summary": "SUSE Bug 1154354",
"url": "https://bugzilla.suse.com/1154354"
},
{
"category": "self",
"summary": "SUSE Bug 1154372",
"url": "https://bugzilla.suse.com/1154372"
},
{
"category": "self",
"summary": "SUSE Bug 1154521",
"url": "https://bugzilla.suse.com/1154521"
},
{
"category": "self",
"summary": "SUSE Bug 1154578",
"url": "https://bugzilla.suse.com/1154578"
},
{
"category": "self",
"summary": "SUSE Bug 1154607",
"url": "https://bugzilla.suse.com/1154607"
},
{
"category": "self",
"summary": "SUSE Bug 1154608",
"url": "https://bugzilla.suse.com/1154608"
},
{
"category": "self",
"summary": "SUSE Bug 1154610",
"url": "https://bugzilla.suse.com/1154610"
},
{
"category": "self",
"summary": "SUSE Bug 1154611",
"url": "https://bugzilla.suse.com/1154611"
},
{
"category": "self",
"summary": "SUSE Bug 1154651",
"url": "https://bugzilla.suse.com/1154651"
},
{
"category": "self",
"summary": "SUSE Bug 1154737",
"url": "https://bugzilla.suse.com/1154737"
},
{
"category": "self",
"summary": "SUSE Bug 1154747",
"url": "https://bugzilla.suse.com/1154747"
},
{
"category": "self",
"summary": "SUSE Bug 1154848",
"url": "https://bugzilla.suse.com/1154848"
},
{
"category": "self",
"summary": "SUSE Bug 1154858",
"url": "https://bugzilla.suse.com/1154858"
},
{
"category": "self",
"summary": "SUSE Bug 1154905",
"url": "https://bugzilla.suse.com/1154905"
},
{
"category": "self",
"summary": "SUSE Bug 1154956",
"url": "https://bugzilla.suse.com/1154956"
},
{
"category": "self",
"summary": "SUSE Bug 1155061",
"url": "https://bugzilla.suse.com/1155061"
},
{
"category": "self",
"summary": "SUSE Bug 1155178",
"url": "https://bugzilla.suse.com/1155178"
},
{
"category": "self",
"summary": "SUSE Bug 1155179",
"url": "https://bugzilla.suse.com/1155179"
},
{
"category": "self",
"summary": "SUSE Bug 1155184",
"url": "https://bugzilla.suse.com/1155184"
},
{
"category": "self",
"summary": "SUSE Bug 1155186",
"url": "https://bugzilla.suse.com/1155186"
},
{
"category": "self",
"summary": "SUSE Bug 1155671",
"url": "https://bugzilla.suse.com/1155671"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-12207 page",
"url": "https://www.suse.com/security/cve/CVE-2018-12207/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-10220 page",
"url": "https://www.suse.com/security/cve/CVE-2019-10220/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11135 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11135/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-16232 page",
"url": "https://www.suse.com/security/cve/CVE-2019-16232/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-16233 page",
"url": "https://www.suse.com/security/cve/CVE-2019-16233/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-16234 page",
"url": "https://www.suse.com/security/cve/CVE-2019-16234/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-16995 page",
"url": "https://www.suse.com/security/cve/CVE-2019-16995/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-17056 page",
"url": "https://www.suse.com/security/cve/CVE-2019-17056/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-17133 page",
"url": "https://www.suse.com/security/cve/CVE-2019-17133/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-17666 page",
"url": "https://www.suse.com/security/cve/CVE-2019-17666/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2019-11-12T18:13:14Z",
"generator": {
"date": "2019-11-12T18:13:14Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2019:2952-1",
"initial_release_date": "2019-11-12T18:13:14Z",
"revision_history": [
{
"date": "2019-11-12T18:13:14Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-azure-4.12.14-8.19.1.noarch",
"product": {
"name": "kernel-devel-azure-4.12.14-8.19.1.noarch",
"product_id": "kernel-devel-azure-4.12.14-8.19.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-azure-4.12.14-8.19.1.noarch",
"product": {
"name": "kernel-source-azure-4.12.14-8.19.1.noarch",
"product_id": "kernel-source-azure-4.12.14-8.19.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-azure-4.12.14-8.19.1.x86_64",
"product": {
"name": "cluster-md-kmp-azure-4.12.14-8.19.1.x86_64",
"product_id": "cluster-md-kmp-azure-4.12.14-8.19.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-azure-4.12.14-8.19.1.x86_64",
"product": {
"name": "dlm-kmp-azure-4.12.14-8.19.1.x86_64",
"product_id": "dlm-kmp-azure-4.12.14-8.19.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-azure-4.12.14-8.19.1.x86_64",
"product": {
"name": "gfs2-kmp-azure-4.12.14-8.19.1.x86_64",
"product_id": "gfs2-kmp-azure-4.12.14-8.19.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-4.12.14-8.19.1.x86_64",
"product": {
"name": "kernel-azure-4.12.14-8.19.1.x86_64",
"product_id": "kernel-azure-4.12.14-8.19.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-base-4.12.14-8.19.1.x86_64",
"product": {
"name": "kernel-azure-base-4.12.14-8.19.1.x86_64",
"product_id": "kernel-azure-base-4.12.14-8.19.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-devel-4.12.14-8.19.1.x86_64",
"product": {
"name": "kernel-azure-devel-4.12.14-8.19.1.x86_64",
"product_id": "kernel-azure-devel-4.12.14-8.19.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-extra-4.12.14-8.19.1.x86_64",
"product": {
"name": "kernel-azure-extra-4.12.14-8.19.1.x86_64",
"product_id": "kernel-azure-extra-4.12.14-8.19.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-livepatch-devel-4.12.14-8.19.1.x86_64",
"product": {
"name": "kernel-azure-livepatch-devel-4.12.14-8.19.1.x86_64",
"product_id": "kernel-azure-livepatch-devel-4.12.14-8.19.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-azure-4.12.14-8.19.1.x86_64",
"product": {
"name": "kernel-syms-azure-4.12.14-8.19.1.x86_64",
"product_id": "kernel-syms-azure-4.12.14-8.19.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-azure-4.12.14-8.19.1.x86_64",
"product": {
"name": "kselftests-kmp-azure-4.12.14-8.19.1.x86_64",
"product_id": "kselftests-kmp-azure-4.12.14-8.19.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-azure-4.12.14-8.19.1.x86_64",
"product": {
"name": "ocfs2-kmp-azure-4.12.14-8.19.1.x86_64",
"product_id": "ocfs2-kmp-azure-4.12.14-8.19.1.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-azure-4.12.14-8.19.1.x86_64",
"product": {
"name": "reiserfs-kmp-azure-4.12.14-8.19.1.x86_64",
"product_id": "reiserfs-kmp-azure-4.12.14-8.19.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Public Cloud 15 SP1",
"product": {
"name": "SUSE Linux Enterprise Module for Public Cloud 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-public-cloud:15:sp1"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-4.12.14-8.19.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.19.1.x86_64"
},
"product_reference": "kernel-azure-4.12.14-8.19.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-base-4.12.14-8.19.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.19.1.x86_64"
},
"product_reference": "kernel-azure-base-4.12.14-8.19.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-devel-4.12.14-8.19.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.19.1.x86_64"
},
"product_reference": "kernel-azure-devel-4.12.14-8.19.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-azure-4.12.14-8.19.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.19.1.noarch"
},
"product_reference": "kernel-devel-azure-4.12.14-8.19.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-azure-4.12.14-8.19.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.19.1.noarch"
},
"product_reference": "kernel-source-azure-4.12.14-8.19.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-azure-4.12.14-8.19.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.19.1.x86_64"
},
"product_reference": "kernel-syms-azure-4.12.14-8.19.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-12207",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-12207"
}
],
"notes": [
{
"category": "general",
"text": "Improper invalidation for page table updates by a virtual guest operating system for multiple Intel(R) Processors may allow an authenticated user to potentially enable denial of service of the host system via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.19.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.19.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.19.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.19.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.19.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.19.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-12207",
"url": "https://www.suse.com/security/cve/CVE-2018-12207"
},
{
"category": "external",
"summary": "SUSE Bug 1117665 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1117665"
},
{
"category": "external",
"summary": "SUSE Bug 1139073 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1139073"
},
{
"category": "external",
"summary": "SUSE Bug 1152505 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1152505"
},
{
"category": "external",
"summary": "SUSE Bug 1155812 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1155812"
},
{
"category": "external",
"summary": "SUSE Bug 1155817 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1155817"
},
{
"category": "external",
"summary": "SUSE Bug 1155945 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1155945"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1201877"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.19.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.19.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.19.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.19.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.19.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.19.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.19.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.19.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.19.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.19.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.19.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.19.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:13:14Z",
"details": "moderate"
}
],
"title": "CVE-2018-12207"
},
{
"cve": "CVE-2019-10220",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-10220"
}
],
"notes": [
{
"category": "general",
"text": "Linux kernel CIFS implementation, version 4.9.0 is vulnerable to a relative paths injection in directory entry lists.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.19.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.19.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.19.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.19.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.19.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.19.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-10220",
"url": "https://www.suse.com/security/cve/CVE-2019-10220"
},
{
"category": "external",
"summary": "SUSE Bug 1144903 for CVE-2019-10220",
"url": "https://bugzilla.suse.com/1144903"
},
{
"category": "external",
"summary": "SUSE Bug 1153108 for CVE-2019-10220",
"url": "https://bugzilla.suse.com/1153108"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.19.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.19.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.19.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.19.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.19.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.19.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.19.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.19.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.19.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.19.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.19.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.19.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:13:14Z",
"details": "important"
}
],
"title": "CVE-2019-10220"
},
{
"cve": "CVE-2019-11135",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11135"
}
],
"notes": [
{
"category": "general",
"text": "TSX Asynchronous Abort condition on some CPUs utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.19.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.19.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.19.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.19.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.19.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.19.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11135",
"url": "https://www.suse.com/security/cve/CVE-2019-11135"
},
{
"category": "external",
"summary": "SUSE Bug 1139073 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1139073"
},
{
"category": "external",
"summary": "SUSE Bug 1152497 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1152497"
},
{
"category": "external",
"summary": "SUSE Bug 1152505 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1152505"
},
{
"category": "external",
"summary": "SUSE Bug 1152506 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1152506"
},
{
"category": "external",
"summary": "SUSE Bug 1160120 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1160120"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1201877"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.19.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.19.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.19.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.19.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.19.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.19.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.19.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.19.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.19.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.19.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.19.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.19.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:13:14Z",
"details": "moderate"
}
],
"title": "CVE-2019-11135"
},
{
"cve": "CVE-2019-16232",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-16232"
}
],
"notes": [
{
"category": "general",
"text": "drivers/net/wireless/marvell/libertas/if_sdio.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.19.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.19.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.19.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.19.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.19.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.19.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-16232",
"url": "https://www.suse.com/security/cve/CVE-2019-16232"
},
{
"category": "external",
"summary": "SUSE Bug 1150465 for CVE-2019-16232",
"url": "https://bugzilla.suse.com/1150465"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.19.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.19.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.19.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.19.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.19.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.19.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.19.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.19.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.19.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.19.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.19.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.19.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:13:14Z",
"details": "low"
}
],
"title": "CVE-2019-16232"
},
{
"cve": "CVE-2019-16233",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-16233"
}
],
"notes": [
{
"category": "general",
"text": "drivers/scsi/qla2xxx/qla_os.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.19.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.19.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.19.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.19.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.19.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.19.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-16233",
"url": "https://www.suse.com/security/cve/CVE-2019-16233"
},
{
"category": "external",
"summary": "SUSE Bug 1150457 for CVE-2019-16233",
"url": "https://bugzilla.suse.com/1150457"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.19.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.19.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.19.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.19.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.19.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.19.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.19.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.19.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.19.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.19.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.19.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.19.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:13:14Z",
"details": "low"
}
],
"title": "CVE-2019-16233"
},
{
"cve": "CVE-2019-16234",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-16234"
}
],
"notes": [
{
"category": "general",
"text": "drivers/net/wireless/intel/iwlwifi/pcie/trans.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.19.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.19.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.19.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.19.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.19.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.19.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-16234",
"url": "https://www.suse.com/security/cve/CVE-2019-16234"
},
{
"category": "external",
"summary": "SUSE Bug 1150452 for CVE-2019-16234",
"url": "https://bugzilla.suse.com/1150452"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.19.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.19.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.19.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.19.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.19.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.19.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.19.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.19.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.19.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.19.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.19.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.19.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:13:14Z",
"details": "low"
}
],
"title": "CVE-2019-16234"
},
{
"cve": "CVE-2019-16995",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-16995"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel before 5.0.3, a memory leak exits in hsr_dev_finalize() in net/hsr/hsr_device.c if hsr_add_port fails to add a port, which may cause denial of service, aka CID-6caabe7f197d.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.19.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.19.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.19.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.19.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.19.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.19.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-16995",
"url": "https://www.suse.com/security/cve/CVE-2019-16995"
},
{
"category": "external",
"summary": "SUSE Bug 1152685 for CVE-2019-16995",
"url": "https://bugzilla.suse.com/1152685"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.19.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.19.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.19.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.19.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.19.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.19.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.19.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.19.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.19.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.19.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.19.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.19.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:13:14Z",
"details": "moderate"
}
],
"title": "CVE-2019-16995"
},
{
"cve": "CVE-2019-17056",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-17056"
}
],
"notes": [
{
"category": "general",
"text": "llcp_sock_create in net/nfc/llcp_sock.c in the AF_NFC network module in the Linux kernel through 5.3.2 does not enforce CAP_NET_RAW, which means that unprivileged users can create a raw socket, aka CID-3a359798b176.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.19.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.19.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.19.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.19.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.19.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.19.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-17056",
"url": "https://www.suse.com/security/cve/CVE-2019-17056"
},
{
"category": "external",
"summary": "SUSE Bug 1152788 for CVE-2019-17056",
"url": "https://bugzilla.suse.com/1152788"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.19.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.19.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.19.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.19.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.19.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.19.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.19.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.19.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.19.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.19.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.19.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.19.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:13:14Z",
"details": "moderate"
}
],
"title": "CVE-2019-17056"
},
{
"cve": "CVE-2019-17133",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-17133"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel through 5.3.2, cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c does not reject a long SSID IE, leading to a Buffer Overflow.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.19.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.19.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.19.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.19.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.19.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.19.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-17133",
"url": "https://www.suse.com/security/cve/CVE-2019-17133"
},
{
"category": "external",
"summary": "SUSE Bug 1153158 for CVE-2019-17133",
"url": "https://bugzilla.suse.com/1153158"
},
{
"category": "external",
"summary": "SUSE Bug 1153161 for CVE-2019-17133",
"url": "https://bugzilla.suse.com/1153161"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.19.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.19.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.19.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.19.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.19.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.19.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.19.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.19.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.19.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.19.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.19.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.19.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:13:14Z",
"details": "important"
}
],
"title": "CVE-2019-17133"
},
{
"cve": "CVE-2019-17666",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-17666"
}
],
"notes": [
{
"category": "general",
"text": "rtl_p2p_noa_ie in drivers/net/wireless/realtek/rtlwifi/ps.c in the Linux kernel through 5.3.6 lacks a certain upper-bound check, leading to a buffer overflow.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.19.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.19.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.19.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.19.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.19.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.19.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-17666",
"url": "https://www.suse.com/security/cve/CVE-2019-17666"
},
{
"category": "external",
"summary": "SUSE Bug 1154372 for CVE-2019-17666",
"url": "https://bugzilla.suse.com/1154372"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.19.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.19.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.19.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.19.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.19.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.19.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.19.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.19.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.19.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.19.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.19.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.19.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:13:14Z",
"details": "moderate"
}
],
"title": "CVE-2019-17666"
}
]
}
suse-su-2019:14218-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\nThe SUSE Linux Enterprise 11-SP4 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2019-11135: Aborting an asynchronous TSX operation on Intel CPUs with\n Transactional Memory support could be used to facilitate sidechannel\n information leaks out of microarchitectural buffers, similar to the\n previously described \u0027Microarchitectural Data Sampling\u0027 attack.\n\n The Linux kernel was supplemented with the option to disable TSX operation\n altogether (requiring CPU Microcode updates on older systems) and better\n flushing of microarchitectural buffers (VERW).\n\n The set of options available is described in our TID at https://www.suse.com/support/kb/doc/?id=7023735\n\n- CVE-2018-12207: Untrusted virtual machines on Intel CPUs could exploit a race\n condition in the Instruction Fetch Unit of the Intel CPU to cause a Machine\n Exception during Page Size Change, causing the CPU core to be non-functional.\n\n The Linux Kernel kvm hypervisor was adjusted to avoid page size changes in\n executable pages by splitting / merging huge pages into small pages as\n needed. More information can be found on https://www.suse.com/support/kb/doc/?id=7024251\n\n- CVE-2019-16233: drivers/scsi/qla2xxx/qla_os.c did not check the\n alloc_workqueue return value, leading to a NULL pointer dereference.\n (bsc#1150457).\n- CVE-2019-10220: Added sanity checks on the pathnames passed to the user\n space. (bsc#1144903).\n- CVE-2019-16234: iwlwifi pcie driver did not check the alloc_workqueue return\n value, leading to a NULL pointer dereference. (bsc#1150452).\n- CVE-2019-16232: Fix a potential NULL pointer dereference in the Marwell\n libertas driver (bsc#1150465).\n- CVE-2019-17052: ax25_create in the AF_AX25 network module in the Linux kernel\n did not enforce CAP_NET_RAW, which meant that unprivileged users could create\n a raw socket, aka CID-0614e2b73768. (bnc#1152779)\n- CVE-2019-17055: base_sock_create in the AF_ISDN network module in the Linux kernel\n did not enforce CAP_NET_RAW, which means that unprivileged users can create\n a raw socket, aka CID-b91ee4aa2a21. (bnc#1152782)\n- CVE-2019-17054: atalk_create in the AF_APPLETALK network module in the Linux kernel\n did not enforce CAP_NET_RAW, which means that unprivileged users can create\n a raw socket, aka CID-6cc03e8aa36c. (bnc#1152786)\n- CVE-2019-17133: cfg80211 wireless extension did not reject a long SSID IE,\n leading to a Buffer Overflow (bsc#1153158).\n- CVE-2019-17053: ieee802154_create in the AF_IEEE802154 network module in the Linux kernel\n did not enforce CAP_NET_RAW, which means that unprivileged users could create\n a raw socket, aka CID-e69dbd4619e7. (bnc#1152789)\n- CVE-2019-16413: The 9p filesystem did not protect i_size_write() properly, which caused an\n i_size_read() infinite loop and denial of service on SMP systems. (bnc#1151347)\n- CVE-2019-15291: There was a NULL pointer dereference caused by a malicious USB device in the\n flexcop_usb_probe function. (bnc#1146540)\n- CVE-2019-15807: There was a memory leak in the SAS expander driver when SAS expander discovery\n fails. This could cause a denial of service. (bnc#1148938)\n- CVE-2019-14821: An out-of-bounds access issue was found in the way Linux the kernel\u0027s KVM hypervisor\n implemented the Coalesced MMIO write operation. It operated on an MMIO ring buffer\n \u0027struct kvm_coalesced_mmio\u0027 object, wherein write indices value could be supplied by a\n host user-space process. An unprivileged host user or process with access to \u0027/dev/kvm\u0027\n device could use this flaw to crash the host kernel, resulting in a denial of service\n or potentially escalating privileges on the system. (bnc#1151350)\n- CVE-2019-15505: The Linux kernel had an out-of-bounds read via crafted USB device traffic\n (which may have been remote via usbip or usbredir). (bnc#1147122)\n- CVE-2019-14835: A buffer overflow flaw was found in the way Linux kernel\u0027s vhost functionality\n that translates virtqueue buffers to IOVs, logged the buffer descriptors during migration. A\n privileged guest user able to pass descriptors with invalid length to the host when migration\n is underway, could have used this flaw to increase their privileges on the host. (bnc#1150112)\n- CVE-2019-15216: There was a NULL pointer dereference caused by a malicious USB device in the\n drivers/usb/misc/yurex.c driver. (bnc#1146361)\n- CVE-2019-9456: In the Android kernel in Pixel C USB monitor driver there was a possible\n OOB write due to a missing bounds check. This could lead to local escalation of privilege\n with System execution privileges needed. User interaction was not needed for exploitation. (bnc#1150025)\n- CVE-2019-15927: An out-of-bounds access existed in the function build_audio_procunit in the\n file sound/usb/mixer.c. (bnc#1149522)\n- CVE-2019-15902: Misuse of the upstream \u0027x86/ptrace: Fix possible spectre-v1 in ptrace_get_debugreg()\u0027\n commit reintroduced the Spectre vulnerability that it aimed to eliminate. This occurred because the\n backport process depends on cherry picking specific commits, and because two (correctly ordered)\\\n code lines were swapped. (bnc#1149376)\n- CVE-2019-15219: There was a NULL pointer dereference caused by a malicious USB device in the\n drivers/usb/misc/sisusbvga/sisusb.c driver. (bnc#1146524)\n- CVE-2017-18509: An issue was discovered in net/ipv6/ip6mr.c in the Linux kernel By setting a specific\n socket option, an attacker could control a pointer in kernel land and cause an inet_csk_listen_stop\n general protection fault, or potentially execute arbitrary code under certain circumstances. The issue\n could be triggered as root (e.g., inside a default LXC container or with the CAP_NET_ADMIN capability)\n or after namespace unsharing. This occurred because sk_type and protocol were not checked in the\n appropriate part of the ip6_mroute_* functions. (bnc#1145477)\n- CVE-2019-15212: There was a double-free caused by a malicious USB device in the drivers/usb/misc/rio500.c driver. (bnc#1146391)\n- CVE-2019-15292: There was a use-after-free in atalk_proc_exit. (bnc#1146678)\n- CVE-2019-15217: There was a NULL pointer dereference caused by a malicious USB device in the\n drivers/media/usb/zr364xx/zr364xx.c driver. (bnc#1146547)\n- CVE-2018-20976: A use after free was discovered in fs/xfs/xfs_super.c, related to xfs_fs_fill_super\n failure. (bnc#1146285)\n- CVE-2017-18551: There was an out of bounds write in the function i2c_smbus_xfer_emulated. (bnc#1146163)\n- CVE-2019-15118: check_input_term in sound/usb/mixer.c mishandled recursion, leading to kernel stack\n exhaustion. (bnc#1145922)\n\nThe following non-security bugs were fixed:\n\n- add a missing lfence in kernel error entry and remove a superfluous lfence in userspace interrupt exit paths\n- Documentation: Add ITLB_MULTIHIT documentation (bnc#1117665).\n- array_index_nospec: Sanitize speculative array (bsc#1155671)\n- cpu/speculation: Uninline and export CPU mitigations helpers (bnc#1117665).\n- IB/core: Add mitigation for Spectre V1 (bsc#1155671)\n- inet_diag: fix oops for IPv4 AF_INET6 TCP SYN-RECV state (bsc#1101061).\n- kABI Fix for IFU Patches (bsc#1117665).\n- kthread: Implement park/unpark facility (bsc#1117665).\n- kvm: Convert kvm_lock to a mutex (bsc#1117665).\n- kvm: MMU: drop read-only large sptes when creating lower level sptes (bsc#1117665).\n- kvm: MMU: fast invalidate all pages (bsc1117665).\n- kvm: VMX: export PFEC.P bit on ept (bsc#1117665).\n- kvm: vmx, svm: always run with EFER.NXE=1 when shadow paging is active (bsc#1117665).\n- kvm: x86: make FNAME(fetch) and __direct_map more similar (bsc#1117665).\n- kvm: x86: mmu: Apply global mitigations knob to ITLB_MULTIHIT (bnc#1117665).\n- mm/readahead.c: fix readahead failure for memoryless NUMA nodes and limit readahead pages (bsc#1143327).\n- mm: use only per-device readahead limit (bsc#1143327).\n- powerpc/64s: support nospectre_v2 cmdline option (bsc#1131107).\n- powerpc/fsl: Add nospectre_v2 command line argument (bsc#1131107).\n- powerpc/fsl: Update Spectre v2 reporting (bsc#1131107).\n- powerpc/security: Show powerpc_security_features in debugfs (bsc#1131107).\n- xfs: xfs_remove deadlocks due to inverted AGF vs AGI lock ordering (bsc#1150599).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "slehasp4-kernel-source-14218,slessp4-kernel-source-14218,slexsp3-kernel-source-14218",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_14218-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2019:14218-1",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-201914218-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2019:14218-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2019-November/006135.html"
},
{
"category": "self",
"summary": "SUSE Bug 1101061",
"url": "https://bugzilla.suse.com/1101061"
},
{
"category": "self",
"summary": "SUSE Bug 1113201",
"url": "https://bugzilla.suse.com/1113201"
},
{
"category": "self",
"summary": "SUSE Bug 1117665",
"url": "https://bugzilla.suse.com/1117665"
},
{
"category": "self",
"summary": "SUSE Bug 1131107",
"url": "https://bugzilla.suse.com/1131107"
},
{
"category": "self",
"summary": "SUSE Bug 1143327",
"url": "https://bugzilla.suse.com/1143327"
},
{
"category": "self",
"summary": "SUSE Bug 1144903",
"url": "https://bugzilla.suse.com/1144903"
},
{
"category": "self",
"summary": "SUSE Bug 1145477",
"url": "https://bugzilla.suse.com/1145477"
},
{
"category": "self",
"summary": "SUSE Bug 1145922",
"url": "https://bugzilla.suse.com/1145922"
},
{
"category": "self",
"summary": "SUSE Bug 1146163",
"url": "https://bugzilla.suse.com/1146163"
},
{
"category": "self",
"summary": "SUSE Bug 1146285",
"url": "https://bugzilla.suse.com/1146285"
},
{
"category": "self",
"summary": "SUSE Bug 1146361",
"url": "https://bugzilla.suse.com/1146361"
},
{
"category": "self",
"summary": "SUSE Bug 1146391",
"url": "https://bugzilla.suse.com/1146391"
},
{
"category": "self",
"summary": "SUSE Bug 1146524",
"url": "https://bugzilla.suse.com/1146524"
},
{
"category": "self",
"summary": "SUSE Bug 1146540",
"url": "https://bugzilla.suse.com/1146540"
},
{
"category": "self",
"summary": "SUSE Bug 1146547",
"url": "https://bugzilla.suse.com/1146547"
},
{
"category": "self",
"summary": "SUSE Bug 1146678",
"url": "https://bugzilla.suse.com/1146678"
},
{
"category": "self",
"summary": "SUSE Bug 1147122",
"url": "https://bugzilla.suse.com/1147122"
},
{
"category": "self",
"summary": "SUSE Bug 1148938",
"url": "https://bugzilla.suse.com/1148938"
},
{
"category": "self",
"summary": "SUSE Bug 1149376",
"url": "https://bugzilla.suse.com/1149376"
},
{
"category": "self",
"summary": "SUSE Bug 1149522",
"url": "https://bugzilla.suse.com/1149522"
},
{
"category": "self",
"summary": "SUSE Bug 1150025",
"url": "https://bugzilla.suse.com/1150025"
},
{
"category": "self",
"summary": "SUSE Bug 1150112",
"url": "https://bugzilla.suse.com/1150112"
},
{
"category": "self",
"summary": "SUSE Bug 1150452",
"url": "https://bugzilla.suse.com/1150452"
},
{
"category": "self",
"summary": "SUSE Bug 1150457",
"url": "https://bugzilla.suse.com/1150457"
},
{
"category": "self",
"summary": "SUSE Bug 1150465",
"url": "https://bugzilla.suse.com/1150465"
},
{
"category": "self",
"summary": "SUSE Bug 1150599",
"url": "https://bugzilla.suse.com/1150599"
},
{
"category": "self",
"summary": "SUSE Bug 1151347",
"url": "https://bugzilla.suse.com/1151347"
},
{
"category": "self",
"summary": "SUSE Bug 1151350",
"url": "https://bugzilla.suse.com/1151350"
},
{
"category": "self",
"summary": "SUSE Bug 1152779",
"url": "https://bugzilla.suse.com/1152779"
},
{
"category": "self",
"summary": "SUSE Bug 1152782",
"url": "https://bugzilla.suse.com/1152782"
},
{
"category": "self",
"summary": "SUSE Bug 1152786",
"url": "https://bugzilla.suse.com/1152786"
},
{
"category": "self",
"summary": "SUSE Bug 1152789",
"url": "https://bugzilla.suse.com/1152789"
},
{
"category": "self",
"summary": "SUSE Bug 1153158",
"url": "https://bugzilla.suse.com/1153158"
},
{
"category": "self",
"summary": "SUSE Bug 1155671",
"url": "https://bugzilla.suse.com/1155671"
},
{
"category": "self",
"summary": "SUSE Bug 802154",
"url": "https://bugzilla.suse.com/802154"
},
{
"category": "self",
"summary": "SUSE Bug 936875",
"url": "https://bugzilla.suse.com/936875"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-18509 page",
"url": "https://www.suse.com/security/cve/CVE-2017-18509/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-18551 page",
"url": "https://www.suse.com/security/cve/CVE-2017-18551/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-12207 page",
"url": "https://www.suse.com/security/cve/CVE-2018-12207/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-20976 page",
"url": "https://www.suse.com/security/cve/CVE-2018-20976/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-10220 page",
"url": "https://www.suse.com/security/cve/CVE-2019-10220/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11135 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11135/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-14821 page",
"url": "https://www.suse.com/security/cve/CVE-2019-14821/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-14835 page",
"url": "https://www.suse.com/security/cve/CVE-2019-14835/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15118 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15118/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15212 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15212/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15216 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15216/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15217 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15217/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15219 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15219/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15291 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15291/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15292 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15292/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15505 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15505/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15807 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15807/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15902 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15902/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15927 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15927/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-16232 page",
"url": "https://www.suse.com/security/cve/CVE-2019-16232/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-16233 page",
"url": "https://www.suse.com/security/cve/CVE-2019-16233/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-16234 page",
"url": "https://www.suse.com/security/cve/CVE-2019-16234/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-16413 page",
"url": "https://www.suse.com/security/cve/CVE-2019-16413/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-17052 page",
"url": "https://www.suse.com/security/cve/CVE-2019-17052/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-17053 page",
"url": "https://www.suse.com/security/cve/CVE-2019-17053/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-17054 page",
"url": "https://www.suse.com/security/cve/CVE-2019-17054/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-17055 page",
"url": "https://www.suse.com/security/cve/CVE-2019-17055/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-17133 page",
"url": "https://www.suse.com/security/cve/CVE-2019-17133/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-9456 page",
"url": "https://www.suse.com/security/cve/CVE-2019-9456/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2019-11-13T15:19:54Z",
"generator": {
"date": "2019-11-13T15:19:54Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2019:14218-1",
"initial_release_date": "2019-11-13T15:19:54Z",
"revision_history": [
{
"date": "2019-11-13T15:19:54Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.i586",
"product": {
"name": "ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.i586",
"product_id": "ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.i586"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-pae-1.6_3.0.101_108.108-0.28.11.2.i586",
"product": {
"name": "ocfs2-kmp-pae-1.6_3.0.101_108.108-0.28.11.2.i586",
"product_id": "ocfs2-kmp-pae-1.6_3.0.101_108.108-0.28.11.2.i586"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.i586",
"product": {
"name": "ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.i586",
"product_id": "ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.i586"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.i586",
"product": {
"name": "ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.i586",
"product_id": "ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.i586"
}
},
{
"category": "product_version",
"name": "kernel-default-3.0.101-108.108.1.i586",
"product": {
"name": "kernel-default-3.0.101-108.108.1.i586",
"product_id": "kernel-default-3.0.101-108.108.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-default-base-3.0.101-108.108.1.i586",
"product": {
"name": "kernel-default-base-3.0.101-108.108.1.i586",
"product_id": "kernel-default-base-3.0.101-108.108.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-3.0.101-108.108.1.i586",
"product": {
"name": "kernel-default-devel-3.0.101-108.108.1.i586",
"product_id": "kernel-default-devel-3.0.101-108.108.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-ec2-3.0.101-108.108.1.i586",
"product": {
"name": "kernel-ec2-3.0.101-108.108.1.i586",
"product_id": "kernel-ec2-3.0.101-108.108.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-ec2-base-3.0.101-108.108.1.i586",
"product": {
"name": "kernel-ec2-base-3.0.101-108.108.1.i586",
"product_id": "kernel-ec2-base-3.0.101-108.108.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-ec2-devel-3.0.101-108.108.1.i586",
"product": {
"name": "kernel-ec2-devel-3.0.101-108.108.1.i586",
"product_id": "kernel-ec2-devel-3.0.101-108.108.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-pae-3.0.101-108.108.1.i586",
"product": {
"name": "kernel-pae-3.0.101-108.108.1.i586",
"product_id": "kernel-pae-3.0.101-108.108.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-pae-base-3.0.101-108.108.1.i586",
"product": {
"name": "kernel-pae-base-3.0.101-108.108.1.i586",
"product_id": "kernel-pae-base-3.0.101-108.108.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-pae-devel-3.0.101-108.108.1.i586",
"product": {
"name": "kernel-pae-devel-3.0.101-108.108.1.i586",
"product_id": "kernel-pae-devel-3.0.101-108.108.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-source-3.0.101-108.108.1.i586",
"product": {
"name": "kernel-source-3.0.101-108.108.1.i586",
"product_id": "kernel-source-3.0.101-108.108.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-syms-3.0.101-108.108.1.i586",
"product": {
"name": "kernel-syms-3.0.101-108.108.1.i586",
"product_id": "kernel-syms-3.0.101-108.108.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-trace-3.0.101-108.108.1.i586",
"product": {
"name": "kernel-trace-3.0.101-108.108.1.i586",
"product_id": "kernel-trace-3.0.101-108.108.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-trace-base-3.0.101-108.108.1.i586",
"product": {
"name": "kernel-trace-base-3.0.101-108.108.1.i586",
"product_id": "kernel-trace-base-3.0.101-108.108.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-trace-devel-3.0.101-108.108.1.i586",
"product": {
"name": "kernel-trace-devel-3.0.101-108.108.1.i586",
"product_id": "kernel-trace-devel-3.0.101-108.108.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-xen-3.0.101-108.108.1.i586",
"product": {
"name": "kernel-xen-3.0.101-108.108.1.i586",
"product_id": "kernel-xen-3.0.101-108.108.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-xen-base-3.0.101-108.108.1.i586",
"product": {
"name": "kernel-xen-base-3.0.101-108.108.1.i586",
"product_id": "kernel-xen-base-3.0.101-108.108.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-xen-devel-3.0.101-108.108.1.i586",
"product": {
"name": "kernel-xen-devel-3.0.101-108.108.1.i586",
"product_id": "kernel-xen-devel-3.0.101-108.108.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "ocfs2-kmp-bigmem-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"product": {
"name": "ocfs2-kmp-bigmem-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"product_id": "ocfs2-kmp-bigmem-1.6_3.0.101_108.108-0.28.11.2.ppc64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"product": {
"name": "ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"product_id": "ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.ppc64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-ppc64-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"product": {
"name": "ocfs2-kmp-ppc64-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"product_id": "ocfs2-kmp-ppc64-1.6_3.0.101_108.108-0.28.11.2.ppc64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"product": {
"name": "ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"product_id": "ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.ppc64"
}
},
{
"category": "product_version",
"name": "kernel-bigmem-3.0.101-108.108.1.ppc64",
"product": {
"name": "kernel-bigmem-3.0.101-108.108.1.ppc64",
"product_id": "kernel-bigmem-3.0.101-108.108.1.ppc64"
}
},
{
"category": "product_version",
"name": "kernel-bigmem-base-3.0.101-108.108.1.ppc64",
"product": {
"name": "kernel-bigmem-base-3.0.101-108.108.1.ppc64",
"product_id": "kernel-bigmem-base-3.0.101-108.108.1.ppc64"
}
},
{
"category": "product_version",
"name": "kernel-bigmem-devel-3.0.101-108.108.1.ppc64",
"product": {
"name": "kernel-bigmem-devel-3.0.101-108.108.1.ppc64",
"product_id": "kernel-bigmem-devel-3.0.101-108.108.1.ppc64"
}
},
{
"category": "product_version",
"name": "kernel-default-3.0.101-108.108.1.ppc64",
"product": {
"name": "kernel-default-3.0.101-108.108.1.ppc64",
"product_id": "kernel-default-3.0.101-108.108.1.ppc64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-3.0.101-108.108.1.ppc64",
"product": {
"name": "kernel-default-base-3.0.101-108.108.1.ppc64",
"product_id": "kernel-default-base-3.0.101-108.108.1.ppc64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-3.0.101-108.108.1.ppc64",
"product": {
"name": "kernel-default-devel-3.0.101-108.108.1.ppc64",
"product_id": "kernel-default-devel-3.0.101-108.108.1.ppc64"
}
},
{
"category": "product_version",
"name": "kernel-ppc64-3.0.101-108.108.1.ppc64",
"product": {
"name": "kernel-ppc64-3.0.101-108.108.1.ppc64",
"product_id": "kernel-ppc64-3.0.101-108.108.1.ppc64"
}
},
{
"category": "product_version",
"name": "kernel-ppc64-base-3.0.101-108.108.1.ppc64",
"product": {
"name": "kernel-ppc64-base-3.0.101-108.108.1.ppc64",
"product_id": "kernel-ppc64-base-3.0.101-108.108.1.ppc64"
}
},
{
"category": "product_version",
"name": "kernel-ppc64-devel-3.0.101-108.108.1.ppc64",
"product": {
"name": "kernel-ppc64-devel-3.0.101-108.108.1.ppc64",
"product_id": "kernel-ppc64-devel-3.0.101-108.108.1.ppc64"
}
},
{
"category": "product_version",
"name": "kernel-source-3.0.101-108.108.1.ppc64",
"product": {
"name": "kernel-source-3.0.101-108.108.1.ppc64",
"product_id": "kernel-source-3.0.101-108.108.1.ppc64"
}
},
{
"category": "product_version",
"name": "kernel-syms-3.0.101-108.108.1.ppc64",
"product": {
"name": "kernel-syms-3.0.101-108.108.1.ppc64",
"product_id": "kernel-syms-3.0.101-108.108.1.ppc64"
}
},
{
"category": "product_version",
"name": "kernel-trace-3.0.101-108.108.1.ppc64",
"product": {
"name": "kernel-trace-3.0.101-108.108.1.ppc64",
"product_id": "kernel-trace-3.0.101-108.108.1.ppc64"
}
},
{
"category": "product_version",
"name": "kernel-trace-base-3.0.101-108.108.1.ppc64",
"product": {
"name": "kernel-trace-base-3.0.101-108.108.1.ppc64",
"product_id": "kernel-trace-base-3.0.101-108.108.1.ppc64"
}
},
{
"category": "product_version",
"name": "kernel-trace-devel-3.0.101-108.108.1.ppc64",
"product": {
"name": "kernel-trace-devel-3.0.101-108.108.1.ppc64",
"product_id": "kernel-trace-devel-3.0.101-108.108.1.ppc64"
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.s390x",
"product": {
"name": "ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.s390x",
"product_id": "ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.s390x"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.s390x",
"product": {
"name": "ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.s390x",
"product_id": "ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-3.0.101-108.108.1.s390x",
"product": {
"name": "kernel-default-3.0.101-108.108.1.s390x",
"product_id": "kernel-default-3.0.101-108.108.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-3.0.101-108.108.1.s390x",
"product": {
"name": "kernel-default-base-3.0.101-108.108.1.s390x",
"product_id": "kernel-default-base-3.0.101-108.108.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-3.0.101-108.108.1.s390x",
"product": {
"name": "kernel-default-devel-3.0.101-108.108.1.s390x",
"product_id": "kernel-default-devel-3.0.101-108.108.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-man-3.0.101-108.108.1.s390x",
"product": {
"name": "kernel-default-man-3.0.101-108.108.1.s390x",
"product_id": "kernel-default-man-3.0.101-108.108.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-source-3.0.101-108.108.1.s390x",
"product": {
"name": "kernel-source-3.0.101-108.108.1.s390x",
"product_id": "kernel-source-3.0.101-108.108.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-3.0.101-108.108.1.s390x",
"product": {
"name": "kernel-syms-3.0.101-108.108.1.s390x",
"product_id": "kernel-syms-3.0.101-108.108.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-trace-3.0.101-108.108.1.s390x",
"product": {
"name": "kernel-trace-3.0.101-108.108.1.s390x",
"product_id": "kernel-trace-3.0.101-108.108.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-trace-base-3.0.101-108.108.1.s390x",
"product": {
"name": "kernel-trace-base-3.0.101-108.108.1.s390x",
"product_id": "kernel-trace-base-3.0.101-108.108.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-trace-devel-3.0.101-108.108.1.s390x",
"product": {
"name": "kernel-trace-devel-3.0.101-108.108.1.s390x",
"product_id": "kernel-trace-devel-3.0.101-108.108.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"product": {
"name": "ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"product_id": "ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"product": {
"name": "ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"product_id": "ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"product": {
"name": "ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"product_id": "ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-3.0.101-108.108.1.x86_64",
"product": {
"name": "kernel-default-3.0.101-108.108.1.x86_64",
"product_id": "kernel-default-3.0.101-108.108.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-3.0.101-108.108.1.x86_64",
"product": {
"name": "kernel-default-base-3.0.101-108.108.1.x86_64",
"product_id": "kernel-default-base-3.0.101-108.108.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-3.0.101-108.108.1.x86_64",
"product": {
"name": "kernel-default-devel-3.0.101-108.108.1.x86_64",
"product_id": "kernel-default-devel-3.0.101-108.108.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-ec2-3.0.101-108.108.1.x86_64",
"product": {
"name": "kernel-ec2-3.0.101-108.108.1.x86_64",
"product_id": "kernel-ec2-3.0.101-108.108.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-ec2-base-3.0.101-108.108.1.x86_64",
"product": {
"name": "kernel-ec2-base-3.0.101-108.108.1.x86_64",
"product_id": "kernel-ec2-base-3.0.101-108.108.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-ec2-devel-3.0.101-108.108.1.x86_64",
"product": {
"name": "kernel-ec2-devel-3.0.101-108.108.1.x86_64",
"product_id": "kernel-ec2-devel-3.0.101-108.108.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-source-3.0.101-108.108.1.x86_64",
"product": {
"name": "kernel-source-3.0.101-108.108.1.x86_64",
"product_id": "kernel-source-3.0.101-108.108.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-3.0.101-108.108.1.x86_64",
"product": {
"name": "kernel-syms-3.0.101-108.108.1.x86_64",
"product_id": "kernel-syms-3.0.101-108.108.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-trace-3.0.101-108.108.1.x86_64",
"product": {
"name": "kernel-trace-3.0.101-108.108.1.x86_64",
"product_id": "kernel-trace-3.0.101-108.108.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-trace-base-3.0.101-108.108.1.x86_64",
"product": {
"name": "kernel-trace-base-3.0.101-108.108.1.x86_64",
"product_id": "kernel-trace-base-3.0.101-108.108.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-trace-devel-3.0.101-108.108.1.x86_64",
"product": {
"name": "kernel-trace-devel-3.0.101-108.108.1.x86_64",
"product_id": "kernel-trace-devel-3.0.101-108.108.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-xen-3.0.101-108.108.1.x86_64",
"product": {
"name": "kernel-xen-3.0.101-108.108.1.x86_64",
"product_id": "kernel-xen-3.0.101-108.108.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-xen-base-3.0.101-108.108.1.x86_64",
"product": {
"name": "kernel-xen-base-3.0.101-108.108.1.x86_64",
"product_id": "kernel-xen-base-3.0.101-108.108.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-xen-devel-3.0.101-108.108.1.x86_64",
"product": {
"name": "kernel-xen-devel-3.0.101-108.108.1.x86_64",
"product_id": "kernel-xen-devel-3.0.101-108.108.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Availability Extension 11 SP4",
"product": {
"name": "SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_identification_helper": {
"cpe": "cpe:/a:suse:sle-hae:11:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 11 SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_sles:11:sp4"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-bigmem-1.6_3.0.101_108.108-0.28.11.2.ppc64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-bigmem-1.6_3.0.101_108.108-0.28.11.2.ppc64"
},
"product_reference": "ocfs2-kmp-bigmem-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.i586 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.i586"
},
"product_reference": "ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.i586",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.ppc64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.ppc64"
},
"product_reference": "ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.s390x as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.s390x"
},
"product_reference": "ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.x86_64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.x86_64"
},
"product_reference": "ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-pae-1.6_3.0.101_108.108-0.28.11.2.i586 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-pae-1.6_3.0.101_108.108-0.28.11.2.i586"
},
"product_reference": "ocfs2-kmp-pae-1.6_3.0.101_108.108-0.28.11.2.i586",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-ppc64-1.6_3.0.101_108.108-0.28.11.2.ppc64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-ppc64-1.6_3.0.101_108.108-0.28.11.2.ppc64"
},
"product_reference": "ocfs2-kmp-ppc64-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.i586 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.i586"
},
"product_reference": "ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.i586",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.ppc64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.ppc64"
},
"product_reference": "ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.s390x as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.s390x"
},
"product_reference": "ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.x86_64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.x86_64"
},
"product_reference": "ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.i586 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.i586"
},
"product_reference": "ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.i586",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.x86_64 as component of SUSE Linux Enterprise High Availability Extension 11 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.x86_64"
},
"product_reference": "ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 11 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bigmem-3.0.101-108.108.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.108.1.ppc64"
},
"product_reference": "kernel-bigmem-3.0.101-108.108.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bigmem-base-3.0.101-108.108.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.108.1.ppc64"
},
"product_reference": "kernel-bigmem-base-3.0.101-108.108.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bigmem-devel-3.0.101-108.108.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.108.1.ppc64"
},
"product_reference": "kernel-bigmem-devel-3.0.101-108.108.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.0.101-108.108.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.i586"
},
"product_reference": "kernel-default-3.0.101-108.108.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.0.101-108.108.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.ppc64"
},
"product_reference": "kernel-default-3.0.101-108.108.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.0.101-108.108.1.s390x as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.s390x"
},
"product_reference": "kernel-default-3.0.101-108.108.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.0.101-108.108.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.x86_64"
},
"product_reference": "kernel-default-3.0.101-108.108.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.0.101-108.108.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.i586"
},
"product_reference": "kernel-default-base-3.0.101-108.108.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.0.101-108.108.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.ppc64"
},
"product_reference": "kernel-default-base-3.0.101-108.108.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.0.101-108.108.1.s390x as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.s390x"
},
"product_reference": "kernel-default-base-3.0.101-108.108.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.0.101-108.108.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.x86_64"
},
"product_reference": "kernel-default-base-3.0.101-108.108.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.0.101-108.108.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.i586"
},
"product_reference": "kernel-default-devel-3.0.101-108.108.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.0.101-108.108.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.ppc64"
},
"product_reference": "kernel-default-devel-3.0.101-108.108.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.0.101-108.108.1.s390x as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.s390x"
},
"product_reference": "kernel-default-devel-3.0.101-108.108.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.0.101-108.108.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.x86_64"
},
"product_reference": "kernel-default-devel-3.0.101-108.108.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-3.0.101-108.108.1.s390x as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.108.1.s390x"
},
"product_reference": "kernel-default-man-3.0.101-108.108.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-3.0.101-108.108.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.i586"
},
"product_reference": "kernel-ec2-3.0.101-108.108.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-3.0.101-108.108.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.x86_64"
},
"product_reference": "kernel-ec2-3.0.101-108.108.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-base-3.0.101-108.108.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.i586"
},
"product_reference": "kernel-ec2-base-3.0.101-108.108.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-base-3.0.101-108.108.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.x86_64"
},
"product_reference": "kernel-ec2-base-3.0.101-108.108.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-devel-3.0.101-108.108.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.i586"
},
"product_reference": "kernel-ec2-devel-3.0.101-108.108.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-devel-3.0.101-108.108.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.x86_64"
},
"product_reference": "kernel-ec2-devel-3.0.101-108.108.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-pae-3.0.101-108.108.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.108.1.i586"
},
"product_reference": "kernel-pae-3.0.101-108.108.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-pae-base-3.0.101-108.108.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.108.1.i586"
},
"product_reference": "kernel-pae-base-3.0.101-108.108.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-pae-devel-3.0.101-108.108.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.108.1.i586"
},
"product_reference": "kernel-pae-devel-3.0.101-108.108.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ppc64-3.0.101-108.108.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.108.1.ppc64"
},
"product_reference": "kernel-ppc64-3.0.101-108.108.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ppc64-base-3.0.101-108.108.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.108.1.ppc64"
},
"product_reference": "kernel-ppc64-base-3.0.101-108.108.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ppc64-devel-3.0.101-108.108.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.108.1.ppc64"
},
"product_reference": "kernel-ppc64-devel-3.0.101-108.108.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-3.0.101-108.108.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.i586"
},
"product_reference": "kernel-source-3.0.101-108.108.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-3.0.101-108.108.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.ppc64"
},
"product_reference": "kernel-source-3.0.101-108.108.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-3.0.101-108.108.1.s390x as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.s390x"
},
"product_reference": "kernel-source-3.0.101-108.108.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-3.0.101-108.108.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.x86_64"
},
"product_reference": "kernel-source-3.0.101-108.108.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.0.101-108.108.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.i586"
},
"product_reference": "kernel-syms-3.0.101-108.108.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.0.101-108.108.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.ppc64"
},
"product_reference": "kernel-syms-3.0.101-108.108.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.0.101-108.108.1.s390x as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.s390x"
},
"product_reference": "kernel-syms-3.0.101-108.108.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.0.101-108.108.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.x86_64"
},
"product_reference": "kernel-syms-3.0.101-108.108.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-3.0.101-108.108.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.i586"
},
"product_reference": "kernel-trace-3.0.101-108.108.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-3.0.101-108.108.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.ppc64"
},
"product_reference": "kernel-trace-3.0.101-108.108.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-3.0.101-108.108.1.s390x as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.s390x"
},
"product_reference": "kernel-trace-3.0.101-108.108.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-3.0.101-108.108.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.x86_64"
},
"product_reference": "kernel-trace-3.0.101-108.108.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-base-3.0.101-108.108.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.i586"
},
"product_reference": "kernel-trace-base-3.0.101-108.108.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-base-3.0.101-108.108.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.ppc64"
},
"product_reference": "kernel-trace-base-3.0.101-108.108.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-base-3.0.101-108.108.1.s390x as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.s390x"
},
"product_reference": "kernel-trace-base-3.0.101-108.108.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-base-3.0.101-108.108.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.x86_64"
},
"product_reference": "kernel-trace-base-3.0.101-108.108.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-devel-3.0.101-108.108.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.i586"
},
"product_reference": "kernel-trace-devel-3.0.101-108.108.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-devel-3.0.101-108.108.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.ppc64"
},
"product_reference": "kernel-trace-devel-3.0.101-108.108.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-devel-3.0.101-108.108.1.s390x as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.s390x"
},
"product_reference": "kernel-trace-devel-3.0.101-108.108.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-devel-3.0.101-108.108.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.x86_64"
},
"product_reference": "kernel-trace-devel-3.0.101-108.108.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-3.0.101-108.108.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.i586"
},
"product_reference": "kernel-xen-3.0.101-108.108.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-3.0.101-108.108.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.x86_64"
},
"product_reference": "kernel-xen-3.0.101-108.108.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-base-3.0.101-108.108.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.i586"
},
"product_reference": "kernel-xen-base-3.0.101-108.108.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-base-3.0.101-108.108.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.x86_64"
},
"product_reference": "kernel-xen-base-3.0.101-108.108.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-3.0.101-108.108.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.i586"
},
"product_reference": "kernel-xen-devel-3.0.101-108.108.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-3.0.101-108.108.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.x86_64"
},
"product_reference": "kernel-xen-devel-3.0.101-108.108.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-18509",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-18509"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in net/ipv6/ip6mr.c in the Linux kernel before 4.11. By setting a specific socket option, an attacker can control a pointer in kernel land and cause an inet_csk_listen_stop general protection fault, or potentially execute arbitrary code under certain circumstances. The issue can be triggered as root (e.g., inside a default LXC container or with the CAP_NET_ADMIN capability) or after namespace unsharing. This occurs because sk_type and protocol are not checked in the appropriate part of the ip6_mroute_* functions. NOTE: this affects Linux distributions that use 4.9.x longterm kernels before 4.9.187.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-bigmem-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-pae-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-ppc64-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-18509",
"url": "https://www.suse.com/security/cve/CVE-2017-18509"
},
{
"category": "external",
"summary": "SUSE Bug 1145477 for CVE-2017-18509",
"url": "https://bugzilla.suse.com/1145477"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-bigmem-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-pae-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-ppc64-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-bigmem-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-pae-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-ppc64-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-13T15:19:54Z",
"details": "moderate"
}
],
"title": "CVE-2017-18509"
},
{
"cve": "CVE-2017-18551",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-18551"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in drivers/i2c/i2c-core-smbus.c in the Linux kernel before 4.14.15. There is an out of bounds write in the function i2c_smbus_xfer_emulated.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-bigmem-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-pae-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-ppc64-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-18551",
"url": "https://www.suse.com/security/cve/CVE-2017-18551"
},
{
"category": "external",
"summary": "SUSE Bug 1146163 for CVE-2017-18551",
"url": "https://bugzilla.suse.com/1146163"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-bigmem-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-pae-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-ppc64-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-bigmem-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-pae-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-ppc64-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-13T15:19:54Z",
"details": "moderate"
}
],
"title": "CVE-2017-18551"
},
{
"cve": "CVE-2018-12207",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-12207"
}
],
"notes": [
{
"category": "general",
"text": "Improper invalidation for page table updates by a virtual guest operating system for multiple Intel(R) Processors may allow an authenticated user to potentially enable denial of service of the host system via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-bigmem-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-pae-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-ppc64-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-12207",
"url": "https://www.suse.com/security/cve/CVE-2018-12207"
},
{
"category": "external",
"summary": "SUSE Bug 1117665 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1117665"
},
{
"category": "external",
"summary": "SUSE Bug 1139073 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1139073"
},
{
"category": "external",
"summary": "SUSE Bug 1152505 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1152505"
},
{
"category": "external",
"summary": "SUSE Bug 1155812 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1155812"
},
{
"category": "external",
"summary": "SUSE Bug 1155817 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1155817"
},
{
"category": "external",
"summary": "SUSE Bug 1155945 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1155945"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1201877"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-bigmem-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-pae-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-ppc64-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-bigmem-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-pae-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-ppc64-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-13T15:19:54Z",
"details": "moderate"
}
],
"title": "CVE-2018-12207"
},
{
"cve": "CVE-2018-20976",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-20976"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in fs/xfs/xfs_super.c in the Linux kernel before 4.18. A use after free exists, related to xfs_fs_fill_super failure.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-bigmem-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-pae-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-ppc64-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-20976",
"url": "https://www.suse.com/security/cve/CVE-2018-20976"
},
{
"category": "external",
"summary": "SUSE Bug 1146285 for CVE-2018-20976",
"url": "https://bugzilla.suse.com/1146285"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-bigmem-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-pae-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-ppc64-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-bigmem-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-pae-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-ppc64-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-13T15:19:54Z",
"details": "moderate"
}
],
"title": "CVE-2018-20976"
},
{
"cve": "CVE-2019-10220",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-10220"
}
],
"notes": [
{
"category": "general",
"text": "Linux kernel CIFS implementation, version 4.9.0 is vulnerable to a relative paths injection in directory entry lists.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-bigmem-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-pae-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-ppc64-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-10220",
"url": "https://www.suse.com/security/cve/CVE-2019-10220"
},
{
"category": "external",
"summary": "SUSE Bug 1144903 for CVE-2019-10220",
"url": "https://bugzilla.suse.com/1144903"
},
{
"category": "external",
"summary": "SUSE Bug 1153108 for CVE-2019-10220",
"url": "https://bugzilla.suse.com/1153108"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-bigmem-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-pae-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-ppc64-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-bigmem-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-pae-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-ppc64-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-13T15:19:54Z",
"details": "important"
}
],
"title": "CVE-2019-10220"
},
{
"cve": "CVE-2019-11135",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11135"
}
],
"notes": [
{
"category": "general",
"text": "TSX Asynchronous Abort condition on some CPUs utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-bigmem-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-pae-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-ppc64-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11135",
"url": "https://www.suse.com/security/cve/CVE-2019-11135"
},
{
"category": "external",
"summary": "SUSE Bug 1139073 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1139073"
},
{
"category": "external",
"summary": "SUSE Bug 1152497 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1152497"
},
{
"category": "external",
"summary": "SUSE Bug 1152505 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1152505"
},
{
"category": "external",
"summary": "SUSE Bug 1152506 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1152506"
},
{
"category": "external",
"summary": "SUSE Bug 1160120 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1160120"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1201877"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-bigmem-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-pae-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-ppc64-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-bigmem-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-pae-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-ppc64-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-13T15:19:54Z",
"details": "moderate"
}
],
"title": "CVE-2019-11135"
},
{
"cve": "CVE-2019-14821",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-14821"
}
],
"notes": [
{
"category": "general",
"text": "An out-of-bounds access issue was found in the Linux kernel, all versions through 5.3, in the way Linux kernel\u0027s KVM hypervisor implements the Coalesced MMIO write operation. It operates on an MMIO ring buffer \u0027struct kvm_coalesced_mmio\u0027 object, wherein write indices \u0027ring-\u003efirst\u0027 and \u0027ring-\u003elast\u0027 value could be supplied by a host user-space process. An unprivileged host user or process with access to \u0027/dev/kvm\u0027 device could use this flaw to crash the host kernel, resulting in a denial of service or potentially escalating privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-bigmem-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-pae-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-ppc64-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-14821",
"url": "https://www.suse.com/security/cve/CVE-2019-14821"
},
{
"category": "external",
"summary": "SUSE Bug 1151350 for CVE-2019-14821",
"url": "https://bugzilla.suse.com/1151350"
},
{
"category": "external",
"summary": "SUSE Bug 1218966 for CVE-2019-14821",
"url": "https://bugzilla.suse.com/1218966"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-bigmem-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-pae-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-ppc64-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-bigmem-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-pae-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-ppc64-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-13T15:19:54Z",
"details": "moderate"
}
],
"title": "CVE-2019-14821"
},
{
"cve": "CVE-2019-14835",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-14835"
}
],
"notes": [
{
"category": "general",
"text": "A buffer overflow flaw was found, in versions from 2.6.34 to 5.2.x, in the way Linux kernel\u0027s vhost functionality that translates virtqueue buffers to IOVs, logged the buffer descriptors during migration. A privileged guest user able to pass descriptors with invalid length to the host when migration is underway, could use this flaw to increase their privileges on the host.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-bigmem-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-pae-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-ppc64-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-14835",
"url": "https://www.suse.com/security/cve/CVE-2019-14835"
},
{
"category": "external",
"summary": "SUSE Bug 1150112 for CVE-2019-14835",
"url": "https://bugzilla.suse.com/1150112"
},
{
"category": "external",
"summary": "SUSE Bug 1151021 for CVE-2019-14835",
"url": "https://bugzilla.suse.com/1151021"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-bigmem-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-pae-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-ppc64-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-bigmem-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-pae-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-ppc64-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-13T15:19:54Z",
"details": "important"
}
],
"title": "CVE-2019-14835"
},
{
"cve": "CVE-2019-15118",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15118"
}
],
"notes": [
{
"category": "general",
"text": "check_input_term in sound/usb/mixer.c in the Linux kernel through 5.2.9 mishandles recursion, leading to kernel stack exhaustion.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-bigmem-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-pae-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-ppc64-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15118",
"url": "https://www.suse.com/security/cve/CVE-2019-15118"
},
{
"category": "external",
"summary": "SUSE Bug 1145922 for CVE-2019-15118",
"url": "https://bugzilla.suse.com/1145922"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-bigmem-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-pae-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-ppc64-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-bigmem-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-pae-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-ppc64-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-13T15:19:54Z",
"details": "moderate"
}
],
"title": "CVE-2019-15118"
},
{
"cve": "CVE-2019-15212",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15212"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.1.8. There is a double-free caused by a malicious USB device in the drivers/usb/misc/rio500.c driver.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-bigmem-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-pae-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-ppc64-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15212",
"url": "https://www.suse.com/security/cve/CVE-2019-15212"
},
{
"category": "external",
"summary": "SUSE Bug 1146391 for CVE-2019-15212",
"url": "https://bugzilla.suse.com/1146391"
},
{
"category": "external",
"summary": "SUSE Bug 1146519 for CVE-2019-15212",
"url": "https://bugzilla.suse.com/1146519"
},
{
"category": "external",
"summary": "SUSE Bug 1158381 for CVE-2019-15212",
"url": "https://bugzilla.suse.com/1158381"
},
{
"category": "external",
"summary": "SUSE Bug 1158834 for CVE-2019-15212",
"url": "https://bugzilla.suse.com/1158834"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-bigmem-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-pae-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-ppc64-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-bigmem-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-pae-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-ppc64-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-13T15:19:54Z",
"details": "moderate"
}
],
"title": "CVE-2019-15212"
},
{
"cve": "CVE-2019-15216",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15216"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.0.14. There is a NULL pointer dereference caused by a malicious USB device in the drivers/usb/misc/yurex.c driver.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-bigmem-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-pae-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-ppc64-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15216",
"url": "https://www.suse.com/security/cve/CVE-2019-15216"
},
{
"category": "external",
"summary": "SUSE Bug 1146361 for CVE-2019-15216",
"url": "https://bugzilla.suse.com/1146361"
},
{
"category": "external",
"summary": "SUSE Bug 1146519 for CVE-2019-15216",
"url": "https://bugzilla.suse.com/1146519"
},
{
"category": "external",
"summary": "SUSE Bug 1158381 for CVE-2019-15216",
"url": "https://bugzilla.suse.com/1158381"
},
{
"category": "external",
"summary": "SUSE Bug 1158834 for CVE-2019-15216",
"url": "https://bugzilla.suse.com/1158834"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-bigmem-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-pae-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-ppc64-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-bigmem-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-pae-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-ppc64-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-13T15:19:54Z",
"details": "moderate"
}
],
"title": "CVE-2019-15216"
},
{
"cve": "CVE-2019-15217",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15217"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.2.3. There is a NULL pointer dereference caused by a malicious USB device in the drivers/media/usb/zr364xx/zr364xx.c driver.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-bigmem-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-pae-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-ppc64-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15217",
"url": "https://www.suse.com/security/cve/CVE-2019-15217"
},
{
"category": "external",
"summary": "SUSE Bug 1146519 for CVE-2019-15217",
"url": "https://bugzilla.suse.com/1146519"
},
{
"category": "external",
"summary": "SUSE Bug 1146547 for CVE-2019-15217",
"url": "https://bugzilla.suse.com/1146547"
},
{
"category": "external",
"summary": "SUSE Bug 1158381 for CVE-2019-15217",
"url": "https://bugzilla.suse.com/1158381"
},
{
"category": "external",
"summary": "SUSE Bug 1158834 for CVE-2019-15217",
"url": "https://bugzilla.suse.com/1158834"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-bigmem-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-pae-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-ppc64-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-bigmem-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-pae-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-ppc64-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-13T15:19:54Z",
"details": "moderate"
}
],
"title": "CVE-2019-15217"
},
{
"cve": "CVE-2019-15219",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15219"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.1.8. There is a NULL pointer dereference caused by a malicious USB device in the drivers/usb/misc/sisusbvga/sisusb.c driver.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-bigmem-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-pae-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-ppc64-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15219",
"url": "https://www.suse.com/security/cve/CVE-2019-15219"
},
{
"category": "external",
"summary": "SUSE Bug 1146519 for CVE-2019-15219",
"url": "https://bugzilla.suse.com/1146519"
},
{
"category": "external",
"summary": "SUSE Bug 1146524 for CVE-2019-15219",
"url": "https://bugzilla.suse.com/1146524"
},
{
"category": "external",
"summary": "SUSE Bug 1158381 for CVE-2019-15219",
"url": "https://bugzilla.suse.com/1158381"
},
{
"category": "external",
"summary": "SUSE Bug 1158834 for CVE-2019-15219",
"url": "https://bugzilla.suse.com/1158834"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-bigmem-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-pae-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-ppc64-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-bigmem-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-pae-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-ppc64-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-13T15:19:54Z",
"details": "moderate"
}
],
"title": "CVE-2019-15219"
},
{
"cve": "CVE-2019-15291",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15291"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 5.2.9. There is a NULL pointer dereference caused by a malicious USB device in the flexcop_usb_probe function in the drivers/media/usb/b2c2/flexcop-usb.c driver.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-bigmem-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-pae-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-ppc64-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15291",
"url": "https://www.suse.com/security/cve/CVE-2019-15291"
},
{
"category": "external",
"summary": "SUSE Bug 1146519 for CVE-2019-15291",
"url": "https://bugzilla.suse.com/1146519"
},
{
"category": "external",
"summary": "SUSE Bug 1146540 for CVE-2019-15291",
"url": "https://bugzilla.suse.com/1146540"
},
{
"category": "external",
"summary": "SUSE Bug 1158381 for CVE-2019-15291",
"url": "https://bugzilla.suse.com/1158381"
},
{
"category": "external",
"summary": "SUSE Bug 1158834 for CVE-2019-15291",
"url": "https://bugzilla.suse.com/1158834"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-bigmem-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-pae-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-ppc64-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-bigmem-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-pae-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-ppc64-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-13T15:19:54Z",
"details": "moderate"
}
],
"title": "CVE-2019-15291"
},
{
"cve": "CVE-2019-15292",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15292"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.0.9. There is a use-after-free in atalk_proc_exit, related to net/appletalk/atalk_proc.c, net/appletalk/ddp.c, and net/appletalk/sysctl_net_atalk.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-bigmem-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-pae-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-ppc64-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15292",
"url": "https://www.suse.com/security/cve/CVE-2019-15292"
},
{
"category": "external",
"summary": "SUSE Bug 1146678 for CVE-2019-15292",
"url": "https://bugzilla.suse.com/1146678"
},
{
"category": "external",
"summary": "SUSE Bug 1173939 for CVE-2019-15292",
"url": "https://bugzilla.suse.com/1173939"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-bigmem-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-pae-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-ppc64-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-bigmem-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-pae-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-ppc64-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-13T15:19:54Z",
"details": "important"
}
],
"title": "CVE-2019-15292"
},
{
"cve": "CVE-2019-15505",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15505"
}
],
"notes": [
{
"category": "general",
"text": "drivers/media/usb/dvb-usb/technisat-usb2.c in the Linux kernel through 5.2.9 has an out-of-bounds read via crafted USB device traffic (which may be remote via usbip or usbredir).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-bigmem-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-pae-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-ppc64-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15505",
"url": "https://www.suse.com/security/cve/CVE-2019-15505"
},
{
"category": "external",
"summary": "SUSE Bug 1147122 for CVE-2019-15505",
"url": "https://bugzilla.suse.com/1147122"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-bigmem-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-pae-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-ppc64-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-bigmem-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-pae-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-ppc64-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-13T15:19:54Z",
"details": "moderate"
}
],
"title": "CVE-2019-15505"
},
{
"cve": "CVE-2019-15807",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15807"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel before 5.1.13, there is a memory leak in drivers/scsi/libsas/sas_expander.c when SAS expander discovery fails. This will cause a BUG and denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-bigmem-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-pae-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-ppc64-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15807",
"url": "https://www.suse.com/security/cve/CVE-2019-15807"
},
{
"category": "external",
"summary": "SUSE Bug 1148938 for CVE-2019-15807",
"url": "https://bugzilla.suse.com/1148938"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-bigmem-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-pae-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-ppc64-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-bigmem-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-pae-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-ppc64-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-13T15:19:54Z",
"details": "moderate"
}
],
"title": "CVE-2019-15807"
},
{
"cve": "CVE-2019-15902",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15902"
}
],
"notes": [
{
"category": "general",
"text": "A backporting error was discovered in the Linux stable/longterm kernel 4.4.x through 4.4.190, 4.9.x through 4.9.190, 4.14.x through 4.14.141, 4.19.x through 4.19.69, and 5.2.x through 5.2.11. Misuse of the upstream \"x86/ptrace: Fix possible spectre-v1 in ptrace_get_debugreg()\" commit reintroduced the Spectre vulnerability that it aimed to eliminate. This occurred because the backport process depends on cherry picking specific commits, and because two (correctly ordered) code lines were swapped.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-bigmem-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-pae-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-ppc64-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15902",
"url": "https://www.suse.com/security/cve/CVE-2019-15902"
},
{
"category": "external",
"summary": "SUSE Bug 1149376 for CVE-2019-15902",
"url": "https://bugzilla.suse.com/1149376"
},
{
"category": "external",
"summary": "SUSE Bug 1155131 for CVE-2019-15902",
"url": "https://bugzilla.suse.com/1155131"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-bigmem-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-pae-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-ppc64-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-bigmem-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-pae-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-ppc64-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-13T15:19:54Z",
"details": "moderate"
}
],
"title": "CVE-2019-15902"
},
{
"cve": "CVE-2019-15927",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15927"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 4.20.2. An out-of-bounds access exists in the function build_audio_procunit in the file sound/usb/mixer.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-bigmem-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-pae-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-ppc64-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15927",
"url": "https://www.suse.com/security/cve/CVE-2019-15927"
},
{
"category": "external",
"summary": "SUSE Bug 1149522 for CVE-2019-15927",
"url": "https://bugzilla.suse.com/1149522"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-bigmem-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-pae-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-ppc64-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-bigmem-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-pae-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-ppc64-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-13T15:19:54Z",
"details": "moderate"
}
],
"title": "CVE-2019-15927"
},
{
"cve": "CVE-2019-16232",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-16232"
}
],
"notes": [
{
"category": "general",
"text": "drivers/net/wireless/marvell/libertas/if_sdio.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-bigmem-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-pae-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-ppc64-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-16232",
"url": "https://www.suse.com/security/cve/CVE-2019-16232"
},
{
"category": "external",
"summary": "SUSE Bug 1150465 for CVE-2019-16232",
"url": "https://bugzilla.suse.com/1150465"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-bigmem-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-pae-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-ppc64-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-bigmem-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-pae-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-ppc64-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-13T15:19:54Z",
"details": "low"
}
],
"title": "CVE-2019-16232"
},
{
"cve": "CVE-2019-16233",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-16233"
}
],
"notes": [
{
"category": "general",
"text": "drivers/scsi/qla2xxx/qla_os.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-bigmem-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-pae-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-ppc64-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-16233",
"url": "https://www.suse.com/security/cve/CVE-2019-16233"
},
{
"category": "external",
"summary": "SUSE Bug 1150457 for CVE-2019-16233",
"url": "https://bugzilla.suse.com/1150457"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-bigmem-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-pae-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-ppc64-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-bigmem-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-pae-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-ppc64-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-13T15:19:54Z",
"details": "low"
}
],
"title": "CVE-2019-16233"
},
{
"cve": "CVE-2019-16234",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-16234"
}
],
"notes": [
{
"category": "general",
"text": "drivers/net/wireless/intel/iwlwifi/pcie/trans.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-bigmem-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-pae-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-ppc64-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-16234",
"url": "https://www.suse.com/security/cve/CVE-2019-16234"
},
{
"category": "external",
"summary": "SUSE Bug 1150452 for CVE-2019-16234",
"url": "https://bugzilla.suse.com/1150452"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-bigmem-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-pae-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-ppc64-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-bigmem-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-pae-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-ppc64-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-13T15:19:54Z",
"details": "low"
}
],
"title": "CVE-2019-16234"
},
{
"cve": "CVE-2019-16413",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-16413"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.0.4. The 9p filesystem did not protect i_size_write() properly, which causes an i_size_read() infinite loop and denial of service on SMP systems.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-bigmem-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-pae-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-ppc64-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-16413",
"url": "https://www.suse.com/security/cve/CVE-2019-16413"
},
{
"category": "external",
"summary": "SUSE Bug 1151347 for CVE-2019-16413",
"url": "https://bugzilla.suse.com/1151347"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-bigmem-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-pae-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-ppc64-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-bigmem-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-pae-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-ppc64-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-13T15:19:54Z",
"details": "moderate"
}
],
"title": "CVE-2019-16413"
},
{
"cve": "CVE-2019-17052",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-17052"
}
],
"notes": [
{
"category": "general",
"text": "ax25_create in net/ax25/af_ax25.c in the AF_AX25 network module in the Linux kernel 3.16 through 5.3.2 does not enforce CAP_NET_RAW, which means that unprivileged users can create a raw socket, aka CID-0614e2b73768.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-bigmem-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-pae-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-ppc64-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-17052",
"url": "https://www.suse.com/security/cve/CVE-2019-17052"
},
{
"category": "external",
"summary": "SUSE Bug 1152779 for CVE-2019-17052",
"url": "https://bugzilla.suse.com/1152779"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-bigmem-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-pae-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-ppc64-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-bigmem-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-pae-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-ppc64-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-13T15:19:54Z",
"details": "moderate"
}
],
"title": "CVE-2019-17052"
},
{
"cve": "CVE-2019-17053",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-17053"
}
],
"notes": [
{
"category": "general",
"text": "ieee802154_create in net/ieee802154/socket.c in the AF_IEEE802154 network module in the Linux kernel through 5.3.2 does not enforce CAP_NET_RAW, which means that unprivileged users can create a raw socket, aka CID-e69dbd4619e7.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-bigmem-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-pae-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-ppc64-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-17053",
"url": "https://www.suse.com/security/cve/CVE-2019-17053"
},
{
"category": "external",
"summary": "SUSE Bug 1152789 for CVE-2019-17053",
"url": "https://bugzilla.suse.com/1152789"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-bigmem-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-pae-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-ppc64-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-bigmem-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-pae-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-ppc64-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-13T15:19:54Z",
"details": "low"
}
],
"title": "CVE-2019-17053"
},
{
"cve": "CVE-2019-17054",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-17054"
}
],
"notes": [
{
"category": "general",
"text": "atalk_create in net/appletalk/ddp.c in the AF_APPLETALK network module in the Linux kernel through 5.3.2 does not enforce CAP_NET_RAW, which means that unprivileged users can create a raw socket, aka CID-6cc03e8aa36c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-bigmem-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-pae-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-ppc64-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-17054",
"url": "https://www.suse.com/security/cve/CVE-2019-17054"
},
{
"category": "external",
"summary": "SUSE Bug 1152786 for CVE-2019-17054",
"url": "https://bugzilla.suse.com/1152786"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-bigmem-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-pae-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-ppc64-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-bigmem-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-pae-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-ppc64-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-13T15:19:54Z",
"details": "low"
}
],
"title": "CVE-2019-17054"
},
{
"cve": "CVE-2019-17055",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-17055"
}
],
"notes": [
{
"category": "general",
"text": "base_sock_create in drivers/isdn/mISDN/socket.c in the AF_ISDN network module in the Linux kernel through 5.3.2 does not enforce CAP_NET_RAW, which means that unprivileged users can create a raw socket, aka CID-b91ee4aa2a21.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-bigmem-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-pae-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-ppc64-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-17055",
"url": "https://www.suse.com/security/cve/CVE-2019-17055"
},
{
"category": "external",
"summary": "SUSE Bug 1152782 for CVE-2019-17055",
"url": "https://bugzilla.suse.com/1152782"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-bigmem-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-pae-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-ppc64-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-bigmem-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-pae-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-ppc64-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-13T15:19:54Z",
"details": "low"
}
],
"title": "CVE-2019-17055"
},
{
"cve": "CVE-2019-17133",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-17133"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel through 5.3.2, cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c does not reject a long SSID IE, leading to a Buffer Overflow.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-bigmem-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-pae-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-ppc64-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-17133",
"url": "https://www.suse.com/security/cve/CVE-2019-17133"
},
{
"category": "external",
"summary": "SUSE Bug 1153158 for CVE-2019-17133",
"url": "https://bugzilla.suse.com/1153158"
},
{
"category": "external",
"summary": "SUSE Bug 1153161 for CVE-2019-17133",
"url": "https://bugzilla.suse.com/1153161"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-bigmem-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-pae-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-ppc64-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-bigmem-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-pae-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-ppc64-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-13T15:19:54Z",
"details": "important"
}
],
"title": "CVE-2019-17133"
},
{
"cve": "CVE-2019-9456",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-9456"
}
],
"notes": [
{
"category": "general",
"text": "In the Android kernel in Pixel C USB monitor driver there is a possible OOB write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-bigmem-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-pae-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-ppc64-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-9456",
"url": "https://www.suse.com/security/cve/CVE-2019-9456"
},
{
"category": "external",
"summary": "SUSE Bug 1150025 for CVE-2019-9456",
"url": "https://bugzilla.suse.com/1150025"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-bigmem-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-pae-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-ppc64-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-bigmem-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-default-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-pae-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-ppc64-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.ppc64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.s390x",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-trace-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.i586",
"SUSE Linux Enterprise High Availability Extension 11 SP4:ocfs2-kmp-xen-1.6_3.0.101_108.108-0.28.11.2.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.108.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.108.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-13T15:19:54Z",
"details": "moderate"
}
],
"title": "CVE-2019-9456"
}
]
}
suse-su-2019:2949-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\nThe SUSE Linux Enterprise 12-SP3 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2018-12207: Untrusted virtual machines on Intel CPUs could exploit a race\n condition in the Instruction Fetch Unit of the Intel CPU to cause a Machine\n Exception during Page Size Change, causing the CPU core to be non-functional.\n\n The Linux Kernel kvm hypervisor was adjusted to avoid page size changes in\n executable pages by splitting / merging huge pages into small pages as\n needed. More information can be found on https://www.suse.com/support/kb/doc/?id=7023735\n\n- CVE-2019-16995: Fix a memory leak in hsr_dev_finalize() if hsr_add_port\n failed to add a port, which may have caused denial of service (bsc#1152685).\n\n- CVE-2019-11135: Aborting an asynchronous TSX operation on Intel CPUs with\n Transactional Memory support could be used to facilitate sidechannel\n information leaks out of microarchitectural buffers, similar to the\n previously described \u0027Microarchitectural Data Sampling\u0027 attack.\n\n The Linux kernel was supplemented with the option to disable TSX operation\n altogether (requiring CPU Microcode updates on older systems) and better\n flushing of microarchitectural buffers (VERW).\n\n The set of options available is described in our TID at https://www.suse.com/support/kb/doc/?id=7024251\n\n- CVE-2019-16233: drivers/scsi/qla2xxx/qla_os.c did not check the\n alloc_workqueue return value, leading to a NULL pointer dereference.\n (bsc#1150457).\n\n- CVE-2019-10220: Added sanity checks on the pathnames passed to the user\n space. (bsc#1144903).\n\n- CVE-2019-17666: rtlwifi: Fix potential overflow in P2P code (bsc#1154372).\n\n- CVE-2019-17133: cfg80211 wireless extension did not reject a long SSID IE,\n leading to a Buffer Overflow (bsc#1153158).\n\n- CVE-2019-16232: Fix a potential NULL pointer dereference in the Marwell\n libertas driver (bsc#1150465).\n\n- CVE-2019-16234: iwlwifi pcie driver did not check the alloc_workqueue return\n value, leading to a NULL pointer dereference. (bsc#1150452).\n\n- CVE-2019-17055: The AF_ISDN network module in the Linux kernel did not\n enforce CAP_NET_RAW, which meant that unprivileged users could create a raw\n socket (bnc#1152782).\n\n- CVE-2019-17056: The AF_NFC network module did not enforce CAP_NET_RAW, which\n meant that unprivileged users could create a raw socket (bsc#1152788).\n\n- CVE-2019-16413: The 9p filesystem did not protect i_size_write() properly,\n which caused an i_size_read() infinite loop and denial of service on SMP\n systems (bnc#1151347).\n\n- CVE-2019-15902: A backporting issue was discovered that re-introduced the\n Spectre vulnerability it had aimed to eliminate. This occurred because the\n backport process depends on cherry picking specific commits, and because two\n (correctly ordered) code lines were swapped (bnc#1149376).\n\n- CVE-2019-15291: Fixed a NULL pointer dereference issue that could be caused\n by a malicious USB device (bnc#1146519).\n\n- CVE-2019-15807: Fixed a memory leak in the SCSI module that could be abused\n to cause denial of service (bnc#1148938).\n\n- CVE-2019-13272: Fixed a mishandled the recording of the credentials of a\n process that wants to create a ptrace relationship, which allowed local users\n to obtain root access by leveraging certain scenarios with a parent-child\n process relationship, where a parent drops privileges and calls execve\n (potentially allowing control by an attacker). (bnc#1140671).\n\n- CVE-2019-14821: An out-of-bounds access issue was fixed in the kernel\u0027s KVM\n hypervisor. An unprivileged host user or process with access to \u0027/dev/kvm\u0027\n device could use this flaw to crash the host kernel, resulting in a denial of\n service or potentially escalating privileges on the system (bnc#1151350).\n\n- CVE-2019-15505: An out-of-bounds issue had been fixed that could be caused by\n crafted USB device traffic (bnc#1147122).\n\n- CVE-2017-18595: A double free in allocate_trace_buffer was fixed\n (bnc#1149555).\n\n- CVE-2019-14835: A buffer overflow flaw was found in the kernel\u0027s vhost\n functionality that translates virtqueue buffers to IOVs. A privileged guest\n user able to pass descriptors with invalid length to the host could use this\n flaw to increase their privileges on the host (bnc#1150112).\n\n- CVE-2019-15216: A NULL pointer dereference was fixed that could be malicious\n USB device (bnc#1146361).\n\n- CVE-2019-15924: A a NULL pointer dereference has been fixed in the\n drivers/net/ethernet/intel/fm10k module (bnc#1149612).\n\n- CVE-2019-9456: An out-of-bounds write in the USB monitor driver has been\n fixed. This issue could lead to local escalation of privilege with System\n execution privileges needed. (bnc#1150025).\n\n- CVE-2019-15926: An out-of-bounds access was fixed in the\n drivers/net/wireless/ath/ath6kl module. (bnc#1149527).\n\n- CVE-2019-15927: An out-of-bounds access was fixed in the sound/usb/mixer\n module (bnc#1149522).\n\n- CVE-2019-15666: There was an out-of-bounds array access in the net/xfrm\n module that could cause denial of service (bnc#1148394).\n\n- CVE-2017-18379: An out-of-boundary access was fixed in the\n drivers/nvme/target module (bnc#1143187).\n\n- CVE-2019-15219: A NULL pointer dereference was fixed that could be abused by\n a malicious USB device (bnc#1146519 1146524).\n\n- CVE-2019-15220: A use-after-free issue was fixed that could be caused by a\n malicious USB device (bnc#1146519 1146526).\n\n- CVE-2019-15221: A NULL pointer dereference was fixed that could be caused by\n a malicious USB device (bnc#1146519 1146529).\n\n- CVE-2019-14814: A heap-based buffer overflow was fixed in the marvell wifi\n chip driver. That issue allowed local users to cause a denial of service\n (system crash) or possibly execute arbitrary code (bnc#1146512).\n\n- CVE-2019-14815: A missing length check while parsing WMM IEs was fixed\n (bsc#1146512, bsc#1146514, bsc#1146516).\n\n- CVE-2019-14816: A heap-based buffer overflow in the marvell wifi chip driver\n was fixed. Local users would have abused this issue to cause a denial of\n service (system crash) or possibly execute arbitrary code (bnc#1146516).\n\n- CVE-2017-18509: An issue in net/ipv6 as fixed. By setting a specific socket\n option, an attacker could control a pointer in kernel land and cause an\n inet_csk_listen_stop general protection fault, or potentially execute\n arbitrary code under certain circumstances. The issue can be triggered as\n root (e.g., inside a default LXC container or with the CAP_NET_ADMIN\n capability) or after namespace unsharing. (bnc#1145477)\n\n- CVE-2019-9506: The Bluetooth BR/EDR specification used to permit sufficiently\n low encryption key length and did not prevent an attacker from influencing\n the key length negotiation. This allowed practical brute-force attacks (aka\n \u0027KNOB\u0027) that could decrypt traffic and inject arbitrary ciphertext without\n the victim noticing (bnc#1137865).\n\n- CVE-2019-15098: A NULL pointer dereference in drivers/net/wireless/ath was\n fixed (bnc#1146378).\n\n- CVE-2019-15290: A NULL pointer dereference in ath6kl_usb_alloc_urb_from_pipe\n was fixed (bsc#1146378).\n\n- CVE-2019-15239: A incorrect patch to net/ipv4 was fixed. By adding to a write\n queue between disconnection and re-connection, a local attacker could trigger\n multiple use-after-free conditions. This could result in kernel crashes or\n potentially in privilege escalation. (bnc#1146589)\n\n- CVE-2019-15212: A double-free issue was fixed in drivers/usb driver\n (bnc#1146391).\n\n- CVE-2016-10906: A use-after-free issue was fixed in drivers/net/ethernet/arc\n (bnc#1146584).\n\n- CVE-2019-15211: A use-after-free issue caused by a malicious USB device was\n fixed in the drivers/media/v4l2-core driver (bnc#1146519).\n\n- CVE-2019-15217: A a NULL pointer dereference issue caused by a malicious USB\n device was fixed in the drivers/media/usb/zr364xx driver (bnc#1146519).\n\n- CVE-2019-15214: An a use-after-free issue in the sound subsystem was fixed\n (bnc#1146519).\n\n- CVE-2019-15218: A NULL pointer dereference caused by a malicious USB device\n was fixed in the drivers/media/usb/siano driver (bnc#1146413).\n\n- CVE-2019-15215: A use-after-free issue caused by a malicious USB device was\n fixed in the drivers/media/usb/cpia2 driver (bnc#1146425).\n\n- CVE-2018-20976: A use-after-free issue was fixed in the fs/xfs driver\n (bnc#1146285).\n\n- CVE-2017-18551: An out-of-bounds write was fixed in the drivers/i2c driver\n (bnc#1146163).\n\n- CVE-2019-0154: An unprotected read access to i915 registers has been fixed\n that could have been abused to facilitate a local denial-of-service attack.\n (bsc#1135966)\n\n- CVE-2019-0155: A privilege escalation vulnerability has been fixed in the\n i915 module that allowed batch buffers from user mode to gain super user\n privileges. (bsc#1135967)\n\nThe following non-security bugs were fixed:\n\n- array_index_nospec: Sanitize speculative array (bsc#1155671)\n- bonding/802.3ad: fix link_failure_count tracking (bsc#1141013).\n- bonding/802.3ad: fix slave link initialization transition states (bsc#1141013).\n- bonding: correctly update link status during mii-commit phase (bsc#1141013).\n- bonding: fix active-backup transition (bsc#1141013).\n- bonding: make speed, duplex setting consistent with link state (bsc#1141013).\n- bonding: ratelimit failed speed/duplex update warning (bsc#1141013).\n- bonding: require speed/duplex only for 802.3ad, alb and tlb (bsc#1141013).\n- bonding: set default miimon value for non-arp modes if not set (bsc#1141013).\n- bonding: speed/duplex update at NETDEV_UP event (bsc#1141013).\n- cifs: fix panic in smb2_reconnect (bsc#1142458).\n- cifs: handle netapp error codes (bsc#1136261).\n- cpu/speculation: Uninline and export CPU mitigations helpers (bnc#1117665).\n- ib/core, ipoib: Do not overreact to SM LID change event (bsc#1154103)\n- ib/core: Add mitigation for Spectre V1 (bsc#1155671)\n- ixgbe: sync the first fragment unconditionally (bsc#1133140).\n- kvm: Convert kvm_lock to a mutex (bsc#1117665).\n- kvm: lapic: cap __delay at lapic_timer_advance_ns (bsc#1149083).\n- kvm: mmu: drop vcpu param in gpte_access (bsc#1117665).\n- kvm: mmu: introduce kvm_mmu_gfn_{allow,disallow}_lpage (bsc#1117665).\n- kvm: mmu: rename has_wrprotected_page to mmu_gfn_lpage_is_disallowed (bsc#1117665).\n- kvm: vmx, svm: always run with EFER.NXE=1 when shadow paging is active (bsc#1117665).\n- kvm: x86, powerpc: do not allow clearing largepages debugfs entry (bsc#1117665).\n- kvm: x86: Do not release the page inside mmu_set_spte() (bsc#1117665).\n- kvm: x86: MMU: Consolidate quickly_check_mmio_pf() and is_mmio_page_fault() (bsc#1117665).\n- kvm: x86: MMU: Encapsulate the type of rmap-chain head in a new struct (bsc#1117665).\n- kvm: x86: MMU: Move handle_mmio_page_fault() call to kvm_mmu_page_fault() (bsc#1117665).\n- kvm: x86: MMU: Move initialization of parent_ptes out from kvm_mmu_alloc_page() (bsc#1117665).\n- kvm: x86: MMU: Move parent_pte handling from kvm_mmu_get_page() to link_shadow_page() (bsc#1117665).\n- kvm: x86: MMU: Remove unused parameter parent_pte from kvm_mmu_get_page() (bsc#1117665).\n- kvm: x86: MMU: always set accessed bit in shadow PTEs (bsc#1117665).\n- kvm: x86: Reduce the overhead when lapic_timer_advance is disabled (bsc#1149083).\n- kvm: x86: add tracepoints around __direct_map and FNAME(fetch) (bsc#1117665).\n- kvm: x86: adjust kvm_mmu_page member to save 8 bytes (bsc#1117665).\n- kvm: x86: change kvm_mmu_page_get_gfn BUG_ON to WARN_ON (bsc#1117665).\n- kvm: x86: extend usage of RET_MMIO_PF_* constants (bsc#1117665).\n- kvm: x86: make FNAME(fetch) and __direct_map more similar (bsc#1117665).\n- kvm: x86: mmu: Apply global mitigations knob to ITLB_MULTIHIT (bnc#1117665).\n- kvm: x86: move nsec_to_cycles from x86.c to x86.h (bsc#1149083).\n- kvm: x86: remove now unneeded hugepage gfn adjustment (bsc#1117665).\n- kvm: x86: simplify ept_misconfig (bsc#1117665).\n- media: smsusb: better handle optional alignment (bsc#1146413).\n- pci: hv: Use bytes 4 and 5 from instance ID as the PCI domain numbers (bsc#1153263).\n- powerpc/64s: support nospectre_v2 cmdline option (bsc#1131107).\n- powerpc/pseries: correctly track irq state in default idle (bsc#1150727 bsc#1150942 ltc#178925 ltc#181484).\n- powerpc/rtas: use device model APIs and serialization during LPM (bsc#1144123 ltc#178840).\n- powerpc/security: Show powerpc_security_features in debugfs (bsc#1131107).\n- scsi: scsi_transport_fc: Drop double list_del() (bsc#1084878) During the backport of 260f4aeddb48 (\u0027scsi: scsi_transport_fc: return -EBUSY for deleted vport\u0027) an additional list_del() was introduced. The list entry will be freed in fc_vport_terminate(). Do not free it premature in fc_remove_host().\n- swiotlb: Add support for DMA_ATTR_SKIP_CPU_SYNC in Xen-swiotlb unmap path (bsc#1133140).\n- vmci: Release resource if the work is already queued (bsc#1051510).\n- x86/cpu: Add Atom Tremont (Jacobsville) (bsc#1117665).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "HPE-Helion-OpenStack-8-2019-2949,SUSE-2019-2949,SUSE-OpenStack-Cloud-8-2019-2949,SUSE-OpenStack-Cloud-Crowbar-8-2019-2949,SUSE-SLE-HA-12-SP3-2019-2949,SUSE-SLE-SAP-12-SP3-2019-2949,SUSE-SLE-SERVER-12-SP3-2019-2949,SUSE-SLE-SERVER-12-SP3-BCL-2019-2949,SUSE-Storage-5-2019-2949",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_2949-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2019:2949-1",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192949-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2019:2949-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2019-November/006110.html"
},
{
"category": "self",
"summary": "SUSE Bug 1051510",
"url": "https://bugzilla.suse.com/1051510"
},
{
"category": "self",
"summary": "SUSE Bug 1084878",
"url": "https://bugzilla.suse.com/1084878"
},
{
"category": "self",
"summary": "SUSE Bug 1117665",
"url": "https://bugzilla.suse.com/1117665"
},
{
"category": "self",
"summary": "SUSE Bug 1131107",
"url": "https://bugzilla.suse.com/1131107"
},
{
"category": "self",
"summary": "SUSE Bug 1133140",
"url": "https://bugzilla.suse.com/1133140"
},
{
"category": "self",
"summary": "SUSE Bug 1135966",
"url": "https://bugzilla.suse.com/1135966"
},
{
"category": "self",
"summary": "SUSE Bug 1135967",
"url": "https://bugzilla.suse.com/1135967"
},
{
"category": "self",
"summary": "SUSE Bug 1136261",
"url": "https://bugzilla.suse.com/1136261"
},
{
"category": "self",
"summary": "SUSE Bug 1137865",
"url": "https://bugzilla.suse.com/1137865"
},
{
"category": "self",
"summary": "SUSE Bug 1139073",
"url": "https://bugzilla.suse.com/1139073"
},
{
"category": "self",
"summary": "SUSE Bug 1140671",
"url": "https://bugzilla.suse.com/1140671"
},
{
"category": "self",
"summary": "SUSE Bug 1141013",
"url": "https://bugzilla.suse.com/1141013"
},
{
"category": "self",
"summary": "SUSE Bug 1141054",
"url": "https://bugzilla.suse.com/1141054"
},
{
"category": "self",
"summary": "SUSE Bug 1142458",
"url": "https://bugzilla.suse.com/1142458"
},
{
"category": "self",
"summary": "SUSE Bug 1143187",
"url": "https://bugzilla.suse.com/1143187"
},
{
"category": "self",
"summary": "SUSE Bug 1144123",
"url": "https://bugzilla.suse.com/1144123"
},
{
"category": "self",
"summary": "SUSE Bug 1144903",
"url": "https://bugzilla.suse.com/1144903"
},
{
"category": "self",
"summary": "SUSE Bug 1145477",
"url": "https://bugzilla.suse.com/1145477"
},
{
"category": "self",
"summary": "SUSE Bug 1146042",
"url": "https://bugzilla.suse.com/1146042"
},
{
"category": "self",
"summary": "SUSE Bug 1146163",
"url": "https://bugzilla.suse.com/1146163"
},
{
"category": "self",
"summary": "SUSE Bug 1146285",
"url": "https://bugzilla.suse.com/1146285"
},
{
"category": "self",
"summary": "SUSE Bug 1146361",
"url": "https://bugzilla.suse.com/1146361"
},
{
"category": "self",
"summary": "SUSE Bug 1146378",
"url": "https://bugzilla.suse.com/1146378"
},
{
"category": "self",
"summary": "SUSE Bug 1146391",
"url": "https://bugzilla.suse.com/1146391"
},
{
"category": "self",
"summary": "SUSE Bug 1146413",
"url": "https://bugzilla.suse.com/1146413"
},
{
"category": "self",
"summary": "SUSE Bug 1146425",
"url": "https://bugzilla.suse.com/1146425"
},
{
"category": "self",
"summary": "SUSE Bug 1146512",
"url": "https://bugzilla.suse.com/1146512"
},
{
"category": "self",
"summary": "SUSE Bug 1146514",
"url": "https://bugzilla.suse.com/1146514"
},
{
"category": "self",
"summary": "SUSE Bug 1146516",
"url": "https://bugzilla.suse.com/1146516"
},
{
"category": "self",
"summary": "SUSE Bug 1146519",
"url": "https://bugzilla.suse.com/1146519"
},
{
"category": "self",
"summary": "SUSE Bug 1146524",
"url": "https://bugzilla.suse.com/1146524"
},
{
"category": "self",
"summary": "SUSE Bug 1146526",
"url": "https://bugzilla.suse.com/1146526"
},
{
"category": "self",
"summary": "SUSE Bug 1146529",
"url": "https://bugzilla.suse.com/1146529"
},
{
"category": "self",
"summary": "SUSE Bug 1146540",
"url": "https://bugzilla.suse.com/1146540"
},
{
"category": "self",
"summary": "SUSE Bug 1146543",
"url": "https://bugzilla.suse.com/1146543"
},
{
"category": "self",
"summary": "SUSE Bug 1146547",
"url": "https://bugzilla.suse.com/1146547"
},
{
"category": "self",
"summary": "SUSE Bug 1146550",
"url": "https://bugzilla.suse.com/1146550"
},
{
"category": "self",
"summary": "SUSE Bug 1146584",
"url": "https://bugzilla.suse.com/1146584"
},
{
"category": "self",
"summary": "SUSE Bug 1146589",
"url": "https://bugzilla.suse.com/1146589"
},
{
"category": "self",
"summary": "SUSE Bug 1147022",
"url": "https://bugzilla.suse.com/1147022"
},
{
"category": "self",
"summary": "SUSE Bug 1147122",
"url": "https://bugzilla.suse.com/1147122"
},
{
"category": "self",
"summary": "SUSE Bug 1148394",
"url": "https://bugzilla.suse.com/1148394"
},
{
"category": "self",
"summary": "SUSE Bug 1148938",
"url": "https://bugzilla.suse.com/1148938"
},
{
"category": "self",
"summary": "SUSE Bug 1149083",
"url": "https://bugzilla.suse.com/1149083"
},
{
"category": "self",
"summary": "SUSE Bug 1149376",
"url": "https://bugzilla.suse.com/1149376"
},
{
"category": "self",
"summary": "SUSE Bug 1149522",
"url": "https://bugzilla.suse.com/1149522"
},
{
"category": "self",
"summary": "SUSE Bug 1149527",
"url": "https://bugzilla.suse.com/1149527"
},
{
"category": "self",
"summary": "SUSE Bug 1149555",
"url": "https://bugzilla.suse.com/1149555"
},
{
"category": "self",
"summary": "SUSE Bug 1149612",
"url": "https://bugzilla.suse.com/1149612"
},
{
"category": "self",
"summary": "SUSE Bug 1150025",
"url": "https://bugzilla.suse.com/1150025"
},
{
"category": "self",
"summary": "SUSE Bug 1150112",
"url": "https://bugzilla.suse.com/1150112"
},
{
"category": "self",
"summary": "SUSE Bug 1150452",
"url": "https://bugzilla.suse.com/1150452"
},
{
"category": "self",
"summary": "SUSE Bug 1150457",
"url": "https://bugzilla.suse.com/1150457"
},
{
"category": "self",
"summary": "SUSE Bug 1150465",
"url": "https://bugzilla.suse.com/1150465"
},
{
"category": "self",
"summary": "SUSE Bug 1150727",
"url": "https://bugzilla.suse.com/1150727"
},
{
"category": "self",
"summary": "SUSE Bug 1150942",
"url": "https://bugzilla.suse.com/1150942"
},
{
"category": "self",
"summary": "SUSE Bug 1151347",
"url": "https://bugzilla.suse.com/1151347"
},
{
"category": "self",
"summary": "SUSE Bug 1151350",
"url": "https://bugzilla.suse.com/1151350"
},
{
"category": "self",
"summary": "SUSE Bug 1152685",
"url": "https://bugzilla.suse.com/1152685"
},
{
"category": "self",
"summary": "SUSE Bug 1152782",
"url": "https://bugzilla.suse.com/1152782"
},
{
"category": "self",
"summary": "SUSE Bug 1152788",
"url": "https://bugzilla.suse.com/1152788"
},
{
"category": "self",
"summary": "SUSE Bug 1153158",
"url": "https://bugzilla.suse.com/1153158"
},
{
"category": "self",
"summary": "SUSE Bug 1153263",
"url": "https://bugzilla.suse.com/1153263"
},
{
"category": "self",
"summary": "SUSE Bug 1154103",
"url": "https://bugzilla.suse.com/1154103"
},
{
"category": "self",
"summary": "SUSE Bug 1154372",
"url": "https://bugzilla.suse.com/1154372"
},
{
"category": "self",
"summary": "SUSE Bug 1155131",
"url": "https://bugzilla.suse.com/1155131"
},
{
"category": "self",
"summary": "SUSE Bug 1155671",
"url": "https://bugzilla.suse.com/1155671"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-10906 page",
"url": "https://www.suse.com/security/cve/CVE-2016-10906/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-18379 page",
"url": "https://www.suse.com/security/cve/CVE-2017-18379/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-18509 page",
"url": "https://www.suse.com/security/cve/CVE-2017-18509/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-18551 page",
"url": "https://www.suse.com/security/cve/CVE-2017-18551/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-18595 page",
"url": "https://www.suse.com/security/cve/CVE-2017-18595/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-12207 page",
"url": "https://www.suse.com/security/cve/CVE-2018-12207/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-20976 page",
"url": "https://www.suse.com/security/cve/CVE-2018-20976/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-0154 page",
"url": "https://www.suse.com/security/cve/CVE-2019-0154/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-0155 page",
"url": "https://www.suse.com/security/cve/CVE-2019-0155/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-10220 page",
"url": "https://www.suse.com/security/cve/CVE-2019-10220/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11135 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11135/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-13272 page",
"url": "https://www.suse.com/security/cve/CVE-2019-13272/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-14814 page",
"url": "https://www.suse.com/security/cve/CVE-2019-14814/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-14815 page",
"url": "https://www.suse.com/security/cve/CVE-2019-14815/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-14816 page",
"url": "https://www.suse.com/security/cve/CVE-2019-14816/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-14821 page",
"url": "https://www.suse.com/security/cve/CVE-2019-14821/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-14835 page",
"url": "https://www.suse.com/security/cve/CVE-2019-14835/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15098 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15098/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15211 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15211/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15212 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15212/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15214 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15214/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15215 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15215/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15216 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15216/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15217 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15217/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15218 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15218/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15219 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15219/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15220 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15220/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15221 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15221/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15239 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15239/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15290 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15290/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15291 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15291/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15505 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15505/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15666 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15666/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15807 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15807/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15902 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15902/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15924 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15924/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15926 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15926/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15927 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15927/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-16232 page",
"url": "https://www.suse.com/security/cve/CVE-2019-16232/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-16233 page",
"url": "https://www.suse.com/security/cve/CVE-2019-16233/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-16234 page",
"url": "https://www.suse.com/security/cve/CVE-2019-16234/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-16413 page",
"url": "https://www.suse.com/security/cve/CVE-2019-16413/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-16995 page",
"url": "https://www.suse.com/security/cve/CVE-2019-16995/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-17055 page",
"url": "https://www.suse.com/security/cve/CVE-2019-17055/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-17056 page",
"url": "https://www.suse.com/security/cve/CVE-2019-17056/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-17133 page",
"url": "https://www.suse.com/security/cve/CVE-2019-17133/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-17666 page",
"url": "https://www.suse.com/security/cve/CVE-2019-17666/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-9456 page",
"url": "https://www.suse.com/security/cve/CVE-2019-9456/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-9506 page",
"url": "https://www.suse.com/security/cve/CVE-2019-9506/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2019-11-15T06:29:59Z",
"generator": {
"date": "2019-11-15T06:29:59Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2019:2949-1",
"initial_release_date": "2019-11-15T06:29:59Z",
"revision_history": [
{
"date": "2019-11-15T06:29:59Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.4.180-94.107.1.aarch64",
"product": {
"name": "cluster-md-kmp-default-4.4.180-94.107.1.aarch64",
"product_id": "cluster-md-kmp-default-4.4.180-94.107.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.4.180-94.107.1.aarch64",
"product": {
"name": "dlm-kmp-default-4.4.180-94.107.1.aarch64",
"product_id": "dlm-kmp-default-4.4.180-94.107.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.4.180-94.107.1.aarch64",
"product": {
"name": "gfs2-kmp-default-4.4.180-94.107.1.aarch64",
"product_id": "gfs2-kmp-default-4.4.180-94.107.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-4.4.180-94.107.1.aarch64",
"product": {
"name": "kernel-default-4.4.180-94.107.1.aarch64",
"product_id": "kernel-default-4.4.180-94.107.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.4.180-94.107.1.aarch64",
"product": {
"name": "kernel-default-base-4.4.180-94.107.1.aarch64",
"product_id": "kernel-default-base-4.4.180-94.107.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.4.180-94.107.1.aarch64",
"product": {
"name": "kernel-default-devel-4.4.180-94.107.1.aarch64",
"product_id": "kernel-default-devel-4.4.180-94.107.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.4.180-94.107.1.aarch64",
"product": {
"name": "kernel-default-extra-4.4.180-94.107.1.aarch64",
"product_id": "kernel-default-extra-4.4.180-94.107.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.4.180-94.107.1.aarch64",
"product": {
"name": "kernel-default-kgraft-4.4.180-94.107.1.aarch64",
"product_id": "kernel-default-kgraft-4.4.180-94.107.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.4.180-94.107.1.aarch64",
"product": {
"name": "kernel-obs-build-4.4.180-94.107.1.aarch64",
"product_id": "kernel-obs-build-4.4.180-94.107.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.4.180-94.107.1.aarch64",
"product": {
"name": "kernel-obs-qa-4.4.180-94.107.1.aarch64",
"product_id": "kernel-obs-qa-4.4.180-94.107.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.4.180-94.107.1.aarch64",
"product": {
"name": "kernel-syms-4.4.180-94.107.1.aarch64",
"product_id": "kernel-syms-4.4.180-94.107.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.4.180-94.107.1.aarch64",
"product": {
"name": "kernel-vanilla-4.4.180-94.107.1.aarch64",
"product_id": "kernel-vanilla-4.4.180-94.107.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.4.180-94.107.1.aarch64",
"product": {
"name": "kernel-vanilla-base-4.4.180-94.107.1.aarch64",
"product_id": "kernel-vanilla-base-4.4.180-94.107.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.4.180-94.107.1.aarch64",
"product": {
"name": "kernel-vanilla-devel-4.4.180-94.107.1.aarch64",
"product_id": "kernel-vanilla-devel-4.4.180-94.107.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.4.180-94.107.1.aarch64",
"product": {
"name": "kselftests-kmp-default-4.4.180-94.107.1.aarch64",
"product_id": "kselftests-kmp-default-4.4.180-94.107.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.4.180-94.107.1.aarch64",
"product": {
"name": "ocfs2-kmp-default-4.4.180-94.107.1.aarch64",
"product_id": "ocfs2-kmp-default-4.4.180-94.107.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-4.4.180-94.107.1.noarch",
"product": {
"name": "kernel-devel-4.4.180-94.107.1.noarch",
"product_id": "kernel-devel-4.4.180-94.107.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-4.4.180-94.107.1.noarch",
"product": {
"name": "kernel-macros-4.4.180-94.107.1.noarch",
"product_id": "kernel-macros-4.4.180-94.107.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-4.4.180-94.107.1.noarch",
"product": {
"name": "kernel-source-4.4.180-94.107.1.noarch",
"product_id": "kernel-source-4.4.180-94.107.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-4.4.180-94.107.1.noarch",
"product": {
"name": "kernel-docs-4.4.180-94.107.1.noarch",
"product_id": "kernel-docs-4.4.180-94.107.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-html-4.4.180-94.107.1.noarch",
"product": {
"name": "kernel-docs-html-4.4.180-94.107.1.noarch",
"product_id": "kernel-docs-html-4.4.180-94.107.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-pdf-4.4.180-94.107.1.noarch",
"product": {
"name": "kernel-docs-pdf-4.4.180-94.107.1.noarch",
"product_id": "kernel-docs-pdf-4.4.180-94.107.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-4.4.180-94.107.1.noarch",
"product": {
"name": "kernel-source-vanilla-4.4.180-94.107.1.noarch",
"product_id": "kernel-source-vanilla-4.4.180-94.107.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-debug-4.4.180-94.107.1.ppc64le",
"product": {
"name": "cluster-md-kmp-debug-4.4.180-94.107.1.ppc64le",
"product_id": "cluster-md-kmp-debug-4.4.180-94.107.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.4.180-94.107.1.ppc64le",
"product": {
"name": "cluster-md-kmp-default-4.4.180-94.107.1.ppc64le",
"product_id": "cluster-md-kmp-default-4.4.180-94.107.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-debug-4.4.180-94.107.1.ppc64le",
"product": {
"name": "dlm-kmp-debug-4.4.180-94.107.1.ppc64le",
"product_id": "dlm-kmp-debug-4.4.180-94.107.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.4.180-94.107.1.ppc64le",
"product": {
"name": "dlm-kmp-default-4.4.180-94.107.1.ppc64le",
"product_id": "dlm-kmp-default-4.4.180-94.107.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-debug-4.4.180-94.107.1.ppc64le",
"product": {
"name": "gfs2-kmp-debug-4.4.180-94.107.1.ppc64le",
"product_id": "gfs2-kmp-debug-4.4.180-94.107.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"product": {
"name": "gfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"product_id": "gfs2-kmp-default-4.4.180-94.107.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-4.4.180-94.107.1.ppc64le",
"product": {
"name": "kernel-debug-4.4.180-94.107.1.ppc64le",
"product_id": "kernel-debug-4.4.180-94.107.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-4.4.180-94.107.1.ppc64le",
"product": {
"name": "kernel-debug-base-4.4.180-94.107.1.ppc64le",
"product_id": "kernel-debug-base-4.4.180-94.107.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-4.4.180-94.107.1.ppc64le",
"product": {
"name": "kernel-debug-devel-4.4.180-94.107.1.ppc64le",
"product_id": "kernel-debug-devel-4.4.180-94.107.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-extra-4.4.180-94.107.1.ppc64le",
"product": {
"name": "kernel-debug-extra-4.4.180-94.107.1.ppc64le",
"product_id": "kernel-debug-extra-4.4.180-94.107.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-kgraft-4.4.180-94.107.1.ppc64le",
"product": {
"name": "kernel-debug-kgraft-4.4.180-94.107.1.ppc64le",
"product_id": "kernel-debug-kgraft-4.4.180-94.107.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-4.4.180-94.107.1.ppc64le",
"product": {
"name": "kernel-default-4.4.180-94.107.1.ppc64le",
"product_id": "kernel-default-4.4.180-94.107.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.4.180-94.107.1.ppc64le",
"product": {
"name": "kernel-default-base-4.4.180-94.107.1.ppc64le",
"product_id": "kernel-default-base-4.4.180-94.107.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.4.180-94.107.1.ppc64le",
"product": {
"name": "kernel-default-devel-4.4.180-94.107.1.ppc64le",
"product_id": "kernel-default-devel-4.4.180-94.107.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.4.180-94.107.1.ppc64le",
"product": {
"name": "kernel-default-extra-4.4.180-94.107.1.ppc64le",
"product_id": "kernel-default-extra-4.4.180-94.107.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"product": {
"name": "kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"product_id": "kernel-default-kgraft-4.4.180-94.107.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.4.180-94.107.1.ppc64le",
"product": {
"name": "kernel-obs-build-4.4.180-94.107.1.ppc64le",
"product_id": "kernel-obs-build-4.4.180-94.107.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.4.180-94.107.1.ppc64le",
"product": {
"name": "kernel-obs-qa-4.4.180-94.107.1.ppc64le",
"product_id": "kernel-obs-qa-4.4.180-94.107.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.4.180-94.107.1.ppc64le",
"product": {
"name": "kernel-syms-4.4.180-94.107.1.ppc64le",
"product_id": "kernel-syms-4.4.180-94.107.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.4.180-94.107.1.ppc64le",
"product": {
"name": "kernel-vanilla-4.4.180-94.107.1.ppc64le",
"product_id": "kernel-vanilla-4.4.180-94.107.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.4.180-94.107.1.ppc64le",
"product": {
"name": "kernel-vanilla-base-4.4.180-94.107.1.ppc64le",
"product_id": "kernel-vanilla-base-4.4.180-94.107.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.4.180-94.107.1.ppc64le",
"product": {
"name": "kernel-vanilla-devel-4.4.180-94.107.1.ppc64le",
"product_id": "kernel-vanilla-devel-4.4.180-94.107.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"product": {
"name": "kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"product_id": "kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-debug-4.4.180-94.107.1.ppc64le",
"product": {
"name": "kselftests-kmp-debug-4.4.180-94.107.1.ppc64le",
"product_id": "kselftests-kmp-debug-4.4.180-94.107.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.4.180-94.107.1.ppc64le",
"product": {
"name": "kselftests-kmp-default-4.4.180-94.107.1.ppc64le",
"product_id": "kselftests-kmp-default-4.4.180-94.107.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-debug-4.4.180-94.107.1.ppc64le",
"product": {
"name": "ocfs2-kmp-debug-4.4.180-94.107.1.ppc64le",
"product_id": "ocfs2-kmp-debug-4.4.180-94.107.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"product": {
"name": "ocfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"product_id": "ocfs2-kmp-default-4.4.180-94.107.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.4.180-94.107.1.s390x",
"product": {
"name": "cluster-md-kmp-default-4.4.180-94.107.1.s390x",
"product_id": "cluster-md-kmp-default-4.4.180-94.107.1.s390x"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.4.180-94.107.1.s390x",
"product": {
"name": "dlm-kmp-default-4.4.180-94.107.1.s390x",
"product_id": "dlm-kmp-default-4.4.180-94.107.1.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.4.180-94.107.1.s390x",
"product": {
"name": "gfs2-kmp-default-4.4.180-94.107.1.s390x",
"product_id": "gfs2-kmp-default-4.4.180-94.107.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-4.4.180-94.107.1.s390x",
"product": {
"name": "kernel-default-4.4.180-94.107.1.s390x",
"product_id": "kernel-default-4.4.180-94.107.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.4.180-94.107.1.s390x",
"product": {
"name": "kernel-default-base-4.4.180-94.107.1.s390x",
"product_id": "kernel-default-base-4.4.180-94.107.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.4.180-94.107.1.s390x",
"product": {
"name": "kernel-default-devel-4.4.180-94.107.1.s390x",
"product_id": "kernel-default-devel-4.4.180-94.107.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.4.180-94.107.1.s390x",
"product": {
"name": "kernel-default-extra-4.4.180-94.107.1.s390x",
"product_id": "kernel-default-extra-4.4.180-94.107.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.4.180-94.107.1.s390x",
"product": {
"name": "kernel-default-kgraft-4.4.180-94.107.1.s390x",
"product_id": "kernel-default-kgraft-4.4.180-94.107.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-man-4.4.180-94.107.1.s390x",
"product": {
"name": "kernel-default-man-4.4.180-94.107.1.s390x",
"product_id": "kernel-default-man-4.4.180-94.107.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.4.180-94.107.1.s390x",
"product": {
"name": "kernel-obs-build-4.4.180-94.107.1.s390x",
"product_id": "kernel-obs-build-4.4.180-94.107.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.4.180-94.107.1.s390x",
"product": {
"name": "kernel-obs-qa-4.4.180-94.107.1.s390x",
"product_id": "kernel-obs-qa-4.4.180-94.107.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.4.180-94.107.1.s390x",
"product": {
"name": "kernel-syms-4.4.180-94.107.1.s390x",
"product_id": "kernel-syms-4.4.180-94.107.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.4.180-94.107.1.s390x",
"product": {
"name": "kernel-vanilla-4.4.180-94.107.1.s390x",
"product_id": "kernel-vanilla-4.4.180-94.107.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.4.180-94.107.1.s390x",
"product": {
"name": "kernel-vanilla-base-4.4.180-94.107.1.s390x",
"product_id": "kernel-vanilla-base-4.4.180-94.107.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.4.180-94.107.1.s390x",
"product": {
"name": "kernel-vanilla-devel-4.4.180-94.107.1.s390x",
"product_id": "kernel-vanilla-devel-4.4.180-94.107.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-4.4.180-94.107.1.s390x",
"product": {
"name": "kernel-zfcpdump-4.4.180-94.107.1.s390x",
"product_id": "kernel-zfcpdump-4.4.180-94.107.1.s390x"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.4.180-94.107.1.s390x",
"product": {
"name": "kselftests-kmp-default-4.4.180-94.107.1.s390x",
"product_id": "kselftests-kmp-default-4.4.180-94.107.1.s390x"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.4.180-94.107.1.s390x",
"product": {
"name": "ocfs2-kmp-default-4.4.180-94.107.1.s390x",
"product_id": "ocfs2-kmp-default-4.4.180-94.107.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-default-4.4.180-94.107.1.x86_64",
"product": {
"name": "kernel-default-4.4.180-94.107.1.x86_64",
"product_id": "kernel-default-4.4.180-94.107.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.4.180-94.107.1.x86_64",
"product": {
"name": "kernel-default-base-4.4.180-94.107.1.x86_64",
"product_id": "kernel-default-base-4.4.180-94.107.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.4.180-94.107.1.x86_64",
"product": {
"name": "kernel-default-devel-4.4.180-94.107.1.x86_64",
"product_id": "kernel-default-devel-4.4.180-94.107.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"product": {
"name": "kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"product_id": "kernel-default-kgraft-4.4.180-94.107.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.4.180-94.107.1.x86_64",
"product": {
"name": "kernel-syms-4.4.180-94.107.1.x86_64",
"product_id": "kernel-syms-4.4.180-94.107.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"product": {
"name": "kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"product_id": "kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-debug-4.4.180-94.107.1.x86_64",
"product": {
"name": "cluster-md-kmp-debug-4.4.180-94.107.1.x86_64",
"product_id": "cluster-md-kmp-debug-4.4.180-94.107.1.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.4.180-94.107.1.x86_64",
"product": {
"name": "cluster-md-kmp-default-4.4.180-94.107.1.x86_64",
"product_id": "cluster-md-kmp-default-4.4.180-94.107.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-debug-4.4.180-94.107.1.x86_64",
"product": {
"name": "dlm-kmp-debug-4.4.180-94.107.1.x86_64",
"product_id": "dlm-kmp-debug-4.4.180-94.107.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.4.180-94.107.1.x86_64",
"product": {
"name": "dlm-kmp-default-4.4.180-94.107.1.x86_64",
"product_id": "dlm-kmp-default-4.4.180-94.107.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-debug-4.4.180-94.107.1.x86_64",
"product": {
"name": "gfs2-kmp-debug-4.4.180-94.107.1.x86_64",
"product_id": "gfs2-kmp-debug-4.4.180-94.107.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.4.180-94.107.1.x86_64",
"product": {
"name": "gfs2-kmp-default-4.4.180-94.107.1.x86_64",
"product_id": "gfs2-kmp-default-4.4.180-94.107.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-4.4.180-94.107.1.x86_64",
"product": {
"name": "kernel-debug-4.4.180-94.107.1.x86_64",
"product_id": "kernel-debug-4.4.180-94.107.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-4.4.180-94.107.1.x86_64",
"product": {
"name": "kernel-debug-base-4.4.180-94.107.1.x86_64",
"product_id": "kernel-debug-base-4.4.180-94.107.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-4.4.180-94.107.1.x86_64",
"product": {
"name": "kernel-debug-devel-4.4.180-94.107.1.x86_64",
"product_id": "kernel-debug-devel-4.4.180-94.107.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-extra-4.4.180-94.107.1.x86_64",
"product": {
"name": "kernel-debug-extra-4.4.180-94.107.1.x86_64",
"product_id": "kernel-debug-extra-4.4.180-94.107.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-kgraft-4.4.180-94.107.1.x86_64",
"product": {
"name": "kernel-debug-kgraft-4.4.180-94.107.1.x86_64",
"product_id": "kernel-debug-kgraft-4.4.180-94.107.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.4.180-94.107.1.x86_64",
"product": {
"name": "kernel-default-extra-4.4.180-94.107.1.x86_64",
"product_id": "kernel-default-extra-4.4.180-94.107.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.4.180-94.107.1.x86_64",
"product": {
"name": "kernel-obs-build-4.4.180-94.107.1.x86_64",
"product_id": "kernel-obs-build-4.4.180-94.107.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.4.180-94.107.1.x86_64",
"product": {
"name": "kernel-obs-qa-4.4.180-94.107.1.x86_64",
"product_id": "kernel-obs-qa-4.4.180-94.107.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.4.180-94.107.1.x86_64",
"product": {
"name": "kernel-vanilla-4.4.180-94.107.1.x86_64",
"product_id": "kernel-vanilla-4.4.180-94.107.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.4.180-94.107.1.x86_64",
"product": {
"name": "kernel-vanilla-base-4.4.180-94.107.1.x86_64",
"product_id": "kernel-vanilla-base-4.4.180-94.107.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.4.180-94.107.1.x86_64",
"product": {
"name": "kernel-vanilla-devel-4.4.180-94.107.1.x86_64",
"product_id": "kernel-vanilla-devel-4.4.180-94.107.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-debug-4.4.180-94.107.1.x86_64",
"product": {
"name": "kselftests-kmp-debug-4.4.180-94.107.1.x86_64",
"product_id": "kselftests-kmp-debug-4.4.180-94.107.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.4.180-94.107.1.x86_64",
"product": {
"name": "kselftests-kmp-default-4.4.180-94.107.1.x86_64",
"product_id": "kselftests-kmp-default-4.4.180-94.107.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-debug-4.4.180-94.107.1.x86_64",
"product": {
"name": "ocfs2-kmp-debug-4.4.180-94.107.1.x86_64",
"product_id": "ocfs2-kmp-debug-4.4.180-94.107.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.4.180-94.107.1.x86_64",
"product": {
"name": "ocfs2-kmp-default-4.4.180-94.107.1.x86_64",
"product_id": "ocfs2-kmp-default-4.4.180-94.107.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "HPE Helion OpenStack 8",
"product": {
"name": "HPE Helion OpenStack 8",
"product_id": "HPE Helion OpenStack 8",
"product_identification_helper": {
"cpe": "cpe:/o:suse:hpe-helion-openstack:8"
}
}
},
{
"category": "product_name",
"name": "SUSE OpenStack Cloud 8",
"product": {
"name": "SUSE OpenStack Cloud 8",
"product_id": "SUSE OpenStack Cloud 8",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-openstack-cloud:8"
}
}
},
{
"category": "product_name",
"name": "SUSE OpenStack Cloud Crowbar 8",
"product": {
"name": "SUSE OpenStack Cloud Crowbar 8",
"product_id": "SUSE OpenStack Cloud Crowbar 8",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-openstack-cloud-crowbar:8"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Availability Extension 12 SP3",
"product": {
"name": "SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-ha:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP3-BCL",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP3-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP3-BCL",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-bcl:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Enterprise Storage 5",
"product": {
"name": "SUSE Enterprise Storage 5",
"product_id": "SUSE Enterprise Storage 5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:ses:5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.180-94.107.1.x86_64 as component of HPE Helion OpenStack 8",
"product_id": "HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64"
},
"product_reference": "kernel-default-4.4.180-94.107.1.x86_64",
"relates_to_product_reference": "HPE Helion OpenStack 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.180-94.107.1.x86_64 as component of HPE Helion OpenStack 8",
"product_id": "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64"
},
"product_reference": "kernel-default-base-4.4.180-94.107.1.x86_64",
"relates_to_product_reference": "HPE Helion OpenStack 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.180-94.107.1.x86_64 as component of HPE Helion OpenStack 8",
"product_id": "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64"
},
"product_reference": "kernel-default-devel-4.4.180-94.107.1.x86_64",
"relates_to_product_reference": "HPE Helion OpenStack 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-4.4.180-94.107.1.x86_64 as component of HPE Helion OpenStack 8",
"product_id": "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64"
},
"product_reference": "kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"relates_to_product_reference": "HPE Helion OpenStack 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.4.180-94.107.1.noarch as component of HPE Helion OpenStack 8",
"product_id": "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch"
},
"product_reference": "kernel-devel-4.4.180-94.107.1.noarch",
"relates_to_product_reference": "HPE Helion OpenStack 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.4.180-94.107.1.noarch as component of HPE Helion OpenStack 8",
"product_id": "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch"
},
"product_reference": "kernel-macros-4.4.180-94.107.1.noarch",
"relates_to_product_reference": "HPE Helion OpenStack 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.4.180-94.107.1.noarch as component of HPE Helion OpenStack 8",
"product_id": "HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch"
},
"product_reference": "kernel-source-4.4.180-94.107.1.noarch",
"relates_to_product_reference": "HPE Helion OpenStack 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.180-94.107.1.x86_64 as component of HPE Helion OpenStack 8",
"product_id": "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64"
},
"product_reference": "kernel-syms-4.4.180-94.107.1.x86_64",
"relates_to_product_reference": "HPE Helion OpenStack 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64 as component of HPE Helion OpenStack 8",
"product_id": "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"relates_to_product_reference": "HPE Helion OpenStack 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.180-94.107.1.x86_64 as component of SUSE OpenStack Cloud 8",
"product_id": "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64"
},
"product_reference": "kernel-default-4.4.180-94.107.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.180-94.107.1.x86_64 as component of SUSE OpenStack Cloud 8",
"product_id": "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64"
},
"product_reference": "kernel-default-base-4.4.180-94.107.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.180-94.107.1.x86_64 as component of SUSE OpenStack Cloud 8",
"product_id": "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64"
},
"product_reference": "kernel-default-devel-4.4.180-94.107.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-4.4.180-94.107.1.x86_64 as component of SUSE OpenStack Cloud 8",
"product_id": "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64"
},
"product_reference": "kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.4.180-94.107.1.noarch as component of SUSE OpenStack Cloud 8",
"product_id": "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch"
},
"product_reference": "kernel-devel-4.4.180-94.107.1.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.4.180-94.107.1.noarch as component of SUSE OpenStack Cloud 8",
"product_id": "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch"
},
"product_reference": "kernel-macros-4.4.180-94.107.1.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.4.180-94.107.1.noarch as component of SUSE OpenStack Cloud 8",
"product_id": "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch"
},
"product_reference": "kernel-source-4.4.180-94.107.1.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.180-94.107.1.x86_64 as component of SUSE OpenStack Cloud 8",
"product_id": "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64"
},
"product_reference": "kernel-syms-4.4.180-94.107.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64 as component of SUSE OpenStack Cloud 8",
"product_id": "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.180-94.107.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8",
"product_id": "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64"
},
"product_reference": "kernel-default-4.4.180-94.107.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.180-94.107.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8",
"product_id": "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64"
},
"product_reference": "kernel-default-base-4.4.180-94.107.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.180-94.107.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8",
"product_id": "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64"
},
"product_reference": "kernel-default-devel-4.4.180-94.107.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-4.4.180-94.107.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8",
"product_id": "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64"
},
"product_reference": "kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.4.180-94.107.1.noarch as component of SUSE OpenStack Cloud Crowbar 8",
"product_id": "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch"
},
"product_reference": "kernel-devel-4.4.180-94.107.1.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.4.180-94.107.1.noarch as component of SUSE OpenStack Cloud Crowbar 8",
"product_id": "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch"
},
"product_reference": "kernel-macros-4.4.180-94.107.1.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.4.180-94.107.1.noarch as component of SUSE OpenStack Cloud Crowbar 8",
"product_id": "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch"
},
"product_reference": "kernel-source-4.4.180-94.107.1.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.180-94.107.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8",
"product_id": "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64"
},
"product_reference": "kernel-syms-4.4.180-94.107.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8",
"product_id": "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.4.180-94.107.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le"
},
"product_reference": "cluster-md-kmp-default-4.4.180-94.107.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.4.180-94.107.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x"
},
"product_reference": "cluster-md-kmp-default-4.4.180-94.107.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.4.180-94.107.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64"
},
"product_reference": "cluster-md-kmp-default-4.4.180-94.107.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.4.180-94.107.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le"
},
"product_reference": "dlm-kmp-default-4.4.180-94.107.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.4.180-94.107.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x"
},
"product_reference": "dlm-kmp-default-4.4.180-94.107.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.4.180-94.107.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64"
},
"product_reference": "dlm-kmp-default-4.4.180-94.107.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.4.180-94.107.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le"
},
"product_reference": "gfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.4.180-94.107.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x"
},
"product_reference": "gfs2-kmp-default-4.4.180-94.107.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.4.180-94.107.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64"
},
"product_reference": "gfs2-kmp-default-4.4.180-94.107.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.4.180-94.107.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le"
},
"product_reference": "ocfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.4.180-94.107.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x"
},
"product_reference": "ocfs2-kmp-default-4.4.180-94.107.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.4.180-94.107.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64"
},
"product_reference": "ocfs2-kmp-default-4.4.180-94.107.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.180-94.107.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le"
},
"product_reference": "kernel-default-4.4.180-94.107.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.180-94.107.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64"
},
"product_reference": "kernel-default-4.4.180-94.107.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.180-94.107.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le"
},
"product_reference": "kernel-default-base-4.4.180-94.107.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.180-94.107.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64"
},
"product_reference": "kernel-default-base-4.4.180-94.107.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.180-94.107.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le"
},
"product_reference": "kernel-default-devel-4.4.180-94.107.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.180-94.107.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64"
},
"product_reference": "kernel-default-devel-4.4.180-94.107.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-4.4.180-94.107.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le"
},
"product_reference": "kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-4.4.180-94.107.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64"
},
"product_reference": "kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.4.180-94.107.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch"
},
"product_reference": "kernel-devel-4.4.180-94.107.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.4.180-94.107.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch"
},
"product_reference": "kernel-macros-4.4.180-94.107.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.4.180-94.107.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch"
},
"product_reference": "kernel-source-4.4.180-94.107.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.180-94.107.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le"
},
"product_reference": "kernel-syms-4.4.180-94.107.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.180-94.107.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64"
},
"product_reference": "kernel-syms-4.4.180-94.107.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.180-94.107.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64"
},
"product_reference": "kernel-default-4.4.180-94.107.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.180-94.107.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le"
},
"product_reference": "kernel-default-4.4.180-94.107.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.180-94.107.1.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x"
},
"product_reference": "kernel-default-4.4.180-94.107.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.180-94.107.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64"
},
"product_reference": "kernel-default-4.4.180-94.107.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.180-94.107.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64"
},
"product_reference": "kernel-default-base-4.4.180-94.107.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.180-94.107.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le"
},
"product_reference": "kernel-default-base-4.4.180-94.107.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.180-94.107.1.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x"
},
"product_reference": "kernel-default-base-4.4.180-94.107.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.180-94.107.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64"
},
"product_reference": "kernel-default-base-4.4.180-94.107.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.180-94.107.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64"
},
"product_reference": "kernel-default-devel-4.4.180-94.107.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.180-94.107.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le"
},
"product_reference": "kernel-default-devel-4.4.180-94.107.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.180-94.107.1.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x"
},
"product_reference": "kernel-default-devel-4.4.180-94.107.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.180-94.107.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64"
},
"product_reference": "kernel-default-devel-4.4.180-94.107.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-4.4.180-94.107.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le"
},
"product_reference": "kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-4.4.180-94.107.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64"
},
"product_reference": "kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-4.4.180-94.107.1.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x"
},
"product_reference": "kernel-default-man-4.4.180-94.107.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.4.180-94.107.1.noarch as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch"
},
"product_reference": "kernel-devel-4.4.180-94.107.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.4.180-94.107.1.noarch as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch"
},
"product_reference": "kernel-macros-4.4.180-94.107.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.4.180-94.107.1.noarch as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch"
},
"product_reference": "kernel-source-4.4.180-94.107.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.180-94.107.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64"
},
"product_reference": "kernel-syms-4.4.180-94.107.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.180-94.107.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le"
},
"product_reference": "kernel-syms-4.4.180-94.107.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.180-94.107.1.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x"
},
"product_reference": "kernel-syms-4.4.180-94.107.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.180-94.107.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64"
},
"product_reference": "kernel-syms-4.4.180-94.107.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.180-94.107.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64"
},
"product_reference": "kernel-default-4.4.180-94.107.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.180-94.107.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64"
},
"product_reference": "kernel-default-base-4.4.180-94.107.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.180-94.107.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64"
},
"product_reference": "kernel-default-devel-4.4.180-94.107.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.4.180-94.107.1.noarch as component of SUSE Linux Enterprise Server 12 SP3-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch"
},
"product_reference": "kernel-devel-4.4.180-94.107.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.4.180-94.107.1.noarch as component of SUSE Linux Enterprise Server 12 SP3-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch"
},
"product_reference": "kernel-macros-4.4.180-94.107.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.4.180-94.107.1.noarch as component of SUSE Linux Enterprise Server 12 SP3-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch"
},
"product_reference": "kernel-source-4.4.180-94.107.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.180-94.107.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64"
},
"product_reference": "kernel-syms-4.4.180-94.107.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.180-94.107.1.aarch64 as component of SUSE Enterprise Storage 5",
"product_id": "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64"
},
"product_reference": "kernel-default-4.4.180-94.107.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.180-94.107.1.x86_64 as component of SUSE Enterprise Storage 5",
"product_id": "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64"
},
"product_reference": "kernel-default-4.4.180-94.107.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.180-94.107.1.aarch64 as component of SUSE Enterprise Storage 5",
"product_id": "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64"
},
"product_reference": "kernel-default-base-4.4.180-94.107.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.180-94.107.1.x86_64 as component of SUSE Enterprise Storage 5",
"product_id": "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64"
},
"product_reference": "kernel-default-base-4.4.180-94.107.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.180-94.107.1.aarch64 as component of SUSE Enterprise Storage 5",
"product_id": "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64"
},
"product_reference": "kernel-default-devel-4.4.180-94.107.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.180-94.107.1.x86_64 as component of SUSE Enterprise Storage 5",
"product_id": "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64"
},
"product_reference": "kernel-default-devel-4.4.180-94.107.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-4.4.180-94.107.1.x86_64 as component of SUSE Enterprise Storage 5",
"product_id": "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64"
},
"product_reference": "kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.4.180-94.107.1.noarch as component of SUSE Enterprise Storage 5",
"product_id": "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch"
},
"product_reference": "kernel-devel-4.4.180-94.107.1.noarch",
"relates_to_product_reference": "SUSE Enterprise Storage 5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.4.180-94.107.1.noarch as component of SUSE Enterprise Storage 5",
"product_id": "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch"
},
"product_reference": "kernel-macros-4.4.180-94.107.1.noarch",
"relates_to_product_reference": "SUSE Enterprise Storage 5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.4.180-94.107.1.noarch as component of SUSE Enterprise Storage 5",
"product_id": "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch"
},
"product_reference": "kernel-source-4.4.180-94.107.1.noarch",
"relates_to_product_reference": "SUSE Enterprise Storage 5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.180-94.107.1.aarch64 as component of SUSE Enterprise Storage 5",
"product_id": "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64"
},
"product_reference": "kernel-syms-4.4.180-94.107.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.180-94.107.1.x86_64 as component of SUSE Enterprise Storage 5",
"product_id": "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64"
},
"product_reference": "kernel-syms-4.4.180-94.107.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64 as component of SUSE Enterprise Storage 5",
"product_id": "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2016-10906",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-10906"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in drivers/net/ethernet/arc/emac_main.c in the Linux kernel before 4.5. A use-after-free is caused by a race condition between the functions arc_emac_tx and arc_emac_tx_clean.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-10906",
"url": "https://www.suse.com/security/cve/CVE-2016-10906"
},
{
"category": "external",
"summary": "SUSE Bug 1146584 for CVE-2016-10906",
"url": "https://bugzilla.suse.com/1146584"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:H",
"version": "3.0"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-15T06:29:59Z",
"details": "moderate"
}
],
"title": "CVE-2016-10906"
},
{
"cve": "CVE-2017-18379",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-18379"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel before 4.14, an out of boundary access happened in drivers/nvme/target/fc.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-18379",
"url": "https://www.suse.com/security/cve/CVE-2017-18379"
},
{
"category": "external",
"summary": "SUSE Bug 1143187 for CVE-2017-18379",
"url": "https://bugzilla.suse.com/1143187"
},
{
"category": "external",
"summary": "SUSE Bug 1145604 for CVE-2017-18379",
"url": "https://bugzilla.suse.com/1145604"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-15T06:29:59Z",
"details": "moderate"
}
],
"title": "CVE-2017-18379"
},
{
"cve": "CVE-2017-18509",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-18509"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in net/ipv6/ip6mr.c in the Linux kernel before 4.11. By setting a specific socket option, an attacker can control a pointer in kernel land and cause an inet_csk_listen_stop general protection fault, or potentially execute arbitrary code under certain circumstances. The issue can be triggered as root (e.g., inside a default LXC container or with the CAP_NET_ADMIN capability) or after namespace unsharing. This occurs because sk_type and protocol are not checked in the appropriate part of the ip6_mroute_* functions. NOTE: this affects Linux distributions that use 4.9.x longterm kernels before 4.9.187.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-18509",
"url": "https://www.suse.com/security/cve/CVE-2017-18509"
},
{
"category": "external",
"summary": "SUSE Bug 1145477 for CVE-2017-18509",
"url": "https://bugzilla.suse.com/1145477"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-15T06:29:59Z",
"details": "moderate"
}
],
"title": "CVE-2017-18509"
},
{
"cve": "CVE-2017-18551",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-18551"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in drivers/i2c/i2c-core-smbus.c in the Linux kernel before 4.14.15. There is an out of bounds write in the function i2c_smbus_xfer_emulated.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-18551",
"url": "https://www.suse.com/security/cve/CVE-2017-18551"
},
{
"category": "external",
"summary": "SUSE Bug 1146163 for CVE-2017-18551",
"url": "https://bugzilla.suse.com/1146163"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.0"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-15T06:29:59Z",
"details": "moderate"
}
],
"title": "CVE-2017-18551"
},
{
"cve": "CVE-2017-18595",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-18595"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 4.14.11. A double free may be caused by the function allocate_trace_buffer in the file kernel/trace/trace.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-18595",
"url": "https://www.suse.com/security/cve/CVE-2017-18595"
},
{
"category": "external",
"summary": "SUSE Bug 1149555 for CVE-2017-18595",
"url": "https://bugzilla.suse.com/1149555"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
"version": "3.0"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-15T06:29:59Z",
"details": "moderate"
}
],
"title": "CVE-2017-18595"
},
{
"cve": "CVE-2018-12207",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-12207"
}
],
"notes": [
{
"category": "general",
"text": "Improper invalidation for page table updates by a virtual guest operating system for multiple Intel(R) Processors may allow an authenticated user to potentially enable denial of service of the host system via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-12207",
"url": "https://www.suse.com/security/cve/CVE-2018-12207"
},
{
"category": "external",
"summary": "SUSE Bug 1117665 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1117665"
},
{
"category": "external",
"summary": "SUSE Bug 1139073 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1139073"
},
{
"category": "external",
"summary": "SUSE Bug 1152505 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1152505"
},
{
"category": "external",
"summary": "SUSE Bug 1155812 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1155812"
},
{
"category": "external",
"summary": "SUSE Bug 1155817 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1155817"
},
{
"category": "external",
"summary": "SUSE Bug 1155945 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1155945"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1201877"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-15T06:29:59Z",
"details": "moderate"
}
],
"title": "CVE-2018-12207"
},
{
"cve": "CVE-2018-20976",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-20976"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in fs/xfs/xfs_super.c in the Linux kernel before 4.18. A use after free exists, related to xfs_fs_fill_super failure.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-20976",
"url": "https://www.suse.com/security/cve/CVE-2018-20976"
},
{
"category": "external",
"summary": "SUSE Bug 1146285 for CVE-2018-20976",
"url": "https://bugzilla.suse.com/1146285"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L",
"version": "3.0"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-15T06:29:59Z",
"details": "moderate"
}
],
"title": "CVE-2018-20976"
},
{
"cve": "CVE-2019-0154",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-0154"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient access control in subsystem for Intel (R) processor graphics in 6th, 7th, 8th and 9th Generation Intel(R) Core(TM) Processor Families; Intel(R) Pentium(R) Processor J, N, Silver and Gold Series; Intel(R) Celeron(R) Processor J, N, G3900 and G4900 Series; Intel(R) Atom(R) Processor A and E3900 Series; Intel(R) Xeon(R) Processor E3-1500 v5 and v6 and E-2100 Processor Families may allow an authenticated user to potentially enable denial of service via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-0154",
"url": "https://www.suse.com/security/cve/CVE-2019-0154"
},
{
"category": "external",
"summary": "SUSE Bug 1135966 for CVE-2019-0154",
"url": "https://bugzilla.suse.com/1135966"
},
{
"category": "external",
"summary": "SUSE Bug 1181720 for CVE-2019-0154",
"url": "https://bugzilla.suse.com/1181720"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-15T06:29:59Z",
"details": "important"
}
],
"title": "CVE-2019-0154"
},
{
"cve": "CVE-2019-0155",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-0155"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient access control in a subsystem for Intel (R) processor graphics in 6th, 7th, 8th and 9th Generation Intel(R) Core(TM) Processor Families; Intel(R) Pentium(R) Processor J, N, Silver and Gold Series; Intel(R) Celeron(R) Processor J, N, G3900 and G4900 Series; Intel(R) Atom(R) Processor A and E3900 Series; Intel(R) Xeon(R) Processor E3-1500 v5 and v6, E-2100 and E-2200 Processor Families; Intel(R) Graphics Driver for Windows before 26.20.100.6813 (DCH) or 26.20.100.6812 and before 21.20.x.5077 (aka15.45.5077), i915 Linux Driver for Intel(R) Processor Graphics before versions 5.4-rc7, 5.3.11, 4.19.84, 4.14.154, 4.9.201, 4.4.201 may allow an authenticated user to potentially enable escalation of privilege via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-0155",
"url": "https://www.suse.com/security/cve/CVE-2019-0155"
},
{
"category": "external",
"summary": "SUSE Bug 1135966 for CVE-2019-0155",
"url": "https://bugzilla.suse.com/1135966"
},
{
"category": "external",
"summary": "SUSE Bug 1135967 for CVE-2019-0155",
"url": "https://bugzilla.suse.com/1135967"
},
{
"category": "external",
"summary": "SUSE Bug 1173663 for CVE-2019-0155",
"url": "https://bugzilla.suse.com/1173663"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-15T06:29:59Z",
"details": "important"
}
],
"title": "CVE-2019-0155"
},
{
"cve": "CVE-2019-10220",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-10220"
}
],
"notes": [
{
"category": "general",
"text": "Linux kernel CIFS implementation, version 4.9.0 is vulnerable to a relative paths injection in directory entry lists.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-10220",
"url": "https://www.suse.com/security/cve/CVE-2019-10220"
},
{
"category": "external",
"summary": "SUSE Bug 1144903 for CVE-2019-10220",
"url": "https://bugzilla.suse.com/1144903"
},
{
"category": "external",
"summary": "SUSE Bug 1153108 for CVE-2019-10220",
"url": "https://bugzilla.suse.com/1153108"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-15T06:29:59Z",
"details": "important"
}
],
"title": "CVE-2019-10220"
},
{
"cve": "CVE-2019-11135",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11135"
}
],
"notes": [
{
"category": "general",
"text": "TSX Asynchronous Abort condition on some CPUs utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11135",
"url": "https://www.suse.com/security/cve/CVE-2019-11135"
},
{
"category": "external",
"summary": "SUSE Bug 1139073 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1139073"
},
{
"category": "external",
"summary": "SUSE Bug 1152497 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1152497"
},
{
"category": "external",
"summary": "SUSE Bug 1152505 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1152505"
},
{
"category": "external",
"summary": "SUSE Bug 1152506 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1152506"
},
{
"category": "external",
"summary": "SUSE Bug 1160120 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1160120"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1201877"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-15T06:29:59Z",
"details": "moderate"
}
],
"title": "CVE-2019-11135"
},
{
"cve": "CVE-2019-13272",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-13272"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel before 5.1.17, ptrace_link in kernel/ptrace.c mishandles the recording of the credentials of a process that wants to create a ptrace relationship, which allows local users to obtain root access by leveraging certain scenarios with a parent-child process relationship, where a parent drops privileges and calls execve (potentially allowing control by an attacker). One contributing factor is an object lifetime issue (which can also cause a panic). Another contributing factor is incorrect marking of a ptrace relationship as privileged, which is exploitable through (for example) Polkit\u0027s pkexec helper with PTRACE_TRACEME. NOTE: SELinux deny_ptrace might be a usable workaround in some environments.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-13272",
"url": "https://www.suse.com/security/cve/CVE-2019-13272"
},
{
"category": "external",
"summary": "SUSE Bug 1140671 for CVE-2019-13272",
"url": "https://bugzilla.suse.com/1140671"
},
{
"category": "external",
"summary": "SUSE Bug 1156321 for CVE-2019-13272",
"url": "https://bugzilla.suse.com/1156321"
},
{
"category": "external",
"summary": "SUSE Bug 1198122 for CVE-2019-13272",
"url": "https://bugzilla.suse.com/1198122"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-15T06:29:59Z",
"details": "important"
}
],
"title": "CVE-2019-13272"
},
{
"cve": "CVE-2019-14814",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-14814"
}
],
"notes": [
{
"category": "general",
"text": "There is heap-based buffer overflow in Linux kernel, all versions up to, excluding 5.3, in the marvell wifi chip driver in Linux kernel, that allows local users to cause a denial of service(system crash) or possibly execute arbitrary code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-14814",
"url": "https://www.suse.com/security/cve/CVE-2019-14814"
},
{
"category": "external",
"summary": "SUSE Bug 1146512 for CVE-2019-14814",
"url": "https://bugzilla.suse.com/1146512"
},
{
"category": "external",
"summary": "SUSE Bug 1173664 for CVE-2019-14814",
"url": "https://bugzilla.suse.com/1173664"
},
{
"category": "external",
"summary": "SUSE Bug 1173665 for CVE-2019-14814",
"url": "https://bugzilla.suse.com/1173665"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-15T06:29:59Z",
"details": "important"
}
],
"title": "CVE-2019-14814"
},
{
"cve": "CVE-2019-14815",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-14815"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability was found in Linux Kernel, where a Heap Overflow was found in mwifiex_set_wmm_params() function of Marvell Wifi Driver.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-14815",
"url": "https://www.suse.com/security/cve/CVE-2019-14815"
},
{
"category": "external",
"summary": "SUSE Bug 1146514 for CVE-2019-14815",
"url": "https://bugzilla.suse.com/1146514"
},
{
"category": "external",
"summary": "SUSE Bug 1173665 for CVE-2019-14815",
"url": "https://bugzilla.suse.com/1173665"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-15T06:29:59Z",
"details": "important"
}
],
"title": "CVE-2019-14815"
},
{
"cve": "CVE-2019-14816",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-14816"
}
],
"notes": [
{
"category": "general",
"text": "There is heap-based buffer overflow in kernel, all versions up to, excluding 5.3, in the marvell wifi chip driver in Linux kernel, that allows local users to cause a denial of service(system crash) or possibly execute arbitrary code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-14816",
"url": "https://www.suse.com/security/cve/CVE-2019-14816"
},
{
"category": "external",
"summary": "SUSE Bug 1146516 for CVE-2019-14816",
"url": "https://bugzilla.suse.com/1146516"
},
{
"category": "external",
"summary": "SUSE Bug 1173666 for CVE-2019-14816",
"url": "https://bugzilla.suse.com/1173666"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-15T06:29:59Z",
"details": "important"
}
],
"title": "CVE-2019-14816"
},
{
"cve": "CVE-2019-14821",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-14821"
}
],
"notes": [
{
"category": "general",
"text": "An out-of-bounds access issue was found in the Linux kernel, all versions through 5.3, in the way Linux kernel\u0027s KVM hypervisor implements the Coalesced MMIO write operation. It operates on an MMIO ring buffer \u0027struct kvm_coalesced_mmio\u0027 object, wherein write indices \u0027ring-\u003efirst\u0027 and \u0027ring-\u003elast\u0027 value could be supplied by a host user-space process. An unprivileged host user or process with access to \u0027/dev/kvm\u0027 device could use this flaw to crash the host kernel, resulting in a denial of service or potentially escalating privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-14821",
"url": "https://www.suse.com/security/cve/CVE-2019-14821"
},
{
"category": "external",
"summary": "SUSE Bug 1151350 for CVE-2019-14821",
"url": "https://bugzilla.suse.com/1151350"
},
{
"category": "external",
"summary": "SUSE Bug 1218966 for CVE-2019-14821",
"url": "https://bugzilla.suse.com/1218966"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.0"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-15T06:29:59Z",
"details": "moderate"
}
],
"title": "CVE-2019-14821"
},
{
"cve": "CVE-2019-14835",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-14835"
}
],
"notes": [
{
"category": "general",
"text": "A buffer overflow flaw was found, in versions from 2.6.34 to 5.2.x, in the way Linux kernel\u0027s vhost functionality that translates virtqueue buffers to IOVs, logged the buffer descriptors during migration. A privileged guest user able to pass descriptors with invalid length to the host when migration is underway, could use this flaw to increase their privileges on the host.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-14835",
"url": "https://www.suse.com/security/cve/CVE-2019-14835"
},
{
"category": "external",
"summary": "SUSE Bug 1150112 for CVE-2019-14835",
"url": "https://bugzilla.suse.com/1150112"
},
{
"category": "external",
"summary": "SUSE Bug 1151021 for CVE-2019-14835",
"url": "https://bugzilla.suse.com/1151021"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-15T06:29:59Z",
"details": "important"
}
],
"title": "CVE-2019-14835"
},
{
"cve": "CVE-2019-15098",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15098"
}
],
"notes": [
{
"category": "general",
"text": "drivers/net/wireless/ath/ath6kl/usb.c in the Linux kernel through 5.2.9 has a NULL pointer dereference via an incomplete address in an endpoint descriptor.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15098",
"url": "https://www.suse.com/security/cve/CVE-2019-15098"
},
{
"category": "external",
"summary": "SUSE Bug 1146378 for CVE-2019-15098",
"url": "https://bugzilla.suse.com/1146378"
},
{
"category": "external",
"summary": "SUSE Bug 1146543 for CVE-2019-15098",
"url": "https://bugzilla.suse.com/1146543"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H",
"version": "3.0"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-15T06:29:59Z",
"details": "moderate"
}
],
"title": "CVE-2019-15098"
},
{
"cve": "CVE-2019-15211",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15211"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.2.6. There is a use-after-free caused by a malicious USB device in the drivers/media/v4l2-core/v4l2-dev.c driver because drivers/media/radio/radio-raremono.c does not properly allocate memory.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15211",
"url": "https://www.suse.com/security/cve/CVE-2019-15211"
},
{
"category": "external",
"summary": "SUSE Bug 1146519 for CVE-2019-15211",
"url": "https://bugzilla.suse.com/1146519"
},
{
"category": "external",
"summary": "SUSE Bug 1158381 for CVE-2019-15211",
"url": "https://bugzilla.suse.com/1158381"
},
{
"category": "external",
"summary": "SUSE Bug 1158834 for CVE-2019-15211",
"url": "https://bugzilla.suse.com/1158834"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.0"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-15T06:29:59Z",
"details": "moderate"
}
],
"title": "CVE-2019-15211"
},
{
"cve": "CVE-2019-15212",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15212"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.1.8. There is a double-free caused by a malicious USB device in the drivers/usb/misc/rio500.c driver.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15212",
"url": "https://www.suse.com/security/cve/CVE-2019-15212"
},
{
"category": "external",
"summary": "SUSE Bug 1146391 for CVE-2019-15212",
"url": "https://bugzilla.suse.com/1146391"
},
{
"category": "external",
"summary": "SUSE Bug 1146519 for CVE-2019-15212",
"url": "https://bugzilla.suse.com/1146519"
},
{
"category": "external",
"summary": "SUSE Bug 1158381 for CVE-2019-15212",
"url": "https://bugzilla.suse.com/1158381"
},
{
"category": "external",
"summary": "SUSE Bug 1158834 for CVE-2019-15212",
"url": "https://bugzilla.suse.com/1158834"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H",
"version": "3.0"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-15T06:29:59Z",
"details": "moderate"
}
],
"title": "CVE-2019-15212"
},
{
"cve": "CVE-2019-15214",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15214"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.0.10. There is a use-after-free in the sound subsystem because card disconnection causes certain data structures to be deleted too early. This is related to sound/core/init.c and sound/core/info.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15214",
"url": "https://www.suse.com/security/cve/CVE-2019-15214"
},
{
"category": "external",
"summary": "SUSE Bug 1146519 for CVE-2019-15214",
"url": "https://bugzilla.suse.com/1146519"
},
{
"category": "external",
"summary": "SUSE Bug 1146550 for CVE-2019-15214",
"url": "https://bugzilla.suse.com/1146550"
},
{
"category": "external",
"summary": "SUSE Bug 1158381 for CVE-2019-15214",
"url": "https://bugzilla.suse.com/1158381"
},
{
"category": "external",
"summary": "SUSE Bug 1158834 for CVE-2019-15214",
"url": "https://bugzilla.suse.com/1158834"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-15T06:29:59Z",
"details": "low"
}
],
"title": "CVE-2019-15214"
},
{
"cve": "CVE-2019-15215",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15215"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.2.6. There is a use-after-free caused by a malicious USB device in the drivers/media/usb/cpia2/cpia2_usb.c driver.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15215",
"url": "https://www.suse.com/security/cve/CVE-2019-15215"
},
{
"category": "external",
"summary": "SUSE Bug 1146425 for CVE-2019-15215",
"url": "https://bugzilla.suse.com/1146425"
},
{
"category": "external",
"summary": "SUSE Bug 1146519 for CVE-2019-15215",
"url": "https://bugzilla.suse.com/1146519"
},
{
"category": "external",
"summary": "SUSE Bug 1158381 for CVE-2019-15215",
"url": "https://bugzilla.suse.com/1158381"
},
{
"category": "external",
"summary": "SUSE Bug 1158834 for CVE-2019-15215",
"url": "https://bugzilla.suse.com/1158834"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.0"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-15T06:29:59Z",
"details": "moderate"
}
],
"title": "CVE-2019-15215"
},
{
"cve": "CVE-2019-15216",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15216"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.0.14. There is a NULL pointer dereference caused by a malicious USB device in the drivers/usb/misc/yurex.c driver.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15216",
"url": "https://www.suse.com/security/cve/CVE-2019-15216"
},
{
"category": "external",
"summary": "SUSE Bug 1146361 for CVE-2019-15216",
"url": "https://bugzilla.suse.com/1146361"
},
{
"category": "external",
"summary": "SUSE Bug 1146519 for CVE-2019-15216",
"url": "https://bugzilla.suse.com/1146519"
},
{
"category": "external",
"summary": "SUSE Bug 1158381 for CVE-2019-15216",
"url": "https://bugzilla.suse.com/1158381"
},
{
"category": "external",
"summary": "SUSE Bug 1158834 for CVE-2019-15216",
"url": "https://bugzilla.suse.com/1158834"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H",
"version": "3.0"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-15T06:29:59Z",
"details": "moderate"
}
],
"title": "CVE-2019-15216"
},
{
"cve": "CVE-2019-15217",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15217"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.2.3. There is a NULL pointer dereference caused by a malicious USB device in the drivers/media/usb/zr364xx/zr364xx.c driver.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15217",
"url": "https://www.suse.com/security/cve/CVE-2019-15217"
},
{
"category": "external",
"summary": "SUSE Bug 1146519 for CVE-2019-15217",
"url": "https://bugzilla.suse.com/1146519"
},
{
"category": "external",
"summary": "SUSE Bug 1146547 for CVE-2019-15217",
"url": "https://bugzilla.suse.com/1146547"
},
{
"category": "external",
"summary": "SUSE Bug 1158381 for CVE-2019-15217",
"url": "https://bugzilla.suse.com/1158381"
},
{
"category": "external",
"summary": "SUSE Bug 1158834 for CVE-2019-15217",
"url": "https://bugzilla.suse.com/1158834"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-15T06:29:59Z",
"details": "moderate"
}
],
"title": "CVE-2019-15217"
},
{
"cve": "CVE-2019-15218",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15218"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.1.8. There is a NULL pointer dereference caused by a malicious USB device in the drivers/media/usb/siano/smsusb.c driver.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15218",
"url": "https://www.suse.com/security/cve/CVE-2019-15218"
},
{
"category": "external",
"summary": "SUSE Bug 1146413 for CVE-2019-15218",
"url": "https://bugzilla.suse.com/1146413"
},
{
"category": "external",
"summary": "SUSE Bug 1146519 for CVE-2019-15218",
"url": "https://bugzilla.suse.com/1146519"
},
{
"category": "external",
"summary": "SUSE Bug 1158381 for CVE-2019-15218",
"url": "https://bugzilla.suse.com/1158381"
},
{
"category": "external",
"summary": "SUSE Bug 1158834 for CVE-2019-15218",
"url": "https://bugzilla.suse.com/1158834"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-15T06:29:59Z",
"details": "moderate"
}
],
"title": "CVE-2019-15218"
},
{
"cve": "CVE-2019-15219",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15219"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.1.8. There is a NULL pointer dereference caused by a malicious USB device in the drivers/usb/misc/sisusbvga/sisusb.c driver.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15219",
"url": "https://www.suse.com/security/cve/CVE-2019-15219"
},
{
"category": "external",
"summary": "SUSE Bug 1146519 for CVE-2019-15219",
"url": "https://bugzilla.suse.com/1146519"
},
{
"category": "external",
"summary": "SUSE Bug 1146524 for CVE-2019-15219",
"url": "https://bugzilla.suse.com/1146524"
},
{
"category": "external",
"summary": "SUSE Bug 1158381 for CVE-2019-15219",
"url": "https://bugzilla.suse.com/1158381"
},
{
"category": "external",
"summary": "SUSE Bug 1158834 for CVE-2019-15219",
"url": "https://bugzilla.suse.com/1158834"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-15T06:29:59Z",
"details": "moderate"
}
],
"title": "CVE-2019-15219"
},
{
"cve": "CVE-2019-15220",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15220"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.2.1. There is a use-after-free caused by a malicious USB device in the drivers/net/wireless/intersil/p54/p54usb.c driver.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15220",
"url": "https://www.suse.com/security/cve/CVE-2019-15220"
},
{
"category": "external",
"summary": "SUSE Bug 1146519 for CVE-2019-15220",
"url": "https://bugzilla.suse.com/1146519"
},
{
"category": "external",
"summary": "SUSE Bug 1146526 for CVE-2019-15220",
"url": "https://bugzilla.suse.com/1146526"
},
{
"category": "external",
"summary": "SUSE Bug 1158381 for CVE-2019-15220",
"url": "https://bugzilla.suse.com/1158381"
},
{
"category": "external",
"summary": "SUSE Bug 1158834 for CVE-2019-15220",
"url": "https://bugzilla.suse.com/1158834"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H",
"version": "3.0"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-15T06:29:59Z",
"details": "moderate"
}
],
"title": "CVE-2019-15220"
},
{
"cve": "CVE-2019-15221",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15221"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.1.17. There is a NULL pointer dereference caused by a malicious USB device in the sound/usb/line6/pcm.c driver.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15221",
"url": "https://www.suse.com/security/cve/CVE-2019-15221"
},
{
"category": "external",
"summary": "SUSE Bug 1146519 for CVE-2019-15221",
"url": "https://bugzilla.suse.com/1146519"
},
{
"category": "external",
"summary": "SUSE Bug 1146529 for CVE-2019-15221",
"url": "https://bugzilla.suse.com/1146529"
},
{
"category": "external",
"summary": "SUSE Bug 1158381 for CVE-2019-15221",
"url": "https://bugzilla.suse.com/1158381"
},
{
"category": "external",
"summary": "SUSE Bug 1158834 for CVE-2019-15221",
"url": "https://bugzilla.suse.com/1158834"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-15T06:29:59Z",
"details": "moderate"
}
],
"title": "CVE-2019-15221"
},
{
"cve": "CVE-2019-15239",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15239"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, a certain net/ipv4/tcp_output.c change, which was properly incorporated into 4.16.12, was incorrectly backported to the earlier longterm kernels, introducing a new vulnerability that was potentially more severe than the issue that was intended to be fixed by backporting. Specifically, by adding to a write queue between disconnection and re-connection, a local attacker can trigger multiple use-after-free conditions. This can result in a kernel crash, or potentially in privilege escalation. NOTE: this affects (for example) Linux distributions that use 4.9.x longterm kernels before 4.9.190 or 4.14.x longterm kernels before 4.14.139.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15239",
"url": "https://www.suse.com/security/cve/CVE-2019-15239"
},
{
"category": "external",
"summary": "SUSE Bug 1146589 for CVE-2019-15239",
"url": "https://bugzilla.suse.com/1146589"
},
{
"category": "external",
"summary": "SUSE Bug 1156317 for CVE-2019-15239",
"url": "https://bugzilla.suse.com/1156317"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-15T06:29:59Z",
"details": "important"
}
],
"title": "CVE-2019-15239"
},
{
"cve": "CVE-2019-15290",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15290"
}
],
"notes": [
{
"category": "general",
"text": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2019-15098. Reason: This candidate is a duplicate of CVE-2019-15098. Notes: All CVE users should reference CVE-2019-15098 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15290",
"url": "https://www.suse.com/security/cve/CVE-2019-15290"
},
{
"category": "external",
"summary": "SUSE Bug 1146378 for CVE-2019-15290",
"url": "https://bugzilla.suse.com/1146378"
},
{
"category": "external",
"summary": "SUSE Bug 1146519 for CVE-2019-15290",
"url": "https://bugzilla.suse.com/1146519"
},
{
"category": "external",
"summary": "SUSE Bug 1146543 for CVE-2019-15290",
"url": "https://bugzilla.suse.com/1146543"
},
{
"category": "external",
"summary": "SUSE Bug 1158381 for CVE-2019-15290",
"url": "https://bugzilla.suse.com/1158381"
},
{
"category": "external",
"summary": "SUSE Bug 1158834 for CVE-2019-15290",
"url": "https://bugzilla.suse.com/1158834"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H",
"version": "3.0"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-15T06:29:59Z",
"details": "moderate"
}
],
"title": "CVE-2019-15290"
},
{
"cve": "CVE-2019-15291",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15291"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 5.2.9. There is a NULL pointer dereference caused by a malicious USB device in the flexcop_usb_probe function in the drivers/media/usb/b2c2/flexcop-usb.c driver.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15291",
"url": "https://www.suse.com/security/cve/CVE-2019-15291"
},
{
"category": "external",
"summary": "SUSE Bug 1146519 for CVE-2019-15291",
"url": "https://bugzilla.suse.com/1146519"
},
{
"category": "external",
"summary": "SUSE Bug 1146540 for CVE-2019-15291",
"url": "https://bugzilla.suse.com/1146540"
},
{
"category": "external",
"summary": "SUSE Bug 1158381 for CVE-2019-15291",
"url": "https://bugzilla.suse.com/1158381"
},
{
"category": "external",
"summary": "SUSE Bug 1158834 for CVE-2019-15291",
"url": "https://bugzilla.suse.com/1158834"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-15T06:29:59Z",
"details": "moderate"
}
],
"title": "CVE-2019-15291"
},
{
"cve": "CVE-2019-15505",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15505"
}
],
"notes": [
{
"category": "general",
"text": "drivers/media/usb/dvb-usb/technisat-usb2.c in the Linux kernel through 5.2.9 has an out-of-bounds read via crafted USB device traffic (which may be remote via usbip or usbredir).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15505",
"url": "https://www.suse.com/security/cve/CVE-2019-15505"
},
{
"category": "external",
"summary": "SUSE Bug 1147122 for CVE-2019-15505",
"url": "https://bugzilla.suse.com/1147122"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.0"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-15T06:29:59Z",
"details": "moderate"
}
],
"title": "CVE-2019-15505"
},
{
"cve": "CVE-2019-15666",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15666"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.0.19. There is an out-of-bounds array access in __xfrm_policy_unlink, which will cause denial of service, because verify_newpolicy_info in net/xfrm/xfrm_user.c mishandles directory validation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15666",
"url": "https://www.suse.com/security/cve/CVE-2019-15666"
},
{
"category": "external",
"summary": "SUSE Bug 1148394 for CVE-2019-15666",
"url": "https://bugzilla.suse.com/1148394"
},
{
"category": "external",
"summary": "SUSE Bug 1172140 for CVE-2019-15666",
"url": "https://bugzilla.suse.com/1172140"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-15T06:29:59Z",
"details": "important"
}
],
"title": "CVE-2019-15666"
},
{
"cve": "CVE-2019-15807",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15807"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel before 5.1.13, there is a memory leak in drivers/scsi/libsas/sas_expander.c when SAS expander discovery fails. This will cause a BUG and denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15807",
"url": "https://www.suse.com/security/cve/CVE-2019-15807"
},
{
"category": "external",
"summary": "SUSE Bug 1148938 for CVE-2019-15807",
"url": "https://bugzilla.suse.com/1148938"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-15T06:29:59Z",
"details": "moderate"
}
],
"title": "CVE-2019-15807"
},
{
"cve": "CVE-2019-15902",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15902"
}
],
"notes": [
{
"category": "general",
"text": "A backporting error was discovered in the Linux stable/longterm kernel 4.4.x through 4.4.190, 4.9.x through 4.9.190, 4.14.x through 4.14.141, 4.19.x through 4.19.69, and 5.2.x through 5.2.11. Misuse of the upstream \"x86/ptrace: Fix possible spectre-v1 in ptrace_get_debugreg()\" commit reintroduced the Spectre vulnerability that it aimed to eliminate. This occurred because the backport process depends on cherry picking specific commits, and because two (correctly ordered) code lines were swapped.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15902",
"url": "https://www.suse.com/security/cve/CVE-2019-15902"
},
{
"category": "external",
"summary": "SUSE Bug 1149376 for CVE-2019-15902",
"url": "https://bugzilla.suse.com/1149376"
},
{
"category": "external",
"summary": "SUSE Bug 1155131 for CVE-2019-15902",
"url": "https://bugzilla.suse.com/1155131"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-15T06:29:59Z",
"details": "moderate"
}
],
"title": "CVE-2019-15902"
},
{
"cve": "CVE-2019-15924",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15924"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.0.11. fm10k_init_module in drivers/net/ethernet/intel/fm10k/fm10k_main.c has a NULL pointer dereference because there is no -ENOMEM upon an alloc_workqueue failure.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15924",
"url": "https://www.suse.com/security/cve/CVE-2019-15924"
},
{
"category": "external",
"summary": "SUSE Bug 1149612 for CVE-2019-15924",
"url": "https://bugzilla.suse.com/1149612"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-15T06:29:59Z",
"details": "low"
}
],
"title": "CVE-2019-15924"
},
{
"cve": "CVE-2019-15926",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15926"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.2.3. Out of bounds access exists in the functions ath6kl_wmi_pstream_timeout_event_rx and ath6kl_wmi_cac_event_rx in the file drivers/net/wireless/ath/ath6kl/wmi.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15926",
"url": "https://www.suse.com/security/cve/CVE-2019-15926"
},
{
"category": "external",
"summary": "SUSE Bug 1149527 for CVE-2019-15926",
"url": "https://bugzilla.suse.com/1149527"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.0"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-15T06:29:59Z",
"details": "moderate"
}
],
"title": "CVE-2019-15926"
},
{
"cve": "CVE-2019-15927",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15927"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 4.20.2. An out-of-bounds access exists in the function build_audio_procunit in the file sound/usb/mixer.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15927",
"url": "https://www.suse.com/security/cve/CVE-2019-15927"
},
{
"category": "external",
"summary": "SUSE Bug 1149522 for CVE-2019-15927",
"url": "https://bugzilla.suse.com/1149522"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-15T06:29:59Z",
"details": "moderate"
}
],
"title": "CVE-2019-15927"
},
{
"cve": "CVE-2019-16232",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-16232"
}
],
"notes": [
{
"category": "general",
"text": "drivers/net/wireless/marvell/libertas/if_sdio.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-16232",
"url": "https://www.suse.com/security/cve/CVE-2019-16232"
},
{
"category": "external",
"summary": "SUSE Bug 1150465 for CVE-2019-16232",
"url": "https://bugzilla.suse.com/1150465"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-15T06:29:59Z",
"details": "low"
}
],
"title": "CVE-2019-16232"
},
{
"cve": "CVE-2019-16233",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-16233"
}
],
"notes": [
{
"category": "general",
"text": "drivers/scsi/qla2xxx/qla_os.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-16233",
"url": "https://www.suse.com/security/cve/CVE-2019-16233"
},
{
"category": "external",
"summary": "SUSE Bug 1150457 for CVE-2019-16233",
"url": "https://bugzilla.suse.com/1150457"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-15T06:29:59Z",
"details": "low"
}
],
"title": "CVE-2019-16233"
},
{
"cve": "CVE-2019-16234",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-16234"
}
],
"notes": [
{
"category": "general",
"text": "drivers/net/wireless/intel/iwlwifi/pcie/trans.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-16234",
"url": "https://www.suse.com/security/cve/CVE-2019-16234"
},
{
"category": "external",
"summary": "SUSE Bug 1150452 for CVE-2019-16234",
"url": "https://bugzilla.suse.com/1150452"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-15T06:29:59Z",
"details": "low"
}
],
"title": "CVE-2019-16234"
},
{
"cve": "CVE-2019-16413",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-16413"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.0.4. The 9p filesystem did not protect i_size_write() properly, which causes an i_size_read() infinite loop and denial of service on SMP systems.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-16413",
"url": "https://www.suse.com/security/cve/CVE-2019-16413"
},
{
"category": "external",
"summary": "SUSE Bug 1151347 for CVE-2019-16413",
"url": "https://bugzilla.suse.com/1151347"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-15T06:29:59Z",
"details": "moderate"
}
],
"title": "CVE-2019-16413"
},
{
"cve": "CVE-2019-16995",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-16995"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel before 5.0.3, a memory leak exits in hsr_dev_finalize() in net/hsr/hsr_device.c if hsr_add_port fails to add a port, which may cause denial of service, aka CID-6caabe7f197d.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-16995",
"url": "https://www.suse.com/security/cve/CVE-2019-16995"
},
{
"category": "external",
"summary": "SUSE Bug 1152685 for CVE-2019-16995",
"url": "https://bugzilla.suse.com/1152685"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-15T06:29:59Z",
"details": "moderate"
}
],
"title": "CVE-2019-16995"
},
{
"cve": "CVE-2019-17055",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-17055"
}
],
"notes": [
{
"category": "general",
"text": "base_sock_create in drivers/isdn/mISDN/socket.c in the AF_ISDN network module in the Linux kernel through 5.3.2 does not enforce CAP_NET_RAW, which means that unprivileged users can create a raw socket, aka CID-b91ee4aa2a21.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-17055",
"url": "https://www.suse.com/security/cve/CVE-2019-17055"
},
{
"category": "external",
"summary": "SUSE Bug 1152782 for CVE-2019-17055",
"url": "https://bugzilla.suse.com/1152782"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-15T06:29:59Z",
"details": "low"
}
],
"title": "CVE-2019-17055"
},
{
"cve": "CVE-2019-17056",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-17056"
}
],
"notes": [
{
"category": "general",
"text": "llcp_sock_create in net/nfc/llcp_sock.c in the AF_NFC network module in the Linux kernel through 5.3.2 does not enforce CAP_NET_RAW, which means that unprivileged users can create a raw socket, aka CID-3a359798b176.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-17056",
"url": "https://www.suse.com/security/cve/CVE-2019-17056"
},
{
"category": "external",
"summary": "SUSE Bug 1152788 for CVE-2019-17056",
"url": "https://bugzilla.suse.com/1152788"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-15T06:29:59Z",
"details": "moderate"
}
],
"title": "CVE-2019-17056"
},
{
"cve": "CVE-2019-17133",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-17133"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel through 5.3.2, cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c does not reject a long SSID IE, leading to a Buffer Overflow.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-17133",
"url": "https://www.suse.com/security/cve/CVE-2019-17133"
},
{
"category": "external",
"summary": "SUSE Bug 1153158 for CVE-2019-17133",
"url": "https://bugzilla.suse.com/1153158"
},
{
"category": "external",
"summary": "SUSE Bug 1153161 for CVE-2019-17133",
"url": "https://bugzilla.suse.com/1153161"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-15T06:29:59Z",
"details": "important"
}
],
"title": "CVE-2019-17133"
},
{
"cve": "CVE-2019-17666",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-17666"
}
],
"notes": [
{
"category": "general",
"text": "rtl_p2p_noa_ie in drivers/net/wireless/realtek/rtlwifi/ps.c in the Linux kernel through 5.3.6 lacks a certain upper-bound check, leading to a buffer overflow.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-17666",
"url": "https://www.suse.com/security/cve/CVE-2019-17666"
},
{
"category": "external",
"summary": "SUSE Bug 1154372 for CVE-2019-17666",
"url": "https://bugzilla.suse.com/1154372"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
"version": "3.0"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-15T06:29:59Z",
"details": "moderate"
}
],
"title": "CVE-2019-17666"
},
{
"cve": "CVE-2019-9456",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-9456"
}
],
"notes": [
{
"category": "general",
"text": "In the Android kernel in Pixel C USB monitor driver there is a possible OOB write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-9456",
"url": "https://www.suse.com/security/cve/CVE-2019-9456"
},
{
"category": "external",
"summary": "SUSE Bug 1150025 for CVE-2019-9456",
"url": "https://bugzilla.suse.com/1150025"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-15T06:29:59Z",
"details": "moderate"
}
],
"title": "CVE-2019-9456"
},
{
"cve": "CVE-2019-9506",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-9506"
}
],
"notes": [
{
"category": "general",
"text": "The Bluetooth BR/EDR specification up to and including version 5.1 permits sufficiently low encryption key length and does not prevent an attacker from influencing the key length negotiation. This allows practical brute-force attacks (aka \"KNOB\") that can decrypt traffic and inject arbitrary ciphertext without the victim noticing.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-9506",
"url": "https://www.suse.com/security/cve/CVE-2019-9506"
},
{
"category": "external",
"summary": "SUSE Bug 1137865 for CVE-2019-9506",
"url": "https://bugzilla.suse.com/1137865"
},
{
"category": "external",
"summary": "SUSE Bug 1146042 for CVE-2019-9506",
"url": "https://bugzilla.suse.com/1146042"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L",
"version": "3.0"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.107.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.107.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.107.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.107.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.107.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_107-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-15T06:29:59Z",
"details": "moderate"
}
],
"title": "CVE-2019-9506"
}
]
}
suse-su-2019:3340-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for spectre-meltdown-checker",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for spectre-meltdown-checker fixes the following issues:\n\n- version 0.43\n - feat: implement TAA detection (CVE-2019-11135 bsc#1139073)\n - feat: implement MCEPSC / iTLB Multihit detection (CVE-2018-12207 bsc#1117665)\n - feat: taa: add TSX_CTRL MSR detection in hardware info\n - feat: fwdb: use both Intel GitHub repo and MCEdb to build our firmware version database\n - feat: use --live with --kernel/--config/--map to override file detection in live mode\n - enh: rework the vuln logic of MDS with --paranoid (fixes #307)\n - enh: explain that Enhanced IBRS is better for performance than classic IBRS\n - enh: kernel: autodetect customized arch kernels from cmdline\n - enh: kernel decompression: better tolerance against missing tools\n - enh: mock: implement reading from /proc/cmdline\n - fix: variant3a: Silvermont CPUs are not vulnerable to variant 3a\n - fix: lockdown: detect Red Hat locked down kernels (impacts MSR writes)\n - fix: lockdown: detect locked down mode in vanilla 5.4+ kernels\n - fix: sgx: on locked down kernels, fallback to CPUID bit for detection\n - fix: fwdb: builtin version takes precedence if the local cached version is older\n - fix: pteinv: don\u0027t check kernel image if not available\n - fix: silence useless error from grep (fixes #322)\n - fix: msr: fix msr module detection under Ubuntu 19.10 (fixes #316)\n - fix: mocking value for read_msr\n - chore: rename mcedb cmdline parameters to fwdb, and change db version scheme\n - chore: fwdb: update to v130.20191104+i20191027\n - chore: add GitHub check workflow\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2019-3340,SUSE-SLE-SERVER-12-SP5-2019-3340",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_3340-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2019:3340-1",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20193340-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2019:3340-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2019-December/006274.html"
},
{
"category": "self",
"summary": "SUSE Bug 1117665",
"url": "https://bugzilla.suse.com/1117665"
},
{
"category": "self",
"summary": "SUSE Bug 1139073",
"url": "https://bugzilla.suse.com/1139073"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-12207 page",
"url": "https://www.suse.com/security/cve/CVE-2018-12207/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11135 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11135/"
}
],
"title": "Security update for spectre-meltdown-checker",
"tracking": {
"current_release_date": "2019-12-19T07:25:28Z",
"generator": {
"date": "2019-12-19T07:25:28Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2019:3340-1",
"initial_release_date": "2019-12-19T07:25:28Z",
"revision_history": [
{
"date": "2019-12-19T07:25:28Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "spectre-meltdown-checker-0.43-3.3.1.i586",
"product": {
"name": "spectre-meltdown-checker-0.43-3.3.1.i586",
"product_id": "spectre-meltdown-checker-0.43-3.3.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "spectre-meltdown-checker-0.43-3.3.1.x86_64",
"product": {
"name": "spectre-meltdown-checker-0.43-3.3.1.x86_64",
"product_id": "spectre-meltdown-checker-0.43-3.3.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "spectre-meltdown-checker-0.43-3.3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:spectre-meltdown-checker-0.43-3.3.1.x86_64"
},
"product_reference": "spectre-meltdown-checker-0.43-3.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spectre-meltdown-checker-0.43-3.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:spectre-meltdown-checker-0.43-3.3.1.x86_64"
},
"product_reference": "spectre-meltdown-checker-0.43-3.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-12207",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-12207"
}
],
"notes": [
{
"category": "general",
"text": "Improper invalidation for page table updates by a virtual guest operating system for multiple Intel(R) Processors may allow an authenticated user to potentially enable denial of service of the host system via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:spectre-meltdown-checker-0.43-3.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:spectre-meltdown-checker-0.43-3.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-12207",
"url": "https://www.suse.com/security/cve/CVE-2018-12207"
},
{
"category": "external",
"summary": "SUSE Bug 1117665 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1117665"
},
{
"category": "external",
"summary": "SUSE Bug 1139073 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1139073"
},
{
"category": "external",
"summary": "SUSE Bug 1152505 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1152505"
},
{
"category": "external",
"summary": "SUSE Bug 1155812 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1155812"
},
{
"category": "external",
"summary": "SUSE Bug 1155817 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1155817"
},
{
"category": "external",
"summary": "SUSE Bug 1155945 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1155945"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1201877"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:spectre-meltdown-checker-0.43-3.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:spectre-meltdown-checker-0.43-3.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:spectre-meltdown-checker-0.43-3.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:spectre-meltdown-checker-0.43-3.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-12-19T07:25:28Z",
"details": "moderate"
}
],
"title": "CVE-2018-12207"
},
{
"cve": "CVE-2019-11135",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11135"
}
],
"notes": [
{
"category": "general",
"text": "TSX Asynchronous Abort condition on some CPUs utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:spectre-meltdown-checker-0.43-3.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:spectre-meltdown-checker-0.43-3.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11135",
"url": "https://www.suse.com/security/cve/CVE-2019-11135"
},
{
"category": "external",
"summary": "SUSE Bug 1139073 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1139073"
},
{
"category": "external",
"summary": "SUSE Bug 1152497 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1152497"
},
{
"category": "external",
"summary": "SUSE Bug 1152505 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1152505"
},
{
"category": "external",
"summary": "SUSE Bug 1152506 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1152506"
},
{
"category": "external",
"summary": "SUSE Bug 1160120 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1160120"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1201877"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:spectre-meltdown-checker-0.43-3.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:spectre-meltdown-checker-0.43-3.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:spectre-meltdown-checker-0.43-3.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:spectre-meltdown-checker-0.43-3.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-12-19T07:25:28Z",
"details": "moderate"
}
],
"title": "CVE-2019-11135"
}
]
}
suse-su-2019:2960-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for xen",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for xen fixes the following issues:\n\n- CVE-2018-12207: Untrusted virtual machines on Intel CPUs could exploit a race\n condition in the Instruction Fetch Unit of the Intel CPU to cause a Machine\n Exception during Page Size Change, causing the CPU core to be non-functional.\n (bsc#1155945)\n- CVE-2019-11135: Aborting an asynchronous TSX operation on Intel CPUs with\n Transactional Memory support could be used to facilitate sidechannel\n information leaks out of microarchitectural buffers, similar to the\n previously described \u0027Microarchitectural Data Sampling\u0027 attack. (bsc#1152497).\n- CVE-2019-18425: 32-bit PV guest user mode could elevate its privileges to that \n of the guest kernel. (bsc#1154456).\n- CVE-2019-18421: A malicious PV guest administrator may have been able to\n escalate their privilege to that of the host. (bsc#1154458).\n- CVE-2019-18420: Malicious x86 PV guests may have caused a hypervisor crash, \n resulting in a Denial of Service (Dos). (bsc#1154448)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2019-2960,SUSE-SLE-Module-Basesystem-15-2019-2960,SUSE-SLE-Module-Server-Applications-15-2019-2960",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_2960-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2019:2960-1",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192960-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2019:2960-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2019-November/006133.html"
},
{
"category": "self",
"summary": "SUSE Bug 1152497",
"url": "https://bugzilla.suse.com/1152497"
},
{
"category": "self",
"summary": "SUSE Bug 1154448",
"url": "https://bugzilla.suse.com/1154448"
},
{
"category": "self",
"summary": "SUSE Bug 1154456",
"url": "https://bugzilla.suse.com/1154456"
},
{
"category": "self",
"summary": "SUSE Bug 1154458",
"url": "https://bugzilla.suse.com/1154458"
},
{
"category": "self",
"summary": "SUSE Bug 1154461",
"url": "https://bugzilla.suse.com/1154461"
},
{
"category": "self",
"summary": "SUSE Bug 1155945",
"url": "https://bugzilla.suse.com/1155945"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-12207 page",
"url": "https://www.suse.com/security/cve/CVE-2018-12207/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11135 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11135/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-18420 page",
"url": "https://www.suse.com/security/cve/CVE-2019-18420/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-18421 page",
"url": "https://www.suse.com/security/cve/CVE-2019-18421/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-18424 page",
"url": "https://www.suse.com/security/cve/CVE-2019-18424/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-18425 page",
"url": "https://www.suse.com/security/cve/CVE-2019-18425/"
}
],
"title": "Security update for xen",
"tracking": {
"current_release_date": "2019-11-12T18:17:19Z",
"generator": {
"date": "2019-11-12T18:17:19Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2019:2960-1",
"initial_release_date": "2019-11-12T18:17:19Z",
"revision_history": [
{
"date": "2019-11-12T18:17:19Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "xen-4.10.4_06-3.25.1.aarch64",
"product": {
"name": "xen-4.10.4_06-3.25.1.aarch64",
"product_id": "xen-4.10.4_06-3.25.1.aarch64"
}
},
{
"category": "product_version",
"name": "xen-devel-4.10.4_06-3.25.1.aarch64",
"product": {
"name": "xen-devel-4.10.4_06-3.25.1.aarch64",
"product_id": "xen-devel-4.10.4_06-3.25.1.aarch64"
}
},
{
"category": "product_version",
"name": "xen-doc-html-4.10.4_06-3.25.1.aarch64",
"product": {
"name": "xen-doc-html-4.10.4_06-3.25.1.aarch64",
"product_id": "xen-doc-html-4.10.4_06-3.25.1.aarch64"
}
},
{
"category": "product_version",
"name": "xen-libs-4.10.4_06-3.25.1.aarch64",
"product": {
"name": "xen-libs-4.10.4_06-3.25.1.aarch64",
"product_id": "xen-libs-4.10.4_06-3.25.1.aarch64"
}
},
{
"category": "product_version",
"name": "xen-tools-4.10.4_06-3.25.1.aarch64",
"product": {
"name": "xen-tools-4.10.4_06-3.25.1.aarch64",
"product_id": "xen-tools-4.10.4_06-3.25.1.aarch64"
}
},
{
"category": "product_version",
"name": "xen-tools-domU-4.10.4_06-3.25.1.aarch64",
"product": {
"name": "xen-tools-domU-4.10.4_06-3.25.1.aarch64",
"product_id": "xen-tools-domU-4.10.4_06-3.25.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "xen-libs-64bit-4.10.4_06-3.25.1.aarch64_ilp32",
"product": {
"name": "xen-libs-64bit-4.10.4_06-3.25.1.aarch64_ilp32",
"product_id": "xen-libs-64bit-4.10.4_06-3.25.1.aarch64_ilp32"
}
}
],
"category": "architecture",
"name": "aarch64_ilp32"
},
{
"branches": [
{
"category": "product_version",
"name": "xen-devel-4.10.4_06-3.25.1.i586",
"product": {
"name": "xen-devel-4.10.4_06-3.25.1.i586",
"product_id": "xen-devel-4.10.4_06-3.25.1.i586"
}
},
{
"category": "product_version",
"name": "xen-libs-4.10.4_06-3.25.1.i586",
"product": {
"name": "xen-libs-4.10.4_06-3.25.1.i586",
"product_id": "xen-libs-4.10.4_06-3.25.1.i586"
}
},
{
"category": "product_version",
"name": "xen-tools-domU-4.10.4_06-3.25.1.i586",
"product": {
"name": "xen-tools-domU-4.10.4_06-3.25.1.i586",
"product_id": "xen-tools-domU-4.10.4_06-3.25.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "xen-4.10.4_06-3.25.1.x86_64",
"product": {
"name": "xen-4.10.4_06-3.25.1.x86_64",
"product_id": "xen-4.10.4_06-3.25.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-devel-4.10.4_06-3.25.1.x86_64",
"product": {
"name": "xen-devel-4.10.4_06-3.25.1.x86_64",
"product_id": "xen-devel-4.10.4_06-3.25.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-doc-html-4.10.4_06-3.25.1.x86_64",
"product": {
"name": "xen-doc-html-4.10.4_06-3.25.1.x86_64",
"product_id": "xen-doc-html-4.10.4_06-3.25.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-libs-4.10.4_06-3.25.1.x86_64",
"product": {
"name": "xen-libs-4.10.4_06-3.25.1.x86_64",
"product_id": "xen-libs-4.10.4_06-3.25.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-libs-32bit-4.10.4_06-3.25.1.x86_64",
"product": {
"name": "xen-libs-32bit-4.10.4_06-3.25.1.x86_64",
"product_id": "xen-libs-32bit-4.10.4_06-3.25.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-tools-4.10.4_06-3.25.1.x86_64",
"product": {
"name": "xen-tools-4.10.4_06-3.25.1.x86_64",
"product_id": "xen-tools-4.10.4_06-3.25.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-tools-domU-4.10.4_06-3.25.1.x86_64",
"product": {
"name": "xen-tools-domU-4.10.4_06-3.25.1.x86_64",
"product_id": "xen-tools-domU-4.10.4_06-3.25.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Basesystem 15",
"product": {
"name": "SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-basesystem:15"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Server Applications 15",
"product": {
"name": "SUSE Linux Enterprise Module for Server Applications 15",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-server-applications:15"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.10.4_06-3.25.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:xen-libs-4.10.4_06-3.25.1.x86_64"
},
"product_reference": "xen-libs-4.10.4_06-3.25.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-domU-4.10.4_06-3.25.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:xen-tools-domU-4.10.4_06-3.25.1.x86_64"
},
"product_reference": "xen-tools-domU-4.10.4_06-3.25.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-4.10.4_06-3.25.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15:xen-4.10.4_06-3.25.1.x86_64"
},
"product_reference": "xen-4.10.4_06-3.25.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-devel-4.10.4_06-3.25.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15:xen-devel-4.10.4_06-3.25.1.x86_64"
},
"product_reference": "xen-devel-4.10.4_06-3.25.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-4.10.4_06-3.25.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15:xen-tools-4.10.4_06-3.25.1.x86_64"
},
"product_reference": "xen-tools-4.10.4_06-3.25.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-12207",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-12207"
}
],
"notes": [
{
"category": "general",
"text": "Improper invalidation for page table updates by a virtual guest operating system for multiple Intel(R) Processors may allow an authenticated user to potentially enable denial of service of the host system via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15:xen-libs-4.10.4_06-3.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:xen-tools-domU-4.10.4_06-3.25.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:xen-4.10.4_06-3.25.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:xen-devel-4.10.4_06-3.25.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:xen-tools-4.10.4_06-3.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-12207",
"url": "https://www.suse.com/security/cve/CVE-2018-12207"
},
{
"category": "external",
"summary": "SUSE Bug 1117665 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1117665"
},
{
"category": "external",
"summary": "SUSE Bug 1139073 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1139073"
},
{
"category": "external",
"summary": "SUSE Bug 1152505 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1152505"
},
{
"category": "external",
"summary": "SUSE Bug 1155812 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1155812"
},
{
"category": "external",
"summary": "SUSE Bug 1155817 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1155817"
},
{
"category": "external",
"summary": "SUSE Bug 1155945 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1155945"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1201877"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15:xen-libs-4.10.4_06-3.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:xen-tools-domU-4.10.4_06-3.25.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:xen-4.10.4_06-3.25.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:xen-devel-4.10.4_06-3.25.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:xen-tools-4.10.4_06-3.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15:xen-libs-4.10.4_06-3.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:xen-tools-domU-4.10.4_06-3.25.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:xen-4.10.4_06-3.25.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:xen-devel-4.10.4_06-3.25.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:xen-tools-4.10.4_06-3.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:17:19Z",
"details": "moderate"
}
],
"title": "CVE-2018-12207"
},
{
"cve": "CVE-2019-11135",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11135"
}
],
"notes": [
{
"category": "general",
"text": "TSX Asynchronous Abort condition on some CPUs utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15:xen-libs-4.10.4_06-3.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:xen-tools-domU-4.10.4_06-3.25.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:xen-4.10.4_06-3.25.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:xen-devel-4.10.4_06-3.25.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:xen-tools-4.10.4_06-3.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11135",
"url": "https://www.suse.com/security/cve/CVE-2019-11135"
},
{
"category": "external",
"summary": "SUSE Bug 1139073 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1139073"
},
{
"category": "external",
"summary": "SUSE Bug 1152497 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1152497"
},
{
"category": "external",
"summary": "SUSE Bug 1152505 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1152505"
},
{
"category": "external",
"summary": "SUSE Bug 1152506 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1152506"
},
{
"category": "external",
"summary": "SUSE Bug 1160120 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1160120"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1201877"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15:xen-libs-4.10.4_06-3.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:xen-tools-domU-4.10.4_06-3.25.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:xen-4.10.4_06-3.25.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:xen-devel-4.10.4_06-3.25.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:xen-tools-4.10.4_06-3.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15:xen-libs-4.10.4_06-3.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:xen-tools-domU-4.10.4_06-3.25.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:xen-4.10.4_06-3.25.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:xen-devel-4.10.4_06-3.25.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:xen-tools-4.10.4_06-3.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:17:19Z",
"details": "moderate"
}
],
"title": "CVE-2019-11135"
},
{
"cve": "CVE-2019-18420",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-18420"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Xen through 4.12.x allowing x86 PV guest OS users to cause a denial of service via a VCPUOP_initialise hypercall. hypercall_create_continuation() is a variadic function which uses a printf-like format string to interpret its parameters. Error handling for a bad format character was done using BUG(), which crashes Xen. One path, via the VCPUOP_initialise hypercall, has a bad format character. The BUG() can be hit if VCPUOP_initialise executes for a sufficiently long period of time for a continuation to be created. Malicious guests may cause a hypervisor crash, resulting in a Denial of Service (DoS). Xen versions 4.6 and newer are vulnerable. Xen versions 4.5 and earlier are not vulnerable. Only x86 PV guests can exploit the vulnerability. HVM and PVH guests, and guests on ARM systems, cannot exploit the vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15:xen-libs-4.10.4_06-3.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:xen-tools-domU-4.10.4_06-3.25.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:xen-4.10.4_06-3.25.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:xen-devel-4.10.4_06-3.25.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:xen-tools-4.10.4_06-3.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-18420",
"url": "https://www.suse.com/security/cve/CVE-2019-18420"
},
{
"category": "external",
"summary": "SUSE Bug 1154448 for CVE-2019-18420",
"url": "https://bugzilla.suse.com/1154448"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15:xen-libs-4.10.4_06-3.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:xen-tools-domU-4.10.4_06-3.25.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:xen-4.10.4_06-3.25.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:xen-devel-4.10.4_06-3.25.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:xen-tools-4.10.4_06-3.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15:xen-libs-4.10.4_06-3.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:xen-tools-domU-4.10.4_06-3.25.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:xen-4.10.4_06-3.25.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:xen-devel-4.10.4_06-3.25.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:xen-tools-4.10.4_06-3.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:17:19Z",
"details": "important"
}
],
"title": "CVE-2019-18420"
},
{
"cve": "CVE-2019-18421",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-18421"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Xen through 4.12.x allowing x86 PV guest OS users to gain host OS privileges by leveraging race conditions in pagetable promotion and demotion operations. There are issues with restartable PV type change operations. To avoid using shadow pagetables for PV guests, Xen exposes the actual hardware pagetables to the guest. In order to prevent the guest from modifying these page tables directly, Xen keeps track of how pages are used using a type system; pages must be \"promoted\" before being used as a pagetable, and \"demoted\" before being used for any other type. Xen also allows for \"recursive\" promotions: i.e., an operating system promoting a page to an L4 pagetable may end up causing pages to be promoted to L3s, which may in turn cause pages to be promoted to L2s, and so on. These operations may take an arbitrarily large amount of time, and so must be re-startable. Unfortunately, making recursive pagetable promotion and demotion operations restartable is incredibly complicated, and the code contains several races which, if triggered, can cause Xen to drop or retain extra type counts, potentially allowing guests to get write access to in-use pagetables. A malicious PV guest administrator may be able to escalate their privilege to that of the host. All x86 systems with untrusted PV guests are vulnerable. HVM and PVH guests cannot exercise this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15:xen-libs-4.10.4_06-3.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:xen-tools-domU-4.10.4_06-3.25.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:xen-4.10.4_06-3.25.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:xen-devel-4.10.4_06-3.25.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:xen-tools-4.10.4_06-3.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-18421",
"url": "https://www.suse.com/security/cve/CVE-2019-18421"
},
{
"category": "external",
"summary": "SUSE Bug 1154458 for CVE-2019-18421",
"url": "https://bugzilla.suse.com/1154458"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2019-18421",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15:xen-libs-4.10.4_06-3.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:xen-tools-domU-4.10.4_06-3.25.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:xen-4.10.4_06-3.25.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:xen-devel-4.10.4_06-3.25.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:xen-tools-4.10.4_06-3.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15:xen-libs-4.10.4_06-3.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:xen-tools-domU-4.10.4_06-3.25.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:xen-4.10.4_06-3.25.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:xen-devel-4.10.4_06-3.25.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:xen-tools-4.10.4_06-3.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:17:19Z",
"details": "important"
}
],
"title": "CVE-2019-18421"
},
{
"cve": "CVE-2019-18424",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-18424"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Xen through 4.12.x allowing attackers to gain host OS privileges via DMA in a situation where an untrusted domain has access to a physical device. This occurs because passed through PCI devices may corrupt host memory after deassignment. When a PCI device is assigned to an untrusted domain, it is possible for that domain to program the device to DMA to an arbitrary address. The IOMMU is used to protect the host from malicious DMA by making sure that the device addresses can only target memory assigned to the guest. However, when the guest domain is torn down, or the device is deassigned, the device is assigned back to dom0, thus allowing any in-flight DMA to potentially target critical host data. An untrusted domain with access to a physical device can DMA into host memory, leading to privilege escalation. Only systems where guests are given direct access to physical devices capable of DMA (PCI pass-through) are vulnerable. Systems which do not use PCI pass-through are not vulnerable.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15:xen-libs-4.10.4_06-3.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:xen-tools-domU-4.10.4_06-3.25.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:xen-4.10.4_06-3.25.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:xen-devel-4.10.4_06-3.25.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:xen-tools-4.10.4_06-3.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-18424",
"url": "https://www.suse.com/security/cve/CVE-2019-18424"
},
{
"category": "external",
"summary": "SUSE Bug 1154461 for CVE-2019-18424",
"url": "https://bugzilla.suse.com/1154461"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15:xen-libs-4.10.4_06-3.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:xen-tools-domU-4.10.4_06-3.25.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:xen-4.10.4_06-3.25.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:xen-devel-4.10.4_06-3.25.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:xen-tools-4.10.4_06-3.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.6,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15:xen-libs-4.10.4_06-3.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:xen-tools-domU-4.10.4_06-3.25.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:xen-4.10.4_06-3.25.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:xen-devel-4.10.4_06-3.25.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:xen-tools-4.10.4_06-3.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:17:19Z",
"details": "important"
}
],
"title": "CVE-2019-18424"
},
{
"cve": "CVE-2019-18425",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-18425"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Xen through 4.12.x allowing 32-bit PV guest OS users to gain guest OS privileges by installing and using descriptors. There is missing descriptor table limit checking in x86 PV emulation. When emulating certain PV guest operations, descriptor table accesses are performed by the emulating code. Such accesses should respect the guest specified limits, unless otherwise guaranteed to fail in such a case. Without this, emulation of 32-bit guest user mode calls through call gates would allow guest user mode to install and then use descriptors of their choice, as long as the guest kernel did not itself install an LDT. (Most OSes don\u0027t install any LDT by default). 32-bit PV guest user mode can elevate its privileges to that of the guest kernel. Xen versions from at least 3.2 onwards are affected. Only 32-bit PV guest user mode can leverage this vulnerability. HVM, PVH, as well as 64-bit PV guests cannot leverage this vulnerability. Arm systems are unaffected.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15:xen-libs-4.10.4_06-3.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:xen-tools-domU-4.10.4_06-3.25.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:xen-4.10.4_06-3.25.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:xen-devel-4.10.4_06-3.25.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:xen-tools-4.10.4_06-3.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-18425",
"url": "https://www.suse.com/security/cve/CVE-2019-18425"
},
{
"category": "external",
"summary": "SUSE Bug 1154456 for CVE-2019-18425",
"url": "https://bugzilla.suse.com/1154456"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2019-18425",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15:xen-libs-4.10.4_06-3.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:xen-tools-domU-4.10.4_06-3.25.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:xen-4.10.4_06-3.25.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:xen-devel-4.10.4_06-3.25.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:xen-tools-4.10.4_06-3.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15:xen-libs-4.10.4_06-3.25.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:xen-tools-domU-4.10.4_06-3.25.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:xen-4.10.4_06-3.25.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:xen-devel-4.10.4_06-3.25.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:xen-tools-4.10.4_06-3.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:17:19Z",
"details": "important"
}
],
"title": "CVE-2019-18425"
}
]
}
suse-su-2019:2950-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\n\nThe SUSE Linux Enterprise 12 SP1 kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2018-12207: Untrusted virtual machines on Intel CPUs could exploit a race condition in the Instruction Fetch Unit of the Intel CPU to cause a Machine Exception during Page Size Change, causing the CPU core to be non-functional.\n\nThe Linux Kernel KVM hypervisor was adjusted to avoid page size changes in executable pages by splitting / merging huge pages into small pages as needed.\nMore information can be found on https://www.suse.com/support/kb/doc/?id=7023735\n\n- CVE-2019-11135: Aborting an asynchronous TSX operation on Intel CPUs with\nTransactional Memory support could be used to facilitate sidechannel\ninformation leaks out of microarchitectural buffers, similar to the previously\ndescribed \u0027Microarchitectural Data Sampling\u0027 attack.\n\nThe Linux kernel was supplemented with the option to disable TSX operation\naltogether (requiring CPU Microcode updates on older systems) and better\nflushing of microarchitectural buffers (VERW).\n\nThe set of options available is described in our TID at https://www.suse.com/support/kb/doc/?id=7024251\n\n- CVE-2019-16233: drivers/scsi/qla2xxx/qla_os.c did not check the\n alloc_workqueue return value, leading to a NULL pointer dereference.\n (bsc#1150457).\n\n- CVE-2019-10220: Added sanity checks on the pathnames passed to the user\n space. (bsc#1144903).\n\n- CVE-2019-16232: Fix a potential NULL pointer dereference in the Marwell\n libertas driver (bsc#1150465).\n\n- CVE-2019-16234: iwlwifi pcie driver did not check the alloc_workqueue return\n value, leading to a NULL pointer dereference. (bsc#1150452).\n\n- CVE-2019-17055: The AF_ISDN network module in the Linux kernel did not\n enforce CAP_NET_RAW, which meant that unprivileged users could create a raw\n socket (bnc#1152782).\n\n- CVE-2019-17056: The AF_NFC network module did not enforce CAP_NET_RAW, which\n meant that unprivileged users could create a raw socket (bsc#1152788).\n\n- CVE-2019-16413: The 9p filesystem did not protect i_size_write() properly,\n which caused an i_size_read() infinite loop and denial of service on SMP\n systems (bnc#1151347).\n\n- CVE-2019-15902: A backporting issue was discovered that re-introduced the\n Spectre vulnerability it had aimed to eliminate. This occurred because the\n backport process depends on cherry picking specific commits, and because two\n (correctly ordered) code lines were swapped (bnc#1149376).\n\n- CVE-2019-15291: Fixed a NULL pointer dereference issue that could be caused\n by a malicious USB device (bnc#11465).\n\n- CVE-2019-15807: Fixed a memory leak in the SCSI module that could be abused\n to cause denial of service (bnc#1148938).\n\n- CVE-2019-14821: An out-of-bounds access issue was fixed in the kernel\u0027s KVM\n hypervisor. An unprivileged host user or process with access to \u0027/dev/kvm\u0027\n device could use this flaw to crash the host kernel, resulting in a denial of\n service or potentially escalating privileges on the system (bnc#1151350).\n\n- CVE-2019-15505: An out-of-bounds issue had been fixed that could be caused by\n crafted USB device traffic (bnc#1147122).\n\n- CVE-2017-18595: A double free in allocate_trace_buffer was fixed\n (bnc#1149555).\n\n- CVE-2019-14835: A buffer overflow flaw was found in the kernel\u0027s vhost\n functionality that translates virtqueue buffers to IOVs. A privileged guest\n user able to pass descriptors with invalid length to the host could use this\n flaw to increase their privileges on the host (bnc#1150112).\n\n- CVE-2019-15216: A NULL pointer dereference was fixed that could be malicious\n USB device (bnc#1146361).\n\n- CVE-2019-9456: An out-of-bounds write in the USB monitor driver has been\n fixed. This issue could lead to local escalation of privilege with System\n execution privileges needed. (bnc#1150025).\n\n- CVE-2019-15926: An out-of-bounds access was fixed in the\n drivers/net/wireless/ath/ath6kl module. (bnc#1149527).\n\n- CVE-2019-15927: An out-of-bounds access was fixed in the sound/usb/mixer\n module (bnc#1149522).\n\n- CVE-2019-15219: A NULL pointer dereference was fixed that could be abused by\n a malicious USB device (bnc#1146524).\n\n- CVE-2019-15220: A use-after-free issue was fixed that could be caused by a\n malicious USB device (bnc#1146526).\n\n- CVE-2019-15221: A NULL pointer dereference was fixed that could be caused by\n a malicious USB device (bnc#1146529).\n\n- CVE-2019-14814: A heap-based buffer overflow was fixed in the marvell wifi\n chip driver. That issue allowed local users to cause a denial of service\n (system crash) or possibly execute arbitrary code (bnc#1146512).\n\n- CVE-2019-14815: A missing length check while parsing WMM IEs was fixed\n (bsc#1146512, bsc#1146514, bsc#1146516).\n\n- CVE-2019-14816: A heap-based buffer overflow in the marvell wifi chip driver\n was fixed. Local users would have abused this issue to cause a denial of\n service (system crash) or possibly execute arbitrary code (bnc#1146516).\n\n- CVE-2017-18509: An issue in net/ipv6 as fixed. By setting a specific socket\n option, an attacker could control a pointer in kernel land and cause an\n inet_csk_listen_stop general protection fault, or potentially execute\n arbitrary code under certain circumstances. The issue can be triggered as\n root (e.g., inside a default LXC container or with the CAP_NET_ADMIN\n capability) or after namespace unsharing. (bnc#1145477)\n\n- CVE-2019-9506: The Bluetooth BR/EDR specification used to permit sufficiently\n low encryption key length and did not prevent an attacker from influencing\n the key length negotiation. This allowed practical brute-force attacks (aka\n \u0027KNOB\u0027) that could decrypt traffic and inject arbitrary ciphertext without\n the victim noticing (bnc#1137865).\n\n- CVE-2019-15098: A NULL pointer dereference in drivers/net/wireless/ath was\n fixed (bnc#1146378).\n\n- CVE-2019-15290: A NULL pointer dereference in ath6kl_usb_alloc_urb_from_pipe\n was fixed (bsc#1146378).\n\n- CVE-2019-15212: A double-free issue was fixed in drivers/usb driver\n (bnc#1146391).\n\n- CVE-2016-10906: A use-after-free issue was fixed in drivers/net/ethernet/arc\n (bnc#1146584).\n\n- CVE-2019-15217: A a NULL pointer dereference issue caused by a malicious USB\n device was fixed in the drivers/media/usb/zr364xx driver (bnc#1146519).\n\n- CVE-2019-15218: A NULL pointer dereference caused by a malicious USB device\n was fixed in the drivers/media/usb/siano driver (bnc#1146413).\n\n- CVE-2019-15215: A use-after-free issue caused by a malicious USB device was\n fixed in the drivers/media/usb/cpia2 driver (bnc#1146425).\n\n- CVE-2018-20976: A use-after-free issue was fixed in the fs/xfs driver\n (bnc#1146285).\n\n- CVE-2017-18551: An out-of-bounds write was fixed in the drivers/i2c driver\n (bnc#1146163).\n\n- CVE-2019-10207: Add checks for missing tty operations to prevent unprivileged\n user to execute 0x0 address (bsc#1142857 bsc#1123959)\n\n- CVE-2019-15118: ALSA: usb-audio: Fix a stack buffer overflow bug in check_input_term\n leading to kernel stack exhaustion (bsc#1145922).\n\nThe following non-security bugs were fixed:\n\n- array_index_nospec: Sanitize speculative array (bsc#1155671)\n- hpsa: move lockup_detected attribute to host attr (bsc#999278, bsc#1153119).\n- ib/core: Add mitigation for Spectre V1 (bsc#1155671)\n- kvm: Convert kvm_lock to a mutex (bsc#1117665).\n- kvm: MMU: drop read-only large sptes when creating lower level sptes (bsc#1117665).\n- kvm: vmx, svm: always run with EFER.NXE=1 when shadow paging is active (bsc#1117665).\n- kvm: x86: make FNAME(fetch) and __direct_map more similar (bsc#1117665).\n- media: smsusb: better handle optional alignment (bsc#1146413).\n- mwifiex: Fix heap overflow in mwifiex_uap_parse_tail_ies() (bsc#1137944).\n- netfilter: nf_nat: do not bug when mapping already exists (bsc#1146612).\n- tcp: Be more careful in tcp_fragment() (bsc#1137586 bsc#1139751).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2019-2950,SUSE-SLE-Module-Public-Cloud-12-2019-2950,SUSE-SLE-SAP-12-SP1-2019-2950,SUSE-SLE-SERVER-12-SP1-2019-2950",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_2950-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2019:2950-1",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192950-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2019:2950-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2019-November/006131.html"
},
{
"category": "self",
"summary": "SUSE Bug 1117665",
"url": "https://bugzilla.suse.com/1117665"
},
{
"category": "self",
"summary": "SUSE Bug 1123959",
"url": "https://bugzilla.suse.com/1123959"
},
{
"category": "self",
"summary": "SUSE Bug 1137586",
"url": "https://bugzilla.suse.com/1137586"
},
{
"category": "self",
"summary": "SUSE Bug 1137865",
"url": "https://bugzilla.suse.com/1137865"
},
{
"category": "self",
"summary": "SUSE Bug 1137944",
"url": "https://bugzilla.suse.com/1137944"
},
{
"category": "self",
"summary": "SUSE Bug 1139073",
"url": "https://bugzilla.suse.com/1139073"
},
{
"category": "self",
"summary": "SUSE Bug 1139751",
"url": "https://bugzilla.suse.com/1139751"
},
{
"category": "self",
"summary": "SUSE Bug 1142857",
"url": "https://bugzilla.suse.com/1142857"
},
{
"category": "self",
"summary": "SUSE Bug 1144903",
"url": "https://bugzilla.suse.com/1144903"
},
{
"category": "self",
"summary": "SUSE Bug 1145477",
"url": "https://bugzilla.suse.com/1145477"
},
{
"category": "self",
"summary": "SUSE Bug 1145922",
"url": "https://bugzilla.suse.com/1145922"
},
{
"category": "self",
"summary": "SUSE Bug 1146042",
"url": "https://bugzilla.suse.com/1146042"
},
{
"category": "self",
"summary": "SUSE Bug 1146163",
"url": "https://bugzilla.suse.com/1146163"
},
{
"category": "self",
"summary": "SUSE Bug 1146285",
"url": "https://bugzilla.suse.com/1146285"
},
{
"category": "self",
"summary": "SUSE Bug 1146361",
"url": "https://bugzilla.suse.com/1146361"
},
{
"category": "self",
"summary": "SUSE Bug 1146378",
"url": "https://bugzilla.suse.com/1146378"
},
{
"category": "self",
"summary": "SUSE Bug 1146391",
"url": "https://bugzilla.suse.com/1146391"
},
{
"category": "self",
"summary": "SUSE Bug 1146413",
"url": "https://bugzilla.suse.com/1146413"
},
{
"category": "self",
"summary": "SUSE Bug 1146425",
"url": "https://bugzilla.suse.com/1146425"
},
{
"category": "self",
"summary": "SUSE Bug 1146512",
"url": "https://bugzilla.suse.com/1146512"
},
{
"category": "self",
"summary": "SUSE Bug 1146514",
"url": "https://bugzilla.suse.com/1146514"
},
{
"category": "self",
"summary": "SUSE Bug 1146516",
"url": "https://bugzilla.suse.com/1146516"
},
{
"category": "self",
"summary": "SUSE Bug 1146519",
"url": "https://bugzilla.suse.com/1146519"
},
{
"category": "self",
"summary": "SUSE Bug 1146524",
"url": "https://bugzilla.suse.com/1146524"
},
{
"category": "self",
"summary": "SUSE Bug 1146526",
"url": "https://bugzilla.suse.com/1146526"
},
{
"category": "self",
"summary": "SUSE Bug 1146529",
"url": "https://bugzilla.suse.com/1146529"
},
{
"category": "self",
"summary": "SUSE Bug 1146540",
"url": "https://bugzilla.suse.com/1146540"
},
{
"category": "self",
"summary": "SUSE Bug 1146543",
"url": "https://bugzilla.suse.com/1146543"
},
{
"category": "self",
"summary": "SUSE Bug 1146547",
"url": "https://bugzilla.suse.com/1146547"
},
{
"category": "self",
"summary": "SUSE Bug 1146584",
"url": "https://bugzilla.suse.com/1146584"
},
{
"category": "self",
"summary": "SUSE Bug 1146612",
"url": "https://bugzilla.suse.com/1146612"
},
{
"category": "self",
"summary": "SUSE Bug 1147122",
"url": "https://bugzilla.suse.com/1147122"
},
{
"category": "self",
"summary": "SUSE Bug 1148938",
"url": "https://bugzilla.suse.com/1148938"
},
{
"category": "self",
"summary": "SUSE Bug 1149376",
"url": "https://bugzilla.suse.com/1149376"
},
{
"category": "self",
"summary": "SUSE Bug 1149522",
"url": "https://bugzilla.suse.com/1149522"
},
{
"category": "self",
"summary": "SUSE Bug 1149527",
"url": "https://bugzilla.suse.com/1149527"
},
{
"category": "self",
"summary": "SUSE Bug 1149555",
"url": "https://bugzilla.suse.com/1149555"
},
{
"category": "self",
"summary": "SUSE Bug 1150025",
"url": "https://bugzilla.suse.com/1150025"
},
{
"category": "self",
"summary": "SUSE Bug 1150112",
"url": "https://bugzilla.suse.com/1150112"
},
{
"category": "self",
"summary": "SUSE Bug 1150452",
"url": "https://bugzilla.suse.com/1150452"
},
{
"category": "self",
"summary": "SUSE Bug 1150457",
"url": "https://bugzilla.suse.com/1150457"
},
{
"category": "self",
"summary": "SUSE Bug 1150465",
"url": "https://bugzilla.suse.com/1150465"
},
{
"category": "self",
"summary": "SUSE Bug 1151347",
"url": "https://bugzilla.suse.com/1151347"
},
{
"category": "self",
"summary": "SUSE Bug 1151350",
"url": "https://bugzilla.suse.com/1151350"
},
{
"category": "self",
"summary": "SUSE Bug 1152782",
"url": "https://bugzilla.suse.com/1152782"
},
{
"category": "self",
"summary": "SUSE Bug 1152788",
"url": "https://bugzilla.suse.com/1152788"
},
{
"category": "self",
"summary": "SUSE Bug 1153119",
"url": "https://bugzilla.suse.com/1153119"
},
{
"category": "self",
"summary": "SUSE Bug 1155671",
"url": "https://bugzilla.suse.com/1155671"
},
{
"category": "self",
"summary": "SUSE Bug 999278",
"url": "https://bugzilla.suse.com/999278"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-10906 page",
"url": "https://www.suse.com/security/cve/CVE-2016-10906/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-18509 page",
"url": "https://www.suse.com/security/cve/CVE-2017-18509/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-18551 page",
"url": "https://www.suse.com/security/cve/CVE-2017-18551/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-18595 page",
"url": "https://www.suse.com/security/cve/CVE-2017-18595/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-12207 page",
"url": "https://www.suse.com/security/cve/CVE-2018-12207/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-20976 page",
"url": "https://www.suse.com/security/cve/CVE-2018-20976/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-10207 page",
"url": "https://www.suse.com/security/cve/CVE-2019-10207/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-10220 page",
"url": "https://www.suse.com/security/cve/CVE-2019-10220/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11135 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11135/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11477 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11477/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-14814 page",
"url": "https://www.suse.com/security/cve/CVE-2019-14814/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-14815 page",
"url": "https://www.suse.com/security/cve/CVE-2019-14815/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-14816 page",
"url": "https://www.suse.com/security/cve/CVE-2019-14816/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-14821 page",
"url": "https://www.suse.com/security/cve/CVE-2019-14821/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-14835 page",
"url": "https://www.suse.com/security/cve/CVE-2019-14835/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15098 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15098/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15118 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15118/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15212 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15212/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15215 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15215/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15216 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15216/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15217 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15217/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15218 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15218/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15219 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15219/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15220 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15220/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15221 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15221/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15290 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15290/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15291 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15291/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15505 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15505/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15807 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15807/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15902 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15902/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15926 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15926/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15927 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15927/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-16232 page",
"url": "https://www.suse.com/security/cve/CVE-2019-16232/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-16233 page",
"url": "https://www.suse.com/security/cve/CVE-2019-16233/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-16234 page",
"url": "https://www.suse.com/security/cve/CVE-2019-16234/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-16413 page",
"url": "https://www.suse.com/security/cve/CVE-2019-16413/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-17055 page",
"url": "https://www.suse.com/security/cve/CVE-2019-17055/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-17056 page",
"url": "https://www.suse.com/security/cve/CVE-2019-17056/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-9456 page",
"url": "https://www.suse.com/security/cve/CVE-2019-9456/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-9506 page",
"url": "https://www.suse.com/security/cve/CVE-2019-9506/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2019-11-12T18:12:17Z",
"generator": {
"date": "2019-11-12T18:12:17Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2019:2950-1",
"initial_release_date": "2019-11-12T18:12:17Z",
"revision_history": [
{
"date": "2019-11-12T18:12:17Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-3.12.74-60.64.124.1.noarch",
"product": {
"name": "kernel-devel-3.12.74-60.64.124.1.noarch",
"product_id": "kernel-devel-3.12.74-60.64.124.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-3.12.74-60.64.124.1.noarch",
"product": {
"name": "kernel-docs-3.12.74-60.64.124.1.noarch",
"product_id": "kernel-docs-3.12.74-60.64.124.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-3.12.74-60.64.124.1.noarch",
"product": {
"name": "kernel-macros-3.12.74-60.64.124.1.noarch",
"product_id": "kernel-macros-3.12.74-60.64.124.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-3.12.74-60.64.124.1.noarch",
"product": {
"name": "kernel-source-3.12.74-60.64.124.1.noarch",
"product_id": "kernel-source-3.12.74-60.64.124.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-3.12.74-60.64.124.1.noarch",
"product": {
"name": "kernel-source-vanilla-3.12.74-60.64.124.1.noarch",
"product_id": "kernel-source-vanilla-3.12.74-60.64.124.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-3.12.74-60.64.124.1.ppc64le",
"product": {
"name": "kernel-debug-3.12.74-60.64.124.1.ppc64le",
"product_id": "kernel-debug-3.12.74-60.64.124.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-3.12.74-60.64.124.1.ppc64le",
"product": {
"name": "kernel-debug-base-3.12.74-60.64.124.1.ppc64le",
"product_id": "kernel-debug-base-3.12.74-60.64.124.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-3.12.74-60.64.124.1.ppc64le",
"product": {
"name": "kernel-debug-devel-3.12.74-60.64.124.1.ppc64le",
"product_id": "kernel-debug-devel-3.12.74-60.64.124.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-extra-3.12.74-60.64.124.1.ppc64le",
"product": {
"name": "kernel-debug-extra-3.12.74-60.64.124.1.ppc64le",
"product_id": "kernel-debug-extra-3.12.74-60.64.124.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-3.12.74-60.64.124.1.ppc64le",
"product": {
"name": "kernel-default-3.12.74-60.64.124.1.ppc64le",
"product_id": "kernel-default-3.12.74-60.64.124.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"product": {
"name": "kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"product_id": "kernel-default-base-3.12.74-60.64.124.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"product": {
"name": "kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"product_id": "kernel-default-devel-3.12.74-60.64.124.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-3.12.74-60.64.124.1.ppc64le",
"product": {
"name": "kernel-default-extra-3.12.74-60.64.124.1.ppc64le",
"product_id": "kernel-default-extra-3.12.74-60.64.124.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-3.12.74-60.64.124.1.ppc64le",
"product": {
"name": "kernel-obs-build-3.12.74-60.64.124.1.ppc64le",
"product_id": "kernel-obs-build-3.12.74-60.64.124.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-3.12.74-60.64.124.1.ppc64le",
"product": {
"name": "kernel-obs-qa-3.12.74-60.64.124.1.ppc64le",
"product_id": "kernel-obs-qa-3.12.74-60.64.124.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-3.12.74-60.64.124.1.ppc64le",
"product": {
"name": "kernel-syms-3.12.74-60.64.124.1.ppc64le",
"product_id": "kernel-syms-3.12.74-60.64.124.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-default-3.12.74-60.64.124.1.s390x",
"product": {
"name": "kernel-default-3.12.74-60.64.124.1.s390x",
"product_id": "kernel-default-3.12.74-60.64.124.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-3.12.74-60.64.124.1.s390x",
"product": {
"name": "kernel-default-base-3.12.74-60.64.124.1.s390x",
"product_id": "kernel-default-base-3.12.74-60.64.124.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-3.12.74-60.64.124.1.s390x",
"product": {
"name": "kernel-default-devel-3.12.74-60.64.124.1.s390x",
"product_id": "kernel-default-devel-3.12.74-60.64.124.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-3.12.74-60.64.124.1.s390x",
"product": {
"name": "kernel-default-extra-3.12.74-60.64.124.1.s390x",
"product_id": "kernel-default-extra-3.12.74-60.64.124.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-man-3.12.74-60.64.124.1.s390x",
"product": {
"name": "kernel-default-man-3.12.74-60.64.124.1.s390x",
"product_id": "kernel-default-man-3.12.74-60.64.124.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-3.12.74-60.64.124.1.s390x",
"product": {
"name": "kernel-obs-build-3.12.74-60.64.124.1.s390x",
"product_id": "kernel-obs-build-3.12.74-60.64.124.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-3.12.74-60.64.124.1.s390x",
"product": {
"name": "kernel-obs-qa-3.12.74-60.64.124.1.s390x",
"product_id": "kernel-obs-qa-3.12.74-60.64.124.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-3.12.74-60.64.124.1.s390x",
"product": {
"name": "kernel-syms-3.12.74-60.64.124.1.s390x",
"product_id": "kernel-syms-3.12.74-60.64.124.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-3.12.74-60.64.124.1.s390x",
"product": {
"name": "kernel-vanilla-3.12.74-60.64.124.1.s390x",
"product_id": "kernel-vanilla-3.12.74-60.64.124.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-3.12.74-60.64.124.1.s390x",
"product": {
"name": "kernel-vanilla-devel-3.12.74-60.64.124.1.s390x",
"product_id": "kernel-vanilla-devel-3.12.74-60.64.124.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-3.12.74-60.64.124.1.s390x",
"product": {
"name": "kernel-zfcpdump-3.12.74-60.64.124.1.s390x",
"product_id": "kernel-zfcpdump-3.12.74-60.64.124.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-3.12.74-60.64.124.1.x86_64",
"product": {
"name": "kernel-debug-3.12.74-60.64.124.1.x86_64",
"product_id": "kernel-debug-3.12.74-60.64.124.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-3.12.74-60.64.124.1.x86_64",
"product": {
"name": "kernel-debug-base-3.12.74-60.64.124.1.x86_64",
"product_id": "kernel-debug-base-3.12.74-60.64.124.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-3.12.74-60.64.124.1.x86_64",
"product": {
"name": "kernel-debug-devel-3.12.74-60.64.124.1.x86_64",
"product_id": "kernel-debug-devel-3.12.74-60.64.124.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-extra-3.12.74-60.64.124.1.x86_64",
"product": {
"name": "kernel-debug-extra-3.12.74-60.64.124.1.x86_64",
"product_id": "kernel-debug-extra-3.12.74-60.64.124.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-3.12.74-60.64.124.1.x86_64",
"product": {
"name": "kernel-default-3.12.74-60.64.124.1.x86_64",
"product_id": "kernel-default-3.12.74-60.64.124.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-3.12.74-60.64.124.1.x86_64",
"product": {
"name": "kernel-default-base-3.12.74-60.64.124.1.x86_64",
"product_id": "kernel-default-base-3.12.74-60.64.124.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"product": {
"name": "kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"product_id": "kernel-default-devel-3.12.74-60.64.124.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-3.12.74-60.64.124.1.x86_64",
"product": {
"name": "kernel-default-extra-3.12.74-60.64.124.1.x86_64",
"product_id": "kernel-default-extra-3.12.74-60.64.124.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-ec2-3.12.74-60.64.124.1.x86_64",
"product": {
"name": "kernel-ec2-3.12.74-60.64.124.1.x86_64",
"product_id": "kernel-ec2-3.12.74-60.64.124.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-ec2-base-3.12.74-60.64.124.1.x86_64",
"product": {
"name": "kernel-ec2-base-3.12.74-60.64.124.1.x86_64",
"product_id": "kernel-ec2-base-3.12.74-60.64.124.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"product": {
"name": "kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"product_id": "kernel-ec2-devel-3.12.74-60.64.124.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"product": {
"name": "kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"product_id": "kernel-ec2-extra-3.12.74-60.64.124.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-3.12.74-60.64.124.1.x86_64",
"product": {
"name": "kernel-obs-build-3.12.74-60.64.124.1.x86_64",
"product_id": "kernel-obs-build-3.12.74-60.64.124.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-3.12.74-60.64.124.1.x86_64",
"product": {
"name": "kernel-obs-qa-3.12.74-60.64.124.1.x86_64",
"product_id": "kernel-obs-qa-3.12.74-60.64.124.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-3.12.74-60.64.124.1.x86_64",
"product": {
"name": "kernel-syms-3.12.74-60.64.124.1.x86_64",
"product_id": "kernel-syms-3.12.74-60.64.124.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-3.12.74-60.64.124.1.x86_64",
"product": {
"name": "kernel-vanilla-3.12.74-60.64.124.1.x86_64",
"product_id": "kernel-vanilla-3.12.74-60.64.124.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-3.12.74-60.64.124.1.x86_64",
"product": {
"name": "kernel-vanilla-devel-3.12.74-60.64.124.1.x86_64",
"product_id": "kernel-vanilla-devel-3.12.74-60.64.124.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-xen-3.12.74-60.64.124.1.x86_64",
"product": {
"name": "kernel-xen-3.12.74-60.64.124.1.x86_64",
"product_id": "kernel-xen-3.12.74-60.64.124.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"product": {
"name": "kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"product_id": "kernel-xen-base-3.12.74-60.64.124.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"product": {
"name": "kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"product_id": "kernel-xen-devel-3.12.74-60.64.124.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-xen-extra-3.12.74-60.64.124.1.x86_64",
"product": {
"name": "kernel-xen-extra-3.12.74-60.64.124.1.x86_64",
"product_id": "kernel-xen-extra-3.12.74-60.64.124.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"product": {
"name": "kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"product_id": "kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"product": {
"name": "kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"product_id": "kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Public Cloud 12",
"product": {
"name": "SUSE Linux Enterprise Module for Public Cloud 12",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 12",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-public-cloud:12"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP1-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12:sp1"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-3.12.74-60.64.124.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64"
},
"product_reference": "kernel-ec2-3.12.74-60.64.124.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-devel-3.12.74-60.64.124.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64"
},
"product_reference": "kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-extra-3.12.74-60.64.124.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64"
},
"product_reference": "kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.12.74-60.64.124.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64"
},
"product_reference": "kernel-default-3.12.74-60.64.124.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.12.74-60.64.124.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64"
},
"product_reference": "kernel-default-base-3.12.74-60.64.124.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.12.74-60.64.124.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64"
},
"product_reference": "kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-3.12.74-60.64.124.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch"
},
"product_reference": "kernel-devel-3.12.74-60.64.124.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-3.12.74-60.64.124.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch"
},
"product_reference": "kernel-macros-3.12.74-60.64.124.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-3.12.74-60.64.124.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch"
},
"product_reference": "kernel-source-3.12.74-60.64.124.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.12.74-60.64.124.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64"
},
"product_reference": "kernel-syms-3.12.74-60.64.124.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-3.12.74-60.64.124.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64"
},
"product_reference": "kernel-xen-3.12.74-60.64.124.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-base-3.12.74-60.64.124.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64"
},
"product_reference": "kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-3.12.74-60.64.124.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64"
},
"product_reference": "kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.12.74-60.64.124.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le"
},
"product_reference": "kernel-default-3.12.74-60.64.124.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.12.74-60.64.124.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x"
},
"product_reference": "kernel-default-3.12.74-60.64.124.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.12.74-60.64.124.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64"
},
"product_reference": "kernel-default-3.12.74-60.64.124.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.12.74-60.64.124.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le"
},
"product_reference": "kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.12.74-60.64.124.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x"
},
"product_reference": "kernel-default-base-3.12.74-60.64.124.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.12.74-60.64.124.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64"
},
"product_reference": "kernel-default-base-3.12.74-60.64.124.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.12.74-60.64.124.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le"
},
"product_reference": "kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.12.74-60.64.124.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x"
},
"product_reference": "kernel-default-devel-3.12.74-60.64.124.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.12.74-60.64.124.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64"
},
"product_reference": "kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-3.12.74-60.64.124.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x"
},
"product_reference": "kernel-default-man-3.12.74-60.64.124.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-3.12.74-60.64.124.1.noarch as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch"
},
"product_reference": "kernel-devel-3.12.74-60.64.124.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-3.12.74-60.64.124.1.noarch as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch"
},
"product_reference": "kernel-macros-3.12.74-60.64.124.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-3.12.74-60.64.124.1.noarch as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch"
},
"product_reference": "kernel-source-3.12.74-60.64.124.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.12.74-60.64.124.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le"
},
"product_reference": "kernel-syms-3.12.74-60.64.124.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.12.74-60.64.124.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x"
},
"product_reference": "kernel-syms-3.12.74-60.64.124.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.12.74-60.64.124.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64"
},
"product_reference": "kernel-syms-3.12.74-60.64.124.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-3.12.74-60.64.124.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64"
},
"product_reference": "kernel-xen-3.12.74-60.64.124.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-base-3.12.74-60.64.124.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64"
},
"product_reference": "kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-3.12.74-60.64.124.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64"
},
"product_reference": "kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
},
"product_reference": "kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2016-10906",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-10906"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in drivers/net/ethernet/arc/emac_main.c in the Linux kernel before 4.5. A use-after-free is caused by a race condition between the functions arc_emac_tx and arc_emac_tx_clean.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-10906",
"url": "https://www.suse.com/security/cve/CVE-2016-10906"
},
{
"category": "external",
"summary": "SUSE Bug 1146584 for CVE-2016-10906",
"url": "https://bugzilla.suse.com/1146584"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:12:17Z",
"details": "moderate"
}
],
"title": "CVE-2016-10906"
},
{
"cve": "CVE-2017-18509",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-18509"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in net/ipv6/ip6mr.c in the Linux kernel before 4.11. By setting a specific socket option, an attacker can control a pointer in kernel land and cause an inet_csk_listen_stop general protection fault, or potentially execute arbitrary code under certain circumstances. The issue can be triggered as root (e.g., inside a default LXC container or with the CAP_NET_ADMIN capability) or after namespace unsharing. This occurs because sk_type and protocol are not checked in the appropriate part of the ip6_mroute_* functions. NOTE: this affects Linux distributions that use 4.9.x longterm kernels before 4.9.187.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-18509",
"url": "https://www.suse.com/security/cve/CVE-2017-18509"
},
{
"category": "external",
"summary": "SUSE Bug 1145477 for CVE-2017-18509",
"url": "https://bugzilla.suse.com/1145477"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:12:17Z",
"details": "moderate"
}
],
"title": "CVE-2017-18509"
},
{
"cve": "CVE-2017-18551",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-18551"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in drivers/i2c/i2c-core-smbus.c in the Linux kernel before 4.14.15. There is an out of bounds write in the function i2c_smbus_xfer_emulated.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-18551",
"url": "https://www.suse.com/security/cve/CVE-2017-18551"
},
{
"category": "external",
"summary": "SUSE Bug 1146163 for CVE-2017-18551",
"url": "https://bugzilla.suse.com/1146163"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:12:17Z",
"details": "moderate"
}
],
"title": "CVE-2017-18551"
},
{
"cve": "CVE-2017-18595",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-18595"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 4.14.11. A double free may be caused by the function allocate_trace_buffer in the file kernel/trace/trace.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-18595",
"url": "https://www.suse.com/security/cve/CVE-2017-18595"
},
{
"category": "external",
"summary": "SUSE Bug 1149555 for CVE-2017-18595",
"url": "https://bugzilla.suse.com/1149555"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:12:17Z",
"details": "moderate"
}
],
"title": "CVE-2017-18595"
},
{
"cve": "CVE-2018-12207",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-12207"
}
],
"notes": [
{
"category": "general",
"text": "Improper invalidation for page table updates by a virtual guest operating system for multiple Intel(R) Processors may allow an authenticated user to potentially enable denial of service of the host system via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-12207",
"url": "https://www.suse.com/security/cve/CVE-2018-12207"
},
{
"category": "external",
"summary": "SUSE Bug 1117665 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1117665"
},
{
"category": "external",
"summary": "SUSE Bug 1139073 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1139073"
},
{
"category": "external",
"summary": "SUSE Bug 1152505 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1152505"
},
{
"category": "external",
"summary": "SUSE Bug 1155812 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1155812"
},
{
"category": "external",
"summary": "SUSE Bug 1155817 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1155817"
},
{
"category": "external",
"summary": "SUSE Bug 1155945 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1155945"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1201877"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:12:17Z",
"details": "moderate"
}
],
"title": "CVE-2018-12207"
},
{
"cve": "CVE-2018-20976",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-20976"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in fs/xfs/xfs_super.c in the Linux kernel before 4.18. A use after free exists, related to xfs_fs_fill_super failure.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-20976",
"url": "https://www.suse.com/security/cve/CVE-2018-20976"
},
{
"category": "external",
"summary": "SUSE Bug 1146285 for CVE-2018-20976",
"url": "https://bugzilla.suse.com/1146285"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:12:17Z",
"details": "moderate"
}
],
"title": "CVE-2018-20976"
},
{
"cve": "CVE-2019-10207",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-10207"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel\u0027s Bluetooth implementation of UART, all versions kernel 3.x.x before 4.18.0 and kernel 5.x.x. An attacker with local access and write permissions to the Bluetooth hardware could use this flaw to issue a specially crafted ioctl function call and cause the system to crash.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-10207",
"url": "https://www.suse.com/security/cve/CVE-2019-10207"
},
{
"category": "external",
"summary": "SUSE Bug 1123959 for CVE-2019-10207",
"url": "https://bugzilla.suse.com/1123959"
},
{
"category": "external",
"summary": "SUSE Bug 1142857 for CVE-2019-10207",
"url": "https://bugzilla.suse.com/1142857"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:12:17Z",
"details": "moderate"
}
],
"title": "CVE-2019-10207"
},
{
"cve": "CVE-2019-10220",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-10220"
}
],
"notes": [
{
"category": "general",
"text": "Linux kernel CIFS implementation, version 4.9.0 is vulnerable to a relative paths injection in directory entry lists.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-10220",
"url": "https://www.suse.com/security/cve/CVE-2019-10220"
},
{
"category": "external",
"summary": "SUSE Bug 1144903 for CVE-2019-10220",
"url": "https://bugzilla.suse.com/1144903"
},
{
"category": "external",
"summary": "SUSE Bug 1153108 for CVE-2019-10220",
"url": "https://bugzilla.suse.com/1153108"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:12:17Z",
"details": "important"
}
],
"title": "CVE-2019-10220"
},
{
"cve": "CVE-2019-11135",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11135"
}
],
"notes": [
{
"category": "general",
"text": "TSX Asynchronous Abort condition on some CPUs utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11135",
"url": "https://www.suse.com/security/cve/CVE-2019-11135"
},
{
"category": "external",
"summary": "SUSE Bug 1139073 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1139073"
},
{
"category": "external",
"summary": "SUSE Bug 1152497 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1152497"
},
{
"category": "external",
"summary": "SUSE Bug 1152505 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1152505"
},
{
"category": "external",
"summary": "SUSE Bug 1152506 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1152506"
},
{
"category": "external",
"summary": "SUSE Bug 1160120 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1160120"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1201877"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:12:17Z",
"details": "moderate"
}
],
"title": "CVE-2019-11135"
},
{
"cve": "CVE-2019-11477",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11477"
}
],
"notes": [
{
"category": "general",
"text": "Jonathan Looney discovered that the TCP_SKB_CB(skb)-\u003etcp_gso_segs value was subject to an integer overflow in the Linux kernel when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52, 5.1.11, and is fixed in commit 3b4929f65b0d8249f19a50245cd88ed1a2f78cff.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11477",
"url": "https://www.suse.com/security/cve/CVE-2019-11477"
},
{
"category": "external",
"summary": "SUSE Bug 1132686 for CVE-2019-11477",
"url": "https://bugzilla.suse.com/1132686"
},
{
"category": "external",
"summary": "SUSE Bug 1137586 for CVE-2019-11477",
"url": "https://bugzilla.suse.com/1137586"
},
{
"category": "external",
"summary": "SUSE Bug 1142129 for CVE-2019-11477",
"url": "https://bugzilla.suse.com/1142129"
},
{
"category": "external",
"summary": "SUSE Bug 1153242 for CVE-2019-11477",
"url": "https://bugzilla.suse.com/1153242"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:12:17Z",
"details": "important"
}
],
"title": "CVE-2019-11477"
},
{
"cve": "CVE-2019-14814",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-14814"
}
],
"notes": [
{
"category": "general",
"text": "There is heap-based buffer overflow in Linux kernel, all versions up to, excluding 5.3, in the marvell wifi chip driver in Linux kernel, that allows local users to cause a denial of service(system crash) or possibly execute arbitrary code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-14814",
"url": "https://www.suse.com/security/cve/CVE-2019-14814"
},
{
"category": "external",
"summary": "SUSE Bug 1146512 for CVE-2019-14814",
"url": "https://bugzilla.suse.com/1146512"
},
{
"category": "external",
"summary": "SUSE Bug 1173664 for CVE-2019-14814",
"url": "https://bugzilla.suse.com/1173664"
},
{
"category": "external",
"summary": "SUSE Bug 1173665 for CVE-2019-14814",
"url": "https://bugzilla.suse.com/1173665"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:12:17Z",
"details": "important"
}
],
"title": "CVE-2019-14814"
},
{
"cve": "CVE-2019-14815",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-14815"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability was found in Linux Kernel, where a Heap Overflow was found in mwifiex_set_wmm_params() function of Marvell Wifi Driver.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-14815",
"url": "https://www.suse.com/security/cve/CVE-2019-14815"
},
{
"category": "external",
"summary": "SUSE Bug 1146514 for CVE-2019-14815",
"url": "https://bugzilla.suse.com/1146514"
},
{
"category": "external",
"summary": "SUSE Bug 1173665 for CVE-2019-14815",
"url": "https://bugzilla.suse.com/1173665"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:12:17Z",
"details": "important"
}
],
"title": "CVE-2019-14815"
},
{
"cve": "CVE-2019-14816",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-14816"
}
],
"notes": [
{
"category": "general",
"text": "There is heap-based buffer overflow in kernel, all versions up to, excluding 5.3, in the marvell wifi chip driver in Linux kernel, that allows local users to cause a denial of service(system crash) or possibly execute arbitrary code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-14816",
"url": "https://www.suse.com/security/cve/CVE-2019-14816"
},
{
"category": "external",
"summary": "SUSE Bug 1146516 for CVE-2019-14816",
"url": "https://bugzilla.suse.com/1146516"
},
{
"category": "external",
"summary": "SUSE Bug 1173666 for CVE-2019-14816",
"url": "https://bugzilla.suse.com/1173666"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:12:17Z",
"details": "important"
}
],
"title": "CVE-2019-14816"
},
{
"cve": "CVE-2019-14821",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-14821"
}
],
"notes": [
{
"category": "general",
"text": "An out-of-bounds access issue was found in the Linux kernel, all versions through 5.3, in the way Linux kernel\u0027s KVM hypervisor implements the Coalesced MMIO write operation. It operates on an MMIO ring buffer \u0027struct kvm_coalesced_mmio\u0027 object, wherein write indices \u0027ring-\u003efirst\u0027 and \u0027ring-\u003elast\u0027 value could be supplied by a host user-space process. An unprivileged host user or process with access to \u0027/dev/kvm\u0027 device could use this flaw to crash the host kernel, resulting in a denial of service or potentially escalating privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-14821",
"url": "https://www.suse.com/security/cve/CVE-2019-14821"
},
{
"category": "external",
"summary": "SUSE Bug 1151350 for CVE-2019-14821",
"url": "https://bugzilla.suse.com/1151350"
},
{
"category": "external",
"summary": "SUSE Bug 1218966 for CVE-2019-14821",
"url": "https://bugzilla.suse.com/1218966"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:12:17Z",
"details": "moderate"
}
],
"title": "CVE-2019-14821"
},
{
"cve": "CVE-2019-14835",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-14835"
}
],
"notes": [
{
"category": "general",
"text": "A buffer overflow flaw was found, in versions from 2.6.34 to 5.2.x, in the way Linux kernel\u0027s vhost functionality that translates virtqueue buffers to IOVs, logged the buffer descriptors during migration. A privileged guest user able to pass descriptors with invalid length to the host when migration is underway, could use this flaw to increase their privileges on the host.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-14835",
"url": "https://www.suse.com/security/cve/CVE-2019-14835"
},
{
"category": "external",
"summary": "SUSE Bug 1150112 for CVE-2019-14835",
"url": "https://bugzilla.suse.com/1150112"
},
{
"category": "external",
"summary": "SUSE Bug 1151021 for CVE-2019-14835",
"url": "https://bugzilla.suse.com/1151021"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:12:17Z",
"details": "important"
}
],
"title": "CVE-2019-14835"
},
{
"cve": "CVE-2019-15098",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15098"
}
],
"notes": [
{
"category": "general",
"text": "drivers/net/wireless/ath/ath6kl/usb.c in the Linux kernel through 5.2.9 has a NULL pointer dereference via an incomplete address in an endpoint descriptor.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15098",
"url": "https://www.suse.com/security/cve/CVE-2019-15098"
},
{
"category": "external",
"summary": "SUSE Bug 1146378 for CVE-2019-15098",
"url": "https://bugzilla.suse.com/1146378"
},
{
"category": "external",
"summary": "SUSE Bug 1146543 for CVE-2019-15098",
"url": "https://bugzilla.suse.com/1146543"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:12:17Z",
"details": "moderate"
}
],
"title": "CVE-2019-15098"
},
{
"cve": "CVE-2019-15118",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15118"
}
],
"notes": [
{
"category": "general",
"text": "check_input_term in sound/usb/mixer.c in the Linux kernel through 5.2.9 mishandles recursion, leading to kernel stack exhaustion.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15118",
"url": "https://www.suse.com/security/cve/CVE-2019-15118"
},
{
"category": "external",
"summary": "SUSE Bug 1145922 for CVE-2019-15118",
"url": "https://bugzilla.suse.com/1145922"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:12:17Z",
"details": "moderate"
}
],
"title": "CVE-2019-15118"
},
{
"cve": "CVE-2019-15212",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15212"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.1.8. There is a double-free caused by a malicious USB device in the drivers/usb/misc/rio500.c driver.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15212",
"url": "https://www.suse.com/security/cve/CVE-2019-15212"
},
{
"category": "external",
"summary": "SUSE Bug 1146391 for CVE-2019-15212",
"url": "https://bugzilla.suse.com/1146391"
},
{
"category": "external",
"summary": "SUSE Bug 1146519 for CVE-2019-15212",
"url": "https://bugzilla.suse.com/1146519"
},
{
"category": "external",
"summary": "SUSE Bug 1158381 for CVE-2019-15212",
"url": "https://bugzilla.suse.com/1158381"
},
{
"category": "external",
"summary": "SUSE Bug 1158834 for CVE-2019-15212",
"url": "https://bugzilla.suse.com/1158834"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:12:17Z",
"details": "moderate"
}
],
"title": "CVE-2019-15212"
},
{
"cve": "CVE-2019-15215",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15215"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.2.6. There is a use-after-free caused by a malicious USB device in the drivers/media/usb/cpia2/cpia2_usb.c driver.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15215",
"url": "https://www.suse.com/security/cve/CVE-2019-15215"
},
{
"category": "external",
"summary": "SUSE Bug 1146425 for CVE-2019-15215",
"url": "https://bugzilla.suse.com/1146425"
},
{
"category": "external",
"summary": "SUSE Bug 1146519 for CVE-2019-15215",
"url": "https://bugzilla.suse.com/1146519"
},
{
"category": "external",
"summary": "SUSE Bug 1158381 for CVE-2019-15215",
"url": "https://bugzilla.suse.com/1158381"
},
{
"category": "external",
"summary": "SUSE Bug 1158834 for CVE-2019-15215",
"url": "https://bugzilla.suse.com/1158834"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:12:17Z",
"details": "moderate"
}
],
"title": "CVE-2019-15215"
},
{
"cve": "CVE-2019-15216",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15216"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.0.14. There is a NULL pointer dereference caused by a malicious USB device in the drivers/usb/misc/yurex.c driver.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15216",
"url": "https://www.suse.com/security/cve/CVE-2019-15216"
},
{
"category": "external",
"summary": "SUSE Bug 1146361 for CVE-2019-15216",
"url": "https://bugzilla.suse.com/1146361"
},
{
"category": "external",
"summary": "SUSE Bug 1146519 for CVE-2019-15216",
"url": "https://bugzilla.suse.com/1146519"
},
{
"category": "external",
"summary": "SUSE Bug 1158381 for CVE-2019-15216",
"url": "https://bugzilla.suse.com/1158381"
},
{
"category": "external",
"summary": "SUSE Bug 1158834 for CVE-2019-15216",
"url": "https://bugzilla.suse.com/1158834"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:12:17Z",
"details": "moderate"
}
],
"title": "CVE-2019-15216"
},
{
"cve": "CVE-2019-15217",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15217"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.2.3. There is a NULL pointer dereference caused by a malicious USB device in the drivers/media/usb/zr364xx/zr364xx.c driver.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15217",
"url": "https://www.suse.com/security/cve/CVE-2019-15217"
},
{
"category": "external",
"summary": "SUSE Bug 1146519 for CVE-2019-15217",
"url": "https://bugzilla.suse.com/1146519"
},
{
"category": "external",
"summary": "SUSE Bug 1146547 for CVE-2019-15217",
"url": "https://bugzilla.suse.com/1146547"
},
{
"category": "external",
"summary": "SUSE Bug 1158381 for CVE-2019-15217",
"url": "https://bugzilla.suse.com/1158381"
},
{
"category": "external",
"summary": "SUSE Bug 1158834 for CVE-2019-15217",
"url": "https://bugzilla.suse.com/1158834"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:12:17Z",
"details": "moderate"
}
],
"title": "CVE-2019-15217"
},
{
"cve": "CVE-2019-15218",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15218"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.1.8. There is a NULL pointer dereference caused by a malicious USB device in the drivers/media/usb/siano/smsusb.c driver.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15218",
"url": "https://www.suse.com/security/cve/CVE-2019-15218"
},
{
"category": "external",
"summary": "SUSE Bug 1146413 for CVE-2019-15218",
"url": "https://bugzilla.suse.com/1146413"
},
{
"category": "external",
"summary": "SUSE Bug 1146519 for CVE-2019-15218",
"url": "https://bugzilla.suse.com/1146519"
},
{
"category": "external",
"summary": "SUSE Bug 1158381 for CVE-2019-15218",
"url": "https://bugzilla.suse.com/1158381"
},
{
"category": "external",
"summary": "SUSE Bug 1158834 for CVE-2019-15218",
"url": "https://bugzilla.suse.com/1158834"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:12:17Z",
"details": "moderate"
}
],
"title": "CVE-2019-15218"
},
{
"cve": "CVE-2019-15219",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15219"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.1.8. There is a NULL pointer dereference caused by a malicious USB device in the drivers/usb/misc/sisusbvga/sisusb.c driver.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15219",
"url": "https://www.suse.com/security/cve/CVE-2019-15219"
},
{
"category": "external",
"summary": "SUSE Bug 1146519 for CVE-2019-15219",
"url": "https://bugzilla.suse.com/1146519"
},
{
"category": "external",
"summary": "SUSE Bug 1146524 for CVE-2019-15219",
"url": "https://bugzilla.suse.com/1146524"
},
{
"category": "external",
"summary": "SUSE Bug 1158381 for CVE-2019-15219",
"url": "https://bugzilla.suse.com/1158381"
},
{
"category": "external",
"summary": "SUSE Bug 1158834 for CVE-2019-15219",
"url": "https://bugzilla.suse.com/1158834"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:12:17Z",
"details": "moderate"
}
],
"title": "CVE-2019-15219"
},
{
"cve": "CVE-2019-15220",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15220"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.2.1. There is a use-after-free caused by a malicious USB device in the drivers/net/wireless/intersil/p54/p54usb.c driver.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15220",
"url": "https://www.suse.com/security/cve/CVE-2019-15220"
},
{
"category": "external",
"summary": "SUSE Bug 1146519 for CVE-2019-15220",
"url": "https://bugzilla.suse.com/1146519"
},
{
"category": "external",
"summary": "SUSE Bug 1146526 for CVE-2019-15220",
"url": "https://bugzilla.suse.com/1146526"
},
{
"category": "external",
"summary": "SUSE Bug 1158381 for CVE-2019-15220",
"url": "https://bugzilla.suse.com/1158381"
},
{
"category": "external",
"summary": "SUSE Bug 1158834 for CVE-2019-15220",
"url": "https://bugzilla.suse.com/1158834"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:12:17Z",
"details": "moderate"
}
],
"title": "CVE-2019-15220"
},
{
"cve": "CVE-2019-15221",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15221"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.1.17. There is a NULL pointer dereference caused by a malicious USB device in the sound/usb/line6/pcm.c driver.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15221",
"url": "https://www.suse.com/security/cve/CVE-2019-15221"
},
{
"category": "external",
"summary": "SUSE Bug 1146519 for CVE-2019-15221",
"url": "https://bugzilla.suse.com/1146519"
},
{
"category": "external",
"summary": "SUSE Bug 1146529 for CVE-2019-15221",
"url": "https://bugzilla.suse.com/1146529"
},
{
"category": "external",
"summary": "SUSE Bug 1158381 for CVE-2019-15221",
"url": "https://bugzilla.suse.com/1158381"
},
{
"category": "external",
"summary": "SUSE Bug 1158834 for CVE-2019-15221",
"url": "https://bugzilla.suse.com/1158834"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:12:17Z",
"details": "moderate"
}
],
"title": "CVE-2019-15221"
},
{
"cve": "CVE-2019-15290",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15290"
}
],
"notes": [
{
"category": "general",
"text": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2019-15098. Reason: This candidate is a duplicate of CVE-2019-15098. Notes: All CVE users should reference CVE-2019-15098 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15290",
"url": "https://www.suse.com/security/cve/CVE-2019-15290"
},
{
"category": "external",
"summary": "SUSE Bug 1146378 for CVE-2019-15290",
"url": "https://bugzilla.suse.com/1146378"
},
{
"category": "external",
"summary": "SUSE Bug 1146519 for CVE-2019-15290",
"url": "https://bugzilla.suse.com/1146519"
},
{
"category": "external",
"summary": "SUSE Bug 1146543 for CVE-2019-15290",
"url": "https://bugzilla.suse.com/1146543"
},
{
"category": "external",
"summary": "SUSE Bug 1158381 for CVE-2019-15290",
"url": "https://bugzilla.suse.com/1158381"
},
{
"category": "external",
"summary": "SUSE Bug 1158834 for CVE-2019-15290",
"url": "https://bugzilla.suse.com/1158834"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:12:17Z",
"details": "moderate"
}
],
"title": "CVE-2019-15290"
},
{
"cve": "CVE-2019-15291",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15291"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 5.2.9. There is a NULL pointer dereference caused by a malicious USB device in the flexcop_usb_probe function in the drivers/media/usb/b2c2/flexcop-usb.c driver.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15291",
"url": "https://www.suse.com/security/cve/CVE-2019-15291"
},
{
"category": "external",
"summary": "SUSE Bug 1146519 for CVE-2019-15291",
"url": "https://bugzilla.suse.com/1146519"
},
{
"category": "external",
"summary": "SUSE Bug 1146540 for CVE-2019-15291",
"url": "https://bugzilla.suse.com/1146540"
},
{
"category": "external",
"summary": "SUSE Bug 1158381 for CVE-2019-15291",
"url": "https://bugzilla.suse.com/1158381"
},
{
"category": "external",
"summary": "SUSE Bug 1158834 for CVE-2019-15291",
"url": "https://bugzilla.suse.com/1158834"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:12:17Z",
"details": "moderate"
}
],
"title": "CVE-2019-15291"
},
{
"cve": "CVE-2019-15505",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15505"
}
],
"notes": [
{
"category": "general",
"text": "drivers/media/usb/dvb-usb/technisat-usb2.c in the Linux kernel through 5.2.9 has an out-of-bounds read via crafted USB device traffic (which may be remote via usbip or usbredir).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15505",
"url": "https://www.suse.com/security/cve/CVE-2019-15505"
},
{
"category": "external",
"summary": "SUSE Bug 1147122 for CVE-2019-15505",
"url": "https://bugzilla.suse.com/1147122"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:12:17Z",
"details": "moderate"
}
],
"title": "CVE-2019-15505"
},
{
"cve": "CVE-2019-15807",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15807"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel before 5.1.13, there is a memory leak in drivers/scsi/libsas/sas_expander.c when SAS expander discovery fails. This will cause a BUG and denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15807",
"url": "https://www.suse.com/security/cve/CVE-2019-15807"
},
{
"category": "external",
"summary": "SUSE Bug 1148938 for CVE-2019-15807",
"url": "https://bugzilla.suse.com/1148938"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:12:17Z",
"details": "moderate"
}
],
"title": "CVE-2019-15807"
},
{
"cve": "CVE-2019-15902",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15902"
}
],
"notes": [
{
"category": "general",
"text": "A backporting error was discovered in the Linux stable/longterm kernel 4.4.x through 4.4.190, 4.9.x through 4.9.190, 4.14.x through 4.14.141, 4.19.x through 4.19.69, and 5.2.x through 5.2.11. Misuse of the upstream \"x86/ptrace: Fix possible spectre-v1 in ptrace_get_debugreg()\" commit reintroduced the Spectre vulnerability that it aimed to eliminate. This occurred because the backport process depends on cherry picking specific commits, and because two (correctly ordered) code lines were swapped.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15902",
"url": "https://www.suse.com/security/cve/CVE-2019-15902"
},
{
"category": "external",
"summary": "SUSE Bug 1149376 for CVE-2019-15902",
"url": "https://bugzilla.suse.com/1149376"
},
{
"category": "external",
"summary": "SUSE Bug 1155131 for CVE-2019-15902",
"url": "https://bugzilla.suse.com/1155131"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:12:17Z",
"details": "moderate"
}
],
"title": "CVE-2019-15902"
},
{
"cve": "CVE-2019-15926",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15926"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.2.3. Out of bounds access exists in the functions ath6kl_wmi_pstream_timeout_event_rx and ath6kl_wmi_cac_event_rx in the file drivers/net/wireless/ath/ath6kl/wmi.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15926",
"url": "https://www.suse.com/security/cve/CVE-2019-15926"
},
{
"category": "external",
"summary": "SUSE Bug 1149527 for CVE-2019-15926",
"url": "https://bugzilla.suse.com/1149527"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:12:17Z",
"details": "moderate"
}
],
"title": "CVE-2019-15926"
},
{
"cve": "CVE-2019-15927",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15927"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 4.20.2. An out-of-bounds access exists in the function build_audio_procunit in the file sound/usb/mixer.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15927",
"url": "https://www.suse.com/security/cve/CVE-2019-15927"
},
{
"category": "external",
"summary": "SUSE Bug 1149522 for CVE-2019-15927",
"url": "https://bugzilla.suse.com/1149522"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:12:17Z",
"details": "moderate"
}
],
"title": "CVE-2019-15927"
},
{
"cve": "CVE-2019-16232",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-16232"
}
],
"notes": [
{
"category": "general",
"text": "drivers/net/wireless/marvell/libertas/if_sdio.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-16232",
"url": "https://www.suse.com/security/cve/CVE-2019-16232"
},
{
"category": "external",
"summary": "SUSE Bug 1150465 for CVE-2019-16232",
"url": "https://bugzilla.suse.com/1150465"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:12:17Z",
"details": "low"
}
],
"title": "CVE-2019-16232"
},
{
"cve": "CVE-2019-16233",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-16233"
}
],
"notes": [
{
"category": "general",
"text": "drivers/scsi/qla2xxx/qla_os.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-16233",
"url": "https://www.suse.com/security/cve/CVE-2019-16233"
},
{
"category": "external",
"summary": "SUSE Bug 1150457 for CVE-2019-16233",
"url": "https://bugzilla.suse.com/1150457"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:12:17Z",
"details": "low"
}
],
"title": "CVE-2019-16233"
},
{
"cve": "CVE-2019-16234",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-16234"
}
],
"notes": [
{
"category": "general",
"text": "drivers/net/wireless/intel/iwlwifi/pcie/trans.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-16234",
"url": "https://www.suse.com/security/cve/CVE-2019-16234"
},
{
"category": "external",
"summary": "SUSE Bug 1150452 for CVE-2019-16234",
"url": "https://bugzilla.suse.com/1150452"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:12:17Z",
"details": "low"
}
],
"title": "CVE-2019-16234"
},
{
"cve": "CVE-2019-16413",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-16413"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.0.4. The 9p filesystem did not protect i_size_write() properly, which causes an i_size_read() infinite loop and denial of service on SMP systems.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-16413",
"url": "https://www.suse.com/security/cve/CVE-2019-16413"
},
{
"category": "external",
"summary": "SUSE Bug 1151347 for CVE-2019-16413",
"url": "https://bugzilla.suse.com/1151347"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:12:17Z",
"details": "moderate"
}
],
"title": "CVE-2019-16413"
},
{
"cve": "CVE-2019-17055",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-17055"
}
],
"notes": [
{
"category": "general",
"text": "base_sock_create in drivers/isdn/mISDN/socket.c in the AF_ISDN network module in the Linux kernel through 5.3.2 does not enforce CAP_NET_RAW, which means that unprivileged users can create a raw socket, aka CID-b91ee4aa2a21.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-17055",
"url": "https://www.suse.com/security/cve/CVE-2019-17055"
},
{
"category": "external",
"summary": "SUSE Bug 1152782 for CVE-2019-17055",
"url": "https://bugzilla.suse.com/1152782"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:12:17Z",
"details": "low"
}
],
"title": "CVE-2019-17055"
},
{
"cve": "CVE-2019-17056",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-17056"
}
],
"notes": [
{
"category": "general",
"text": "llcp_sock_create in net/nfc/llcp_sock.c in the AF_NFC network module in the Linux kernel through 5.3.2 does not enforce CAP_NET_RAW, which means that unprivileged users can create a raw socket, aka CID-3a359798b176.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-17056",
"url": "https://www.suse.com/security/cve/CVE-2019-17056"
},
{
"category": "external",
"summary": "SUSE Bug 1152788 for CVE-2019-17056",
"url": "https://bugzilla.suse.com/1152788"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:12:17Z",
"details": "moderate"
}
],
"title": "CVE-2019-17056"
},
{
"cve": "CVE-2019-9456",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-9456"
}
],
"notes": [
{
"category": "general",
"text": "In the Android kernel in Pixel C USB monitor driver there is a possible OOB write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-9456",
"url": "https://www.suse.com/security/cve/CVE-2019-9456"
},
{
"category": "external",
"summary": "SUSE Bug 1150025 for CVE-2019-9456",
"url": "https://bugzilla.suse.com/1150025"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:12:17Z",
"details": "moderate"
}
],
"title": "CVE-2019-9456"
},
{
"cve": "CVE-2019-9506",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-9506"
}
],
"notes": [
{
"category": "general",
"text": "The Bluetooth BR/EDR specification up to and including version 5.1 permits sufficiently low encryption key length and does not prevent an attacker from influencing the key length negotiation. This allows practical brute-force attacks (aka \"KNOB\") that can decrypt traffic and inject arbitrary ciphertext without the victim noticing.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-9506",
"url": "https://www.suse.com/security/cve/CVE-2019-9506"
},
{
"category": "external",
"summary": "SUSE Bug 1137865 for CVE-2019-9506",
"url": "https://bugzilla.suse.com/1137865"
},
{
"category": "external",
"summary": "SUSE Bug 1146042 for CVE-2019-9506",
"url": "https://bugzilla.suse.com/1146042"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.s390x",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.124.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.124.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-default-1-2.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_124-xen-1-2.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:12:17Z",
"details": "moderate"
}
],
"title": "CVE-2019-9506"
}
]
}
suse-su-2019:2948-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\n\nThe SUSE Linux Enterprise 12 SP4 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\nCVE-2018-12207: Untrusted virtual machines on Intel CPUs could exploit a race condition in the Instruction Fetch Unit of the Intel CPU to cause a Machine Exception during Page Size Change, causing the CPU core to be non-functional.\n\nThe Linux Kernel KVM hypervisor was adjusted to avoid page size changes in executable pages by splitting / merging huge pages into small pages as needed.\nMore information can be found on https://www.suse.com/support/kb/doc/?id=7023735\n\nCVE-2019-11135: Aborting an asynchronous TSX operation on Intel CPUs with\nTransactional Memory support could be used to facilitate sidechannel\ninformation leaks out of microarchitectural buffers, similar to the previously\ndescribed \u0027Microarchitectural Data Sampling\u0027 attack.\n\nThe Linux kernel was supplemented with the option to disable TSX operation\naltogether (requiring CPU Microcode updates on older systems) and better\nflushing of microarchitectural buffers (VERW).\n\nThe set of options available is described in our TID at https://www.suse.com/support/kb/doc/?id=7024251\n\nOther security fixes:\n\n- CVE-2019-0154: Fixed a local denial of service via read of unprotected i915 registers. (bsc#1135966)\n- CVE-2019-0155: Fixed privilege escalation in the i915 driver. Batch buffers from usermode could have escalated privileges via blitter command stream. (bsc#1135967)\n- CVE-2019-16233: drivers/scsi/qla2xxx/qla_os.c did not check the alloc_workqueue return value, leading to a NULL pointer dereference. (bsc#1150457).\n- CVE-2019-10220: Added sanity checks on the pathnames passed to the user space. (bsc#1144903).\n\nThe following non-security bugs were fixed:\n\n- alsa: bebob: Fix prototype of helper function to return negative value (bsc#1051510).\n- alsa: hda/realtek - Add support for ALC623 (bsc#1051510).\n- alsa: hda/realtek - Add support for ALC711 (bsc#1051510).\n- alsa: hda/realtek - Fix 2 front mics of codec 0x623 (bsc#1051510).\n- alsa: hda: Add Elkhart Lake PCI ID (bsc#1051510).\n- alsa: hda: Add Tigerlake/Jasperlake PCI ID (bsc#1051510).\n- alsa: timer: Fix mutex deadlock at releasing card (bsc#1051510).\n- arcnet: provide a buffer big enough to actually receive packets (networking-stable-19_09_30).\n- asoc: rockchip: i2s: Fix RPM imbalance (bsc#1051510).\n- asoc: rsnd: Reinitialize bit clock inversion flag for every format setting (bsc#1051510).\n- bpf: fix use after free in prog symbol exposure (bsc#1083647).\n- btrfs: block-group: Fix a memory leak due to missing btrfs_put_block_group() (bsc#1155178).\n- btrfs: qgroup: Always free PREALLOC META reserve in btrfs_delalloc_release_extents() (bsc#1155179).\n- btrfs: tracepoints: Fix bad entry members of qgroup events (bsc#1155186).\n- btrfs: tracepoints: Fix wrong parameter order for qgroup events (bsc#1155184).\n- crypto: af_alg - Fix race around ctx-\u003ercvused by making it atomic_t (bsc#1154737).\n- crypto: af_alg - Initialize sg_num_bytes in error code path (bsc#1051510).\n- crypto: af_alg - consolidation of duplicate code (bsc#1154737).\n- crypto: af_alg - fix race accessing cipher request (bsc#1154737).\n- crypto: af_alg - remove locking in async callback (bsc#1154737).\n- crypto: af_alg - update correct dst SGL entry (bsc#1051510).\n- crypto: af_alg - wait for data at beginning of recvmsg (bsc#1154737).\n- crypto: algif - return error code when no data was processed (bsc#1154737).\n- crypto: algif_aead - copy AAD from src to dst (bsc#1154737).\n- crypto: algif_aead - fix reference counting of null skcipher (bsc#1154737).\n- crypto: algif_aead - overhaul memory management (bsc#1154737).\n- crypto: algif_aead - skip SGL entries with NULL page (bsc#1154737).\n- crypto: algif_skcipher - overhaul memory management (bsc#1154737).\n- cxgb4:Fix out-of-bounds MSI-X info array access (networking-stable-19_10_05).\n- drm/edid: Add 6 bpc quirk for SDC panel in Lenovo G50 (bsc#1051510).\n- drm/i915/cmdparser: Add support for backward jumps (bsc#1135967)\n- drm/i915/cmdparser: Ignore Length operands during command matching (bsc#1135967)\n- drm/i915/cmdparser: Use explicit goto for error paths (bsc#1135967)\n- drm/i915/gen8+: Add RC6 CTX corruption WA (bsc#1135967)\n- drm/i915/gtt: Add read only pages to gen8_pte_encode (bsc#1135967)\n- drm/i915/gtt: Disable read-only support under GVT (bsc#1135967)\n- drm/i915/gtt: Read-only pages for insert_entries on bdw (bsc#1135967)\n- drm/i915: Add gen9 BCS cmdparsing (bsc#1135967)\n- drm/i915: Add support for mandatory cmdparsing (bsc#1135967)\n- drm/i915: Allow parsing of unsized batches (bsc#1135967)\n- drm/i915: Disable Secure Batches for gen6+\n- drm/i915: Lower RM timeout to avoid DSI hard hangs (bsc#1135967)\n- drm/i915: Prevent writing into a read-only object via a GGTT mmap (bsc#1135967)\n- drm/i915: Remove Master tables from cmdparser\n- drm/i915: Rename gen7 cmdparser tables (bsc#1135967)\n- drm/i915: Support ro ppgtt mapped cmdparser shadow buffers (bsc#1135967)\n- efi/memattr: Do not bail on zero VA if it equals the region\u0027s PA (bsc#1051510).\n- efi: cper: print AER info of PCIe fatal error (bsc#1051510).\n- efivar/ssdt: Do not iterate over EFI vars if no SSDT override was specified (bsc#1051510).\n- hid: fix error message in hid_open_report() (bsc#1051510).\n- hid: logitech-hidpp: do all FF cleanup in hidpp_ff_destroy() (bsc#1051510).\n- hso: fix NULL-deref on tty open (bsc#1051510).\n- hyperv: set nvme msi interrupts to unmanaged (jsc#SLE-8953, jsc#SLE-9221, jsc#SLE-4941, bsc#1119461, bsc#1119465, bsc#1138190, bsc#1154905).\n- ib/core: Add mitigation for Spectre V1 (bsc#1155671)\n- ieee802154: ca8210: prevent memory leak (bsc#1051510).\n- input: synaptics-rmi4 - avoid processing unknown IRQs (bsc#1051510).\n- integrity: prevent deadlock during digsig verification (bsc#1090631).\n- ipv6: Handle missing host route in __ipv6_ifa_notify (networking-stable-19_10_05).\n- ipv6: drop incoming packets having a v4mapped source address (networking-stable-19_10_05).\n- kABI workaround for crypto/af_alg changes (bsc#1154737).\n- kABI workaround for drm_vma_offset_node readonly field addition (bsc#1135967)\n- ksm: cleanup stable_node chain collapse case (bnc#1144338).\n- ksm: fix use after free with merge_across_nodes = 0 (bnc#1144338).\n- ksm: introduce ksm_max_page_sharing per page deduplication limit (bnc#1144338).\n- ksm: optimize refile of stable_node_dup at the head of the chain (bnc#1144338).\n- ksm: swap the two output parameters of chain/chain_prune (bnc#1144338).\n- kvm: vmx, svm: always run with EFER.NXE=1 when shadow paging is active (bsc#1117665).\n- kvm: x86: mmu: Recovery of shattered NX large pages (bsc#1117665, CVE-2018-12207).\n- mac80211: Reject malformed SSID elements (bsc#1051510).\n- mac80211: fix txq null pointer dereference (bsc#1051510).\n- md/raid0: avoid RAID0 data corruption due to layout confusion (bsc#1140090).\n- md/raid0: fix warning message for parameter default_layout (bsc#1140090).\n- net/phy: fix DP83865 10 Mbps HDX loopback disable function (networking-stable-19_09_30).\n- net/rds: Fix error handling in rds_ib_add_one() (networking-stable-19_10_05).\n- net/rds: fix warn in rds_message_alloc_sgs (bsc#1154848).\n- net/rds: remove user triggered WARN_ON in rds_sendmsg (bsc#1154848).\n- net/sched: act_sample: do not push mac header on ip6gre ingress (networking-stable-19_09_30).\n- net/smc: fix SMCD link group creation with VLAN id (bsc#1154959).\n- net: Replace NF_CT_ASSERT() with WARN_ON() (bsc#1146612).\n- net: Unpublish sk from sk_reuseport_cb before call_rcu (networking-stable-19_10_05).\n- net: openvswitch: free vport unless register_netdevice() succeeds (git-fixes).\n- net: qlogic: Fix memory leak in ql_alloc_large_buffers (networking-stable-19_10_05).\n- net: qrtr: Stop rx_worker before freeing node (networking-stable-19_09_30).\n- net_sched: add policy validation for action attributes (networking-stable-19_09_30).\n- net_sched: fix backward compatibility for TCA_ACT_KIND (git-fixes).\n- netfilter: nf_nat: do not bug when mapping already exists (bsc#1146612).\n- nfsv4.1 - backchannel request should hold ref on xprt (bsc#1152624).\n- nl80211: fix null pointer dereference (bsc#1051510).\n- openvswitch: change type of UPCALL_PID attribute to NLA_UNSPEC (networking-stable-19_09_30).\n- qmi_wwan: add support for Cinterion CLS8 devices (networking-stable-19_10_05).\n- r8152: Set macpassthru in reset_resume callback (bsc#1051510).\n- rds: Fix warning (bsc#1154848).\n- reiserfs: fix extended attributes on the root directory (bsc#1151225).\n- rpm/kernel-subpackage-spec: Mention debuginfo in the subpackage description (bsc#1149119).\n- s390/cmf: set_schib_wait add timeout (bsc#1153509, bsc#1153476).\n- sch_cbq: validate TCA_CBQ_WRROPT to avoid crash (networking-stable-19_10_05).\n- sch_dsmark: fix potential NULL deref in dsmark_init() (networking-stable-19_10_05).\n- sch_netem: fix a divide by zero in tabledist() (networking-stable-19_09_30).\n- sched/fair: Avoid divide by zero when rebalancing domains (bsc#1096254).\n- scsi: lpfc: Fix devices that do not return after devloss followed by rediscovery (bsc#1137040).\n- scsi: qla2xxx: Add error handling for PLOGI ELS passthrough (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Capture FW dump on MPI heartbeat stop event (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Check for MB timeout while capturing ISP27/28xx FW dump (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Dual FCP-NVMe target port support (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Fix N2N link reset (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Fix N2N link up fail (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Fix partial flash write of MBI (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Fix stale mem access on driver unload (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Fix unbound sleep in fcport delete path (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Fix wait condition in loop (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Improve logging for scan thread (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Initialized mailbox to prevent driver load failure (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Optimize NPIV tear down process (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Set remove flag for all VP (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Silence fwdump template message (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Update driver version to 10.01.00.20-k (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: fix a potential NULL pointer dereference (bsc#1150457 CVE-2019-16233).\n- scsi: qla2xxx: fixup incorrect usage of host_byte (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: remove redundant assignment to pointer host (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: stop timer in shutdown path (bsc#1143706 bsc#1082635 bsc#1123034).\n- skge: fix checksum byte order (networking-stable-19_09_30).\n- staging: wlan-ng: fix exit return when sme-\u003ekey_idx \u003e= NUM_WEPKEYS (bsc#1051510).\n- supporte.conf: add efivarfs to kernel-default-base (bsc#1154858).\n- tipc: fix unlimited bundling of small messages (networking-stable-19_10_05).\n- usb: ldusb: fix NULL-derefs on driver unbind (bsc#1051510).\n- usb: ldusb: fix memleak on disconnect (bsc#1051510).\n- usb: ldusb: fix read info leaks (bsc#1051510).\n- usb: legousbtower: fix a signedness bug in tower_probe() (bsc#1051510).\n- usb: legousbtower: fix memleak on disconnect (bsc#1051510).\n- usb: serial: ti_usb_3410_5052: fix port-close races (bsc#1051510).\n- usb: udc: lpc32xx: fix bad bit shift operation (bsc#1051510).\n- usb: usblp: fix use-after-free on disconnect (bsc#1051510).\n- vfs: Make filldir[64]() verify the directory entry filename is valid (bsc#1144903, CVE-2019-10220).\n- vsock: Fix a lockdep warning in __vsock_release() (networking-stable-19_10_05).\n- x86/boot/64: Make level2_kernel_pgt pages invalid outside kernel area (bnc#1153969).\n- x86/boot/64: Round memory hole size up to next PMD page (bnc#1153969).\n- x86/tsx: Add config options to set tsx=on|off|auto (bsc#1139073, CVE-2019-11135).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2019-2948,SUSE-SLE-DESKTOP-12-SP4-2019-2948,SUSE-SLE-HA-12-SP4-2019-2948,SUSE-SLE-Live-Patching-12-SP4-2019-2948,SUSE-SLE-SDK-12-SP4-2019-2948,SUSE-SLE-SERVER-12-SP4-2019-2948,SUSE-SLE-WE-12-SP4-2019-2948",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_2948-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2019:2948-1",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192948-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2019:2948-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2019-November/006109.html"
},
{
"category": "self",
"summary": "SUSE Bug 1051510",
"url": "https://bugzilla.suse.com/1051510"
},
{
"category": "self",
"summary": "SUSE Bug 1082635",
"url": "https://bugzilla.suse.com/1082635"
},
{
"category": "self",
"summary": "SUSE Bug 1083647",
"url": "https://bugzilla.suse.com/1083647"
},
{
"category": "self",
"summary": "SUSE Bug 1090631",
"url": "https://bugzilla.suse.com/1090631"
},
{
"category": "self",
"summary": "SUSE Bug 1096254",
"url": "https://bugzilla.suse.com/1096254"
},
{
"category": "self",
"summary": "SUSE Bug 1117665",
"url": "https://bugzilla.suse.com/1117665"
},
{
"category": "self",
"summary": "SUSE Bug 1119461",
"url": "https://bugzilla.suse.com/1119461"
},
{
"category": "self",
"summary": "SUSE Bug 1119465",
"url": "https://bugzilla.suse.com/1119465"
},
{
"category": "self",
"summary": "SUSE Bug 1123034",
"url": "https://bugzilla.suse.com/1123034"
},
{
"category": "self",
"summary": "SUSE Bug 1135966",
"url": "https://bugzilla.suse.com/1135966"
},
{
"category": "self",
"summary": "SUSE Bug 1135967",
"url": "https://bugzilla.suse.com/1135967"
},
{
"category": "self",
"summary": "SUSE Bug 1137040",
"url": "https://bugzilla.suse.com/1137040"
},
{
"category": "self",
"summary": "SUSE Bug 1138190",
"url": "https://bugzilla.suse.com/1138190"
},
{
"category": "self",
"summary": "SUSE Bug 1139073",
"url": "https://bugzilla.suse.com/1139073"
},
{
"category": "self",
"summary": "SUSE Bug 1140090",
"url": "https://bugzilla.suse.com/1140090"
},
{
"category": "self",
"summary": "SUSE Bug 1143706",
"url": "https://bugzilla.suse.com/1143706"
},
{
"category": "self",
"summary": "SUSE Bug 1144338",
"url": "https://bugzilla.suse.com/1144338"
},
{
"category": "self",
"summary": "SUSE Bug 1144903",
"url": "https://bugzilla.suse.com/1144903"
},
{
"category": "self",
"summary": "SUSE Bug 1146612",
"url": "https://bugzilla.suse.com/1146612"
},
{
"category": "self",
"summary": "SUSE Bug 1149119",
"url": "https://bugzilla.suse.com/1149119"
},
{
"category": "self",
"summary": "SUSE Bug 1150457",
"url": "https://bugzilla.suse.com/1150457"
},
{
"category": "self",
"summary": "SUSE Bug 1151225",
"url": "https://bugzilla.suse.com/1151225"
},
{
"category": "self",
"summary": "SUSE Bug 1152624",
"url": "https://bugzilla.suse.com/1152624"
},
{
"category": "self",
"summary": "SUSE Bug 1153476",
"url": "https://bugzilla.suse.com/1153476"
},
{
"category": "self",
"summary": "SUSE Bug 1153509",
"url": "https://bugzilla.suse.com/1153509"
},
{
"category": "self",
"summary": "SUSE Bug 1153969",
"url": "https://bugzilla.suse.com/1153969"
},
{
"category": "self",
"summary": "SUSE Bug 1154737",
"url": "https://bugzilla.suse.com/1154737"
},
{
"category": "self",
"summary": "SUSE Bug 1154848",
"url": "https://bugzilla.suse.com/1154848"
},
{
"category": "self",
"summary": "SUSE Bug 1154858",
"url": "https://bugzilla.suse.com/1154858"
},
{
"category": "self",
"summary": "SUSE Bug 1154905",
"url": "https://bugzilla.suse.com/1154905"
},
{
"category": "self",
"summary": "SUSE Bug 1154959",
"url": "https://bugzilla.suse.com/1154959"
},
{
"category": "self",
"summary": "SUSE Bug 1155178",
"url": "https://bugzilla.suse.com/1155178"
},
{
"category": "self",
"summary": "SUSE Bug 1155179",
"url": "https://bugzilla.suse.com/1155179"
},
{
"category": "self",
"summary": "SUSE Bug 1155184",
"url": "https://bugzilla.suse.com/1155184"
},
{
"category": "self",
"summary": "SUSE Bug 1155186",
"url": "https://bugzilla.suse.com/1155186"
},
{
"category": "self",
"summary": "SUSE Bug 1155671",
"url": "https://bugzilla.suse.com/1155671"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-12207 page",
"url": "https://www.suse.com/security/cve/CVE-2018-12207/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-0154 page",
"url": "https://www.suse.com/security/cve/CVE-2019-0154/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-0155 page",
"url": "https://www.suse.com/security/cve/CVE-2019-0155/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-10220 page",
"url": "https://www.suse.com/security/cve/CVE-2019-10220/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11135 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11135/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-16233 page",
"url": "https://www.suse.com/security/cve/CVE-2019-16233/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2019-11-12T18:08:20Z",
"generator": {
"date": "2019-11-12T18:08:20Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2019:2948-1",
"initial_release_date": "2019-11-12T18:08:20Z",
"revision_history": [
{
"date": "2019-11-12T18:08:20Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-95.40.1.aarch64",
"product": {
"name": "cluster-md-kmp-default-4.12.14-95.40.1.aarch64",
"product_id": "cluster-md-kmp-default-4.12.14-95.40.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-95.40.1.aarch64",
"product": {
"name": "dlm-kmp-default-4.12.14-95.40.1.aarch64",
"product_id": "dlm-kmp-default-4.12.14-95.40.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-95.40.1.aarch64",
"product": {
"name": "gfs2-kmp-default-4.12.14-95.40.1.aarch64",
"product_id": "gfs2-kmp-default-4.12.14-95.40.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-95.40.1.aarch64",
"product": {
"name": "kernel-default-4.12.14-95.40.1.aarch64",
"product_id": "kernel-default-4.12.14-95.40.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-95.40.1.aarch64",
"product": {
"name": "kernel-default-base-4.12.14-95.40.1.aarch64",
"product_id": "kernel-default-base-4.12.14-95.40.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-95.40.1.aarch64",
"product": {
"name": "kernel-default-devel-4.12.14-95.40.1.aarch64",
"product_id": "kernel-default-devel-4.12.14-95.40.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-95.40.1.aarch64",
"product": {
"name": "kernel-default-extra-4.12.14-95.40.1.aarch64",
"product_id": "kernel-default-extra-4.12.14-95.40.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.12.14-95.40.1.aarch64",
"product": {
"name": "kernel-default-kgraft-4.12.14-95.40.1.aarch64",
"product_id": "kernel-default-kgraft-4.12.14-95.40.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-devel-4.12.14-95.40.1.aarch64",
"product": {
"name": "kernel-default-kgraft-devel-4.12.14-95.40.1.aarch64",
"product_id": "kernel-default-kgraft-devel-4.12.14-95.40.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-95.40.2.aarch64",
"product": {
"name": "kernel-obs-build-4.12.14-95.40.2.aarch64",
"product_id": "kernel-obs-build-4.12.14-95.40.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-95.40.2.aarch64",
"product": {
"name": "kernel-obs-qa-4.12.14-95.40.2.aarch64",
"product_id": "kernel-obs-qa-4.12.14-95.40.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-95.40.1.aarch64",
"product": {
"name": "kernel-syms-4.12.14-95.40.1.aarch64",
"product_id": "kernel-syms-4.12.14-95.40.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-95.40.1.aarch64",
"product": {
"name": "kernel-vanilla-4.12.14-95.40.1.aarch64",
"product_id": "kernel-vanilla-4.12.14-95.40.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-95.40.1.aarch64",
"product": {
"name": "kernel-vanilla-base-4.12.14-95.40.1.aarch64",
"product_id": "kernel-vanilla-base-4.12.14-95.40.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-95.40.1.aarch64",
"product": {
"name": "kernel-vanilla-devel-4.12.14-95.40.1.aarch64",
"product_id": "kernel-vanilla-devel-4.12.14-95.40.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-kgraft-devel-4.12.14-95.40.1.aarch64",
"product": {
"name": "kernel-vanilla-kgraft-devel-4.12.14-95.40.1.aarch64",
"product_id": "kernel-vanilla-kgraft-devel-4.12.14-95.40.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-95.40.1.aarch64",
"product": {
"name": "kselftests-kmp-default-4.12.14-95.40.1.aarch64",
"product_id": "kselftests-kmp-default-4.12.14-95.40.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-95.40.1.aarch64",
"product": {
"name": "ocfs2-kmp-default-4.12.14-95.40.1.aarch64",
"product_id": "ocfs2-kmp-default-4.12.14-95.40.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-4.12.14-95.40.1.noarch",
"product": {
"name": "kernel-devel-4.12.14-95.40.1.noarch",
"product_id": "kernel-devel-4.12.14-95.40.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-4.12.14-95.40.1.noarch",
"product": {
"name": "kernel-docs-4.12.14-95.40.1.noarch",
"product_id": "kernel-docs-4.12.14-95.40.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-html-4.12.14-95.40.1.noarch",
"product": {
"name": "kernel-docs-html-4.12.14-95.40.1.noarch",
"product_id": "kernel-docs-html-4.12.14-95.40.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-4.12.14-95.40.1.noarch",
"product": {
"name": "kernel-macros-4.12.14-95.40.1.noarch",
"product_id": "kernel-macros-4.12.14-95.40.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-4.12.14-95.40.1.noarch",
"product": {
"name": "kernel-source-4.12.14-95.40.1.noarch",
"product_id": "kernel-source-4.12.14-95.40.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-4.12.14-95.40.1.noarch",
"product": {
"name": "kernel-source-vanilla-4.12.14-95.40.1.noarch",
"product_id": "kernel-source-vanilla-4.12.14-95.40.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-95.40.1.ppc64le",
"product": {
"name": "cluster-md-kmp-default-4.12.14-95.40.1.ppc64le",
"product_id": "cluster-md-kmp-default-4.12.14-95.40.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-95.40.1.ppc64le",
"product": {
"name": "dlm-kmp-default-4.12.14-95.40.1.ppc64le",
"product_id": "dlm-kmp-default-4.12.14-95.40.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-95.40.1.ppc64le",
"product": {
"name": "gfs2-kmp-default-4.12.14-95.40.1.ppc64le",
"product_id": "gfs2-kmp-default-4.12.14-95.40.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-4.12.14-95.40.1.ppc64le",
"product": {
"name": "kernel-debug-4.12.14-95.40.1.ppc64le",
"product_id": "kernel-debug-4.12.14-95.40.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-4.12.14-95.40.1.ppc64le",
"product": {
"name": "kernel-debug-base-4.12.14-95.40.1.ppc64le",
"product_id": "kernel-debug-base-4.12.14-95.40.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-4.12.14-95.40.1.ppc64le",
"product": {
"name": "kernel-debug-devel-4.12.14-95.40.1.ppc64le",
"product_id": "kernel-debug-devel-4.12.14-95.40.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-kgraft-devel-4.12.14-95.40.1.ppc64le",
"product": {
"name": "kernel-debug-kgraft-devel-4.12.14-95.40.1.ppc64le",
"product_id": "kernel-debug-kgraft-devel-4.12.14-95.40.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-95.40.1.ppc64le",
"product": {
"name": "kernel-default-4.12.14-95.40.1.ppc64le",
"product_id": "kernel-default-4.12.14-95.40.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-95.40.1.ppc64le",
"product": {
"name": "kernel-default-base-4.12.14-95.40.1.ppc64le",
"product_id": "kernel-default-base-4.12.14-95.40.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-95.40.1.ppc64le",
"product": {
"name": "kernel-default-devel-4.12.14-95.40.1.ppc64le",
"product_id": "kernel-default-devel-4.12.14-95.40.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-95.40.1.ppc64le",
"product": {
"name": "kernel-default-extra-4.12.14-95.40.1.ppc64le",
"product_id": "kernel-default-extra-4.12.14-95.40.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.12.14-95.40.1.ppc64le",
"product": {
"name": "kernel-default-kgraft-4.12.14-95.40.1.ppc64le",
"product_id": "kernel-default-kgraft-4.12.14-95.40.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-devel-4.12.14-95.40.1.ppc64le",
"product": {
"name": "kernel-default-kgraft-devel-4.12.14-95.40.1.ppc64le",
"product_id": "kernel-default-kgraft-devel-4.12.14-95.40.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-95.40.2.ppc64le",
"product": {
"name": "kernel-obs-build-4.12.14-95.40.2.ppc64le",
"product_id": "kernel-obs-build-4.12.14-95.40.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-95.40.2.ppc64le",
"product": {
"name": "kernel-obs-qa-4.12.14-95.40.2.ppc64le",
"product_id": "kernel-obs-qa-4.12.14-95.40.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-95.40.1.ppc64le",
"product": {
"name": "kernel-syms-4.12.14-95.40.1.ppc64le",
"product_id": "kernel-syms-4.12.14-95.40.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-95.40.1.ppc64le",
"product": {
"name": "kernel-vanilla-4.12.14-95.40.1.ppc64le",
"product_id": "kernel-vanilla-4.12.14-95.40.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-95.40.1.ppc64le",
"product": {
"name": "kernel-vanilla-base-4.12.14-95.40.1.ppc64le",
"product_id": "kernel-vanilla-base-4.12.14-95.40.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-95.40.1.ppc64le",
"product": {
"name": "kernel-vanilla-devel-4.12.14-95.40.1.ppc64le",
"product_id": "kernel-vanilla-devel-4.12.14-95.40.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-kgraft-devel-4.12.14-95.40.1.ppc64le",
"product": {
"name": "kernel-vanilla-kgraft-devel-4.12.14-95.40.1.ppc64le",
"product_id": "kernel-vanilla-kgraft-devel-4.12.14-95.40.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_40-default-1-6.3.1.ppc64le",
"product": {
"name": "kgraft-patch-4_12_14-95_40-default-1-6.3.1.ppc64le",
"product_id": "kgraft-patch-4_12_14-95_40-default-1-6.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-95.40.1.ppc64le",
"product": {
"name": "kselftests-kmp-default-4.12.14-95.40.1.ppc64le",
"product_id": "kselftests-kmp-default-4.12.14-95.40.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-95.40.1.ppc64le",
"product": {
"name": "ocfs2-kmp-default-4.12.14-95.40.1.ppc64le",
"product_id": "ocfs2-kmp-default-4.12.14-95.40.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-95.40.1.s390x",
"product": {
"name": "cluster-md-kmp-default-4.12.14-95.40.1.s390x",
"product_id": "cluster-md-kmp-default-4.12.14-95.40.1.s390x"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-95.40.1.s390x",
"product": {
"name": "dlm-kmp-default-4.12.14-95.40.1.s390x",
"product_id": "dlm-kmp-default-4.12.14-95.40.1.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-95.40.1.s390x",
"product": {
"name": "gfs2-kmp-default-4.12.14-95.40.1.s390x",
"product_id": "gfs2-kmp-default-4.12.14-95.40.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-95.40.1.s390x",
"product": {
"name": "kernel-default-4.12.14-95.40.1.s390x",
"product_id": "kernel-default-4.12.14-95.40.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-95.40.1.s390x",
"product": {
"name": "kernel-default-base-4.12.14-95.40.1.s390x",
"product_id": "kernel-default-base-4.12.14-95.40.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-95.40.1.s390x",
"product": {
"name": "kernel-default-devel-4.12.14-95.40.1.s390x",
"product_id": "kernel-default-devel-4.12.14-95.40.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-95.40.1.s390x",
"product": {
"name": "kernel-default-extra-4.12.14-95.40.1.s390x",
"product_id": "kernel-default-extra-4.12.14-95.40.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.12.14-95.40.1.s390x",
"product": {
"name": "kernel-default-kgraft-4.12.14-95.40.1.s390x",
"product_id": "kernel-default-kgraft-4.12.14-95.40.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-devel-4.12.14-95.40.1.s390x",
"product": {
"name": "kernel-default-kgraft-devel-4.12.14-95.40.1.s390x",
"product_id": "kernel-default-kgraft-devel-4.12.14-95.40.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-man-4.12.14-95.40.1.s390x",
"product": {
"name": "kernel-default-man-4.12.14-95.40.1.s390x",
"product_id": "kernel-default-man-4.12.14-95.40.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-95.40.2.s390x",
"product": {
"name": "kernel-obs-build-4.12.14-95.40.2.s390x",
"product_id": "kernel-obs-build-4.12.14-95.40.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-95.40.2.s390x",
"product": {
"name": "kernel-obs-qa-4.12.14-95.40.2.s390x",
"product_id": "kernel-obs-qa-4.12.14-95.40.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-95.40.1.s390x",
"product": {
"name": "kernel-syms-4.12.14-95.40.1.s390x",
"product_id": "kernel-syms-4.12.14-95.40.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-95.40.1.s390x",
"product": {
"name": "kernel-vanilla-4.12.14-95.40.1.s390x",
"product_id": "kernel-vanilla-4.12.14-95.40.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-95.40.1.s390x",
"product": {
"name": "kernel-vanilla-base-4.12.14-95.40.1.s390x",
"product_id": "kernel-vanilla-base-4.12.14-95.40.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-95.40.1.s390x",
"product": {
"name": "kernel-vanilla-devel-4.12.14-95.40.1.s390x",
"product_id": "kernel-vanilla-devel-4.12.14-95.40.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-kgraft-devel-4.12.14-95.40.1.s390x",
"product": {
"name": "kernel-vanilla-kgraft-devel-4.12.14-95.40.1.s390x",
"product_id": "kernel-vanilla-kgraft-devel-4.12.14-95.40.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-4.12.14-95.40.1.s390x",
"product": {
"name": "kernel-zfcpdump-4.12.14-95.40.1.s390x",
"product_id": "kernel-zfcpdump-4.12.14-95.40.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-man-4.12.14-95.40.1.s390x",
"product": {
"name": "kernel-zfcpdump-man-4.12.14-95.40.1.s390x",
"product_id": "kernel-zfcpdump-man-4.12.14-95.40.1.s390x"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-95.40.1.s390x",
"product": {
"name": "kselftests-kmp-default-4.12.14-95.40.1.s390x",
"product_id": "kselftests-kmp-default-4.12.14-95.40.1.s390x"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-95.40.1.s390x",
"product": {
"name": "ocfs2-kmp-default-4.12.14-95.40.1.s390x",
"product_id": "ocfs2-kmp-default-4.12.14-95.40.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-95.40.1.x86_64",
"product": {
"name": "cluster-md-kmp-default-4.12.14-95.40.1.x86_64",
"product_id": "cluster-md-kmp-default-4.12.14-95.40.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-95.40.1.x86_64",
"product": {
"name": "dlm-kmp-default-4.12.14-95.40.1.x86_64",
"product_id": "dlm-kmp-default-4.12.14-95.40.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-95.40.1.x86_64",
"product": {
"name": "gfs2-kmp-default-4.12.14-95.40.1.x86_64",
"product_id": "gfs2-kmp-default-4.12.14-95.40.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-4.12.14-95.40.1.x86_64",
"product": {
"name": "kernel-debug-4.12.14-95.40.1.x86_64",
"product_id": "kernel-debug-4.12.14-95.40.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-4.12.14-95.40.1.x86_64",
"product": {
"name": "kernel-debug-base-4.12.14-95.40.1.x86_64",
"product_id": "kernel-debug-base-4.12.14-95.40.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-4.12.14-95.40.1.x86_64",
"product": {
"name": "kernel-debug-devel-4.12.14-95.40.1.x86_64",
"product_id": "kernel-debug-devel-4.12.14-95.40.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-kgraft-devel-4.12.14-95.40.1.x86_64",
"product": {
"name": "kernel-debug-kgraft-devel-4.12.14-95.40.1.x86_64",
"product_id": "kernel-debug-kgraft-devel-4.12.14-95.40.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-95.40.1.x86_64",
"product": {
"name": "kernel-default-4.12.14-95.40.1.x86_64",
"product_id": "kernel-default-4.12.14-95.40.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-95.40.1.x86_64",
"product": {
"name": "kernel-default-base-4.12.14-95.40.1.x86_64",
"product_id": "kernel-default-base-4.12.14-95.40.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-95.40.1.x86_64",
"product": {
"name": "kernel-default-devel-4.12.14-95.40.1.x86_64",
"product_id": "kernel-default-devel-4.12.14-95.40.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-95.40.1.x86_64",
"product": {
"name": "kernel-default-extra-4.12.14-95.40.1.x86_64",
"product_id": "kernel-default-extra-4.12.14-95.40.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.12.14-95.40.1.x86_64",
"product": {
"name": "kernel-default-kgraft-4.12.14-95.40.1.x86_64",
"product_id": "kernel-default-kgraft-4.12.14-95.40.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-devel-4.12.14-95.40.1.x86_64",
"product": {
"name": "kernel-default-kgraft-devel-4.12.14-95.40.1.x86_64",
"product_id": "kernel-default-kgraft-devel-4.12.14-95.40.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-4.12.14-95.40.1.x86_64",
"product": {
"name": "kernel-kvmsmall-4.12.14-95.40.1.x86_64",
"product_id": "kernel-kvmsmall-4.12.14-95.40.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-base-4.12.14-95.40.1.x86_64",
"product": {
"name": "kernel-kvmsmall-base-4.12.14-95.40.1.x86_64",
"product_id": "kernel-kvmsmall-base-4.12.14-95.40.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-4.12.14-95.40.1.x86_64",
"product": {
"name": "kernel-kvmsmall-devel-4.12.14-95.40.1.x86_64",
"product_id": "kernel-kvmsmall-devel-4.12.14-95.40.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-kgraft-devel-4.12.14-95.40.1.x86_64",
"product": {
"name": "kernel-kvmsmall-kgraft-devel-4.12.14-95.40.1.x86_64",
"product_id": "kernel-kvmsmall-kgraft-devel-4.12.14-95.40.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-95.40.2.x86_64",
"product": {
"name": "kernel-obs-build-4.12.14-95.40.2.x86_64",
"product_id": "kernel-obs-build-4.12.14-95.40.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-95.40.2.x86_64",
"product": {
"name": "kernel-obs-qa-4.12.14-95.40.2.x86_64",
"product_id": "kernel-obs-qa-4.12.14-95.40.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-95.40.1.x86_64",
"product": {
"name": "kernel-syms-4.12.14-95.40.1.x86_64",
"product_id": "kernel-syms-4.12.14-95.40.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-95.40.1.x86_64",
"product": {
"name": "kernel-vanilla-4.12.14-95.40.1.x86_64",
"product_id": "kernel-vanilla-4.12.14-95.40.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-95.40.1.x86_64",
"product": {
"name": "kernel-vanilla-base-4.12.14-95.40.1.x86_64",
"product_id": "kernel-vanilla-base-4.12.14-95.40.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-95.40.1.x86_64",
"product": {
"name": "kernel-vanilla-devel-4.12.14-95.40.1.x86_64",
"product_id": "kernel-vanilla-devel-4.12.14-95.40.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-kgraft-devel-4.12.14-95.40.1.x86_64",
"product": {
"name": "kernel-vanilla-kgraft-devel-4.12.14-95.40.1.x86_64",
"product_id": "kernel-vanilla-kgraft-devel-4.12.14-95.40.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_40-default-1-6.3.1.x86_64",
"product": {
"name": "kgraft-patch-4_12_14-95_40-default-1-6.3.1.x86_64",
"product_id": "kgraft-patch-4_12_14-95_40-default-1-6.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-95.40.1.x86_64",
"product": {
"name": "kselftests-kmp-default-4.12.14-95.40.1.x86_64",
"product_id": "kselftests-kmp-default-4.12.14-95.40.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-95.40.1.x86_64",
"product": {
"name": "ocfs2-kmp-default-4.12.14-95.40.1.x86_64",
"product_id": "ocfs2-kmp-default-4.12.14-95.40.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Desktop 12 SP4",
"product": {
"name": "SUSE Linux Enterprise Desktop 12 SP4",
"product_id": "SUSE Linux Enterprise Desktop 12 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sled:12:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Availability Extension 12 SP4",
"product": {
"name": "SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-ha:12:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP4",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Software Development Kit 12 SP4",
"product": {
"name": "SUSE Linux Enterprise Software Development Kit 12 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-sdk:12:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP4",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:12:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Workstation Extension 12 SP4",
"product": {
"name": "SUSE Linux Enterprise Workstation Extension 12 SP4",
"product_id": "SUSE Linux Enterprise Workstation Extension 12 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-we:12:sp4"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-95.40.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP4",
"product_id": "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.40.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-95.40.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-95.40.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP4",
"product_id": "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.40.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-95.40.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-4.12.14-95.40.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP4",
"product_id": "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.40.1.x86_64"
},
"product_reference": "kernel-default-extra-4.12.14-95.40.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-95.40.1.noarch as component of SUSE Linux Enterprise Desktop 12 SP4",
"product_id": "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.40.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-95.40.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-95.40.1.noarch as component of SUSE Linux Enterprise Desktop 12 SP4",
"product_id": "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.40.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-95.40.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-95.40.1.noarch as component of SUSE Linux Enterprise Desktop 12 SP4",
"product_id": "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.40.1.noarch"
},
"product_reference": "kernel-source-4.12.14-95.40.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-95.40.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP4",
"product_id": "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.40.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-95.40.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-95.40.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.40.1.ppc64le"
},
"product_reference": "cluster-md-kmp-default-4.12.14-95.40.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-95.40.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.40.1.s390x"
},
"product_reference": "cluster-md-kmp-default-4.12.14-95.40.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-95.40.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.40.1.x86_64"
},
"product_reference": "cluster-md-kmp-default-4.12.14-95.40.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-95.40.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.40.1.ppc64le"
},
"product_reference": "dlm-kmp-default-4.12.14-95.40.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-95.40.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.40.1.s390x"
},
"product_reference": "dlm-kmp-default-4.12.14-95.40.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-95.40.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.40.1.x86_64"
},
"product_reference": "dlm-kmp-default-4.12.14-95.40.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-95.40.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.40.1.ppc64le"
},
"product_reference": "gfs2-kmp-default-4.12.14-95.40.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-95.40.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.40.1.s390x"
},
"product_reference": "gfs2-kmp-default-4.12.14-95.40.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-95.40.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.40.1.x86_64"
},
"product_reference": "gfs2-kmp-default-4.12.14-95.40.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-95.40.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.40.1.ppc64le"
},
"product_reference": "ocfs2-kmp-default-4.12.14-95.40.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-95.40.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.40.1.s390x"
},
"product_reference": "ocfs2-kmp-default-4.12.14-95.40.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-95.40.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.40.1.x86_64"
},
"product_reference": "ocfs2-kmp-default-4.12.14-95.40.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-4.12.14-95.40.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.40.1.ppc64le"
},
"product_reference": "kernel-default-kgraft-4.12.14-95.40.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-4.12.14-95.40.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.40.1.x86_64"
},
"product_reference": "kernel-default-kgraft-4.12.14-95.40.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-devel-4.12.14-95.40.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.40.1.ppc64le"
},
"product_reference": "kernel-default-kgraft-devel-4.12.14-95.40.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-devel-4.12.14-95.40.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.40.1.x86_64"
},
"product_reference": "kernel-default-kgraft-devel-4.12.14-95.40.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_40-default-1-6.3.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_40-default-1-6.3.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_40-default-1-6.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_40-default-1-6.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_40-default-1-6.3.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_40-default-1-6.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.12.14-95.40.1.noarch as component of SUSE Linux Enterprise Software Development Kit 12 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.40.1.noarch"
},
"product_reference": "kernel-docs-4.12.14-95.40.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-95.40.2.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.40.2.aarch64"
},
"product_reference": "kernel-obs-build-4.12.14-95.40.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-95.40.2.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.40.2.ppc64le"
},
"product_reference": "kernel-obs-build-4.12.14-95.40.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-95.40.2.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.40.2.s390x"
},
"product_reference": "kernel-obs-build-4.12.14-95.40.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-95.40.2.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.40.2.x86_64"
},
"product_reference": "kernel-obs-build-4.12.14-95.40.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-95.40.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.40.1.aarch64"
},
"product_reference": "kernel-default-4.12.14-95.40.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-95.40.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.40.1.ppc64le"
},
"product_reference": "kernel-default-4.12.14-95.40.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-95.40.1.s390x as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.40.1.s390x"
},
"product_reference": "kernel-default-4.12.14-95.40.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-95.40.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.40.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-95.40.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-95.40.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.40.1.aarch64"
},
"product_reference": "kernel-default-base-4.12.14-95.40.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-95.40.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.40.1.ppc64le"
},
"product_reference": "kernel-default-base-4.12.14-95.40.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-95.40.1.s390x as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.40.1.s390x"
},
"product_reference": "kernel-default-base-4.12.14-95.40.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-95.40.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.40.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-95.40.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-95.40.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.40.1.aarch64"
},
"product_reference": "kernel-default-devel-4.12.14-95.40.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-95.40.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.40.1.ppc64le"
},
"product_reference": "kernel-default-devel-4.12.14-95.40.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-95.40.1.s390x as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.40.1.s390x"
},
"product_reference": "kernel-default-devel-4.12.14-95.40.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-95.40.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.40.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-95.40.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-4.12.14-95.40.1.s390x as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.40.1.s390x"
},
"product_reference": "kernel-default-man-4.12.14-95.40.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-95.40.1.noarch as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.40.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-95.40.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-95.40.1.noarch as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.40.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-95.40.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-95.40.1.noarch as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.40.1.noarch"
},
"product_reference": "kernel-source-4.12.14-95.40.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-95.40.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.40.1.aarch64"
},
"product_reference": "kernel-syms-4.12.14-95.40.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-95.40.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.40.1.ppc64le"
},
"product_reference": "kernel-syms-4.12.14-95.40.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-95.40.1.s390x as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.40.1.s390x"
},
"product_reference": "kernel-syms-4.12.14-95.40.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-95.40.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.40.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-95.40.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-95.40.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.40.1.aarch64"
},
"product_reference": "kernel-default-4.12.14-95.40.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-95.40.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.40.1.ppc64le"
},
"product_reference": "kernel-default-4.12.14-95.40.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-95.40.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.40.1.s390x"
},
"product_reference": "kernel-default-4.12.14-95.40.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-95.40.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.40.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-95.40.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-95.40.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.40.1.aarch64"
},
"product_reference": "kernel-default-base-4.12.14-95.40.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-95.40.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.40.1.ppc64le"
},
"product_reference": "kernel-default-base-4.12.14-95.40.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-95.40.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.40.1.s390x"
},
"product_reference": "kernel-default-base-4.12.14-95.40.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-95.40.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.40.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-95.40.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-95.40.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.40.1.aarch64"
},
"product_reference": "kernel-default-devel-4.12.14-95.40.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-95.40.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.40.1.ppc64le"
},
"product_reference": "kernel-default-devel-4.12.14-95.40.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-95.40.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.40.1.s390x"
},
"product_reference": "kernel-default-devel-4.12.14-95.40.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-95.40.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.40.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-95.40.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-4.12.14-95.40.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.40.1.s390x"
},
"product_reference": "kernel-default-man-4.12.14-95.40.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-95.40.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.40.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-95.40.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-95.40.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.40.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-95.40.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-95.40.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.40.1.noarch"
},
"product_reference": "kernel-source-4.12.14-95.40.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-95.40.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.40.1.aarch64"
},
"product_reference": "kernel-syms-4.12.14-95.40.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-95.40.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.40.1.ppc64le"
},
"product_reference": "kernel-syms-4.12.14-95.40.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-95.40.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.40.1.s390x"
},
"product_reference": "kernel-syms-4.12.14-95.40.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-95.40.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.40.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-95.40.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-4.12.14-95.40.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 12 SP4",
"product_id": "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.40.1.x86_64"
},
"product_reference": "kernel-default-extra-4.12.14-95.40.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 12 SP4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-12207",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-12207"
}
],
"notes": [
{
"category": "general",
"text": "Improper invalidation for page table updates by a virtual guest operating system for multiple Intel(R) Processors may allow an authenticated user to potentially enable denial of service of the host system via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_40-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_40-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.40.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.40.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.40.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.40.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.40.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.40.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.40.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.40.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.40.2.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.40.2.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.40.2.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.40.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.40.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-12207",
"url": "https://www.suse.com/security/cve/CVE-2018-12207"
},
{
"category": "external",
"summary": "SUSE Bug 1117665 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1117665"
},
{
"category": "external",
"summary": "SUSE Bug 1139073 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1139073"
},
{
"category": "external",
"summary": "SUSE Bug 1152505 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1152505"
},
{
"category": "external",
"summary": "SUSE Bug 1155812 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1155812"
},
{
"category": "external",
"summary": "SUSE Bug 1155817 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1155817"
},
{
"category": "external",
"summary": "SUSE Bug 1155945 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1155945"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1201877"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_40-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_40-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.40.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.40.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.40.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.40.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.40.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.40.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.40.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.40.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.40.2.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.40.2.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.40.2.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.40.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.40.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_40-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_40-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.40.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.40.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.40.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.40.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.40.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.40.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.40.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.40.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.40.2.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.40.2.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.40.2.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.40.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.40.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:08:20Z",
"details": "moderate"
}
],
"title": "CVE-2018-12207"
},
{
"cve": "CVE-2019-0154",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-0154"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient access control in subsystem for Intel (R) processor graphics in 6th, 7th, 8th and 9th Generation Intel(R) Core(TM) Processor Families; Intel(R) Pentium(R) Processor J, N, Silver and Gold Series; Intel(R) Celeron(R) Processor J, N, G3900 and G4900 Series; Intel(R) Atom(R) Processor A and E3900 Series; Intel(R) Xeon(R) Processor E3-1500 v5 and v6 and E-2100 Processor Families may allow an authenticated user to potentially enable denial of service via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_40-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_40-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.40.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.40.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.40.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.40.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.40.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.40.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.40.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.40.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.40.2.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.40.2.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.40.2.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.40.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.40.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-0154",
"url": "https://www.suse.com/security/cve/CVE-2019-0154"
},
{
"category": "external",
"summary": "SUSE Bug 1135966 for CVE-2019-0154",
"url": "https://bugzilla.suse.com/1135966"
},
{
"category": "external",
"summary": "SUSE Bug 1181720 for CVE-2019-0154",
"url": "https://bugzilla.suse.com/1181720"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_40-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_40-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.40.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.40.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.40.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.40.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.40.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.40.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.40.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.40.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.40.2.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.40.2.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.40.2.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.40.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.40.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_40-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_40-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.40.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.40.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.40.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.40.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.40.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.40.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.40.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.40.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.40.2.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.40.2.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.40.2.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.40.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.40.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:08:20Z",
"details": "important"
}
],
"title": "CVE-2019-0154"
},
{
"cve": "CVE-2019-0155",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-0155"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient access control in a subsystem for Intel (R) processor graphics in 6th, 7th, 8th and 9th Generation Intel(R) Core(TM) Processor Families; Intel(R) Pentium(R) Processor J, N, Silver and Gold Series; Intel(R) Celeron(R) Processor J, N, G3900 and G4900 Series; Intel(R) Atom(R) Processor A and E3900 Series; Intel(R) Xeon(R) Processor E3-1500 v5 and v6, E-2100 and E-2200 Processor Families; Intel(R) Graphics Driver for Windows before 26.20.100.6813 (DCH) or 26.20.100.6812 and before 21.20.x.5077 (aka15.45.5077), i915 Linux Driver for Intel(R) Processor Graphics before versions 5.4-rc7, 5.3.11, 4.19.84, 4.14.154, 4.9.201, 4.4.201 may allow an authenticated user to potentially enable escalation of privilege via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_40-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_40-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.40.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.40.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.40.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.40.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.40.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.40.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.40.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.40.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.40.2.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.40.2.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.40.2.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.40.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.40.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-0155",
"url": "https://www.suse.com/security/cve/CVE-2019-0155"
},
{
"category": "external",
"summary": "SUSE Bug 1135966 for CVE-2019-0155",
"url": "https://bugzilla.suse.com/1135966"
},
{
"category": "external",
"summary": "SUSE Bug 1135967 for CVE-2019-0155",
"url": "https://bugzilla.suse.com/1135967"
},
{
"category": "external",
"summary": "SUSE Bug 1173663 for CVE-2019-0155",
"url": "https://bugzilla.suse.com/1173663"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_40-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_40-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.40.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.40.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.40.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.40.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.40.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.40.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.40.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.40.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.40.2.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.40.2.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.40.2.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.40.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.40.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_40-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_40-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.40.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.40.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.40.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.40.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.40.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.40.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.40.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.40.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.40.2.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.40.2.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.40.2.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.40.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.40.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:08:20Z",
"details": "important"
}
],
"title": "CVE-2019-0155"
},
{
"cve": "CVE-2019-10220",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-10220"
}
],
"notes": [
{
"category": "general",
"text": "Linux kernel CIFS implementation, version 4.9.0 is vulnerable to a relative paths injection in directory entry lists.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_40-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_40-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.40.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.40.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.40.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.40.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.40.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.40.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.40.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.40.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.40.2.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.40.2.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.40.2.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.40.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.40.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-10220",
"url": "https://www.suse.com/security/cve/CVE-2019-10220"
},
{
"category": "external",
"summary": "SUSE Bug 1144903 for CVE-2019-10220",
"url": "https://bugzilla.suse.com/1144903"
},
{
"category": "external",
"summary": "SUSE Bug 1153108 for CVE-2019-10220",
"url": "https://bugzilla.suse.com/1153108"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_40-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_40-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.40.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.40.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.40.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.40.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.40.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.40.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.40.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.40.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.40.2.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.40.2.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.40.2.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.40.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.40.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_40-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_40-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.40.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.40.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.40.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.40.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.40.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.40.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.40.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.40.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.40.2.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.40.2.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.40.2.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.40.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.40.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:08:20Z",
"details": "important"
}
],
"title": "CVE-2019-10220"
},
{
"cve": "CVE-2019-11135",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11135"
}
],
"notes": [
{
"category": "general",
"text": "TSX Asynchronous Abort condition on some CPUs utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_40-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_40-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.40.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.40.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.40.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.40.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.40.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.40.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.40.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.40.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.40.2.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.40.2.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.40.2.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.40.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.40.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11135",
"url": "https://www.suse.com/security/cve/CVE-2019-11135"
},
{
"category": "external",
"summary": "SUSE Bug 1139073 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1139073"
},
{
"category": "external",
"summary": "SUSE Bug 1152497 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1152497"
},
{
"category": "external",
"summary": "SUSE Bug 1152505 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1152505"
},
{
"category": "external",
"summary": "SUSE Bug 1152506 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1152506"
},
{
"category": "external",
"summary": "SUSE Bug 1160120 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1160120"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1201877"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_40-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_40-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.40.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.40.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.40.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.40.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.40.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.40.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.40.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.40.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.40.2.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.40.2.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.40.2.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.40.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.40.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_40-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_40-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.40.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.40.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.40.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.40.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.40.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.40.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.40.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.40.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.40.2.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.40.2.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.40.2.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.40.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.40.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:08:20Z",
"details": "moderate"
}
],
"title": "CVE-2019-11135"
},
{
"cve": "CVE-2019-16233",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-16233"
}
],
"notes": [
{
"category": "general",
"text": "drivers/scsi/qla2xxx/qla_os.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_40-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_40-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.40.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.40.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.40.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.40.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.40.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.40.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.40.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.40.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.40.2.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.40.2.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.40.2.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.40.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.40.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-16233",
"url": "https://www.suse.com/security/cve/CVE-2019-16233"
},
{
"category": "external",
"summary": "SUSE Bug 1150457 for CVE-2019-16233",
"url": "https://bugzilla.suse.com/1150457"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_40-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_40-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.40.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.40.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.40.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.40.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.40.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.40.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.40.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.40.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.40.2.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.40.2.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.40.2.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.40.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.40.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_40-default-1-6.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_40-default-1-6.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.40.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.40.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.40.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.40.1.aarch64",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.40.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.40.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.40.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.40.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.40.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.40.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.40.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.40.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.40.2.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.40.2.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.40.2.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.40.2.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.40.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:08:20Z",
"details": "low"
}
],
"title": "CVE-2019-16233"
}
]
}
suse-su-2019:2953-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\n\nThe SUSE Linux Enterprise 15-SP1 Azure Kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2018-12207: Untrusted virtual machines on Intel CPUs could exploit a race\n condition in the Instruction Fetch Unit of the Intel CPU to cause a Machine\n Exception during Page Size Change, causing the CPU core to be non-functional.\n\n The Linux Kernel kvm hypervisor was adjusted to avoid page size changes in\n executable pages by splitting / merging huge pages into small pages as\n More information can be found on https://www.suse.com/support/kb/doc/?id=7023735\n (bnc#1117665 1152505 1155812 1155817 1155945)\n\n- CVE-2019-11135: Aborting an asynchronous TSX operation on Intel CPUs with\n Transactional Memory support could be used to facilitate sidechannel\n information leaks out of microarchitectural buffers, similar to the\n previously described \u0027Microarchitectural Data Sampling\u0027 attack.\n\n The Linux kernel was supplemented with the option to disable TSX operation\n altogether (requiring CPU Microcode updates on older systems) and better\n flushing of microarchitectural buffers (VERW).\n\n The set of options available is described in our TID at https://www.suse.com/support/kb/doc/?id=7024251\n (bnc#1139073 1152497 1152505 1152506).\n\n- CVE-2019-18805: There was a signed integer overflow in tcp_ack_update_rtt()\n when userspace writes a very large integer to /proc/sys/net/ipv4/tcp_min_rtt_wlen,\n leading to a denial of service or possibly unspecified other impact,\n aka CID-19fad20d15a6 (bnc#1156187).\n\n- CVE-2019-17055: The AF_NFC network module did not enforce CAP_NET_RAW, which\n meant that unprivileged users could create a raw socket (bnc#1152782).\n\n- CVE-2019-16995: Fix a memory leak in hsr_dev_finalize() if hsr_add_port\n failed to add a port, which may have caused denial of service (bsc#1152685).\n\n- CVE-2019-16233: drivers/scsi/qla2xxx/qla_os.c did not check the\n alloc_workqueue return value, leading to a NULL pointer dereference.\n (bsc#1150457).\n\n- CVE-2019-10220: Added sanity checks on the pathnames passed to the user\n space. (bsc#1144903).\n\n- CVE-2019-17666: rtlwifi: Fix potential overflow in P2P code (bsc#1154372).\n\n- CVE-2019-16232: Fix a potential NULL pointer dereference in the Marwell\n libertas driver (bsc#1150465).\n\n- CVE-2019-16234: iwlwifi pcie driver did not check the alloc_workqueue return\n value, leading to a NULL pointer dereference. (bsc#1150452).\n\n- CVE-2019-17133: cfg80211 wireless extension did not reject a long SSID IE,\n leading to a Buffer Overflow (bsc#1153158).\n\n- CVE-2019-17056: The AF_NFC network module did not enforce CAP_NET_RAW, which\n meant that unprivileged users could create a raw socket (bsc#1152788).\n\nThe following non-security bugs were fixed:\n\n- /dev/mem: Bail out upon SIGKILL (git-fixes).\n- 9p: avoid attaching writeback_fid on mmap with type PRIVATE (bsc#1051510).\n- ACPI / CPPC: do not require the _PSD method (bsc#1051510).\n- ACPI / processor: do not print errors for processorIDs == 0xff (bsc#1051510).\n- ACPI: CPPC: Set pcc_data[pcc_ss_id] to NULL in acpi_cppc_processor_exit() (bsc#1051510).\n- act_mirred: Fix mirred_init_module error handling (bsc#1051510).\n- Add kernel module compression support (bsc#1135854) For enabling the kernel module compress, add the item COMPRESS_MODULES=\u0027xz\u0027 in config.sh, then mkspec will pass it to the spec file.\n- alarmtimer: Use EOPNOTSUPP instead of ENOTSUPP (bsc#1151680).\n- ALSA: bebob: Fix prototype of helper function to return negative value (bsc#1051510).\n- ALSA: hda - Add laptop imic fixup for ASUS M9V laptop (bsc#1051510).\n- ALSA: hda - Apply AMD controller workaround for Raven platform (bsc#1051510).\n- ALSA: hda - Define a fallback_pin_fixup_tbl for alc269 family (bsc#1051510).\n- ALSA: hda - Drop unsol event handler for Intel HDMI codecs (bsc#1051510).\n- ALSA: hda - Expand pin_match function to match upcoming new tbls (bsc#1051510).\n- ALSA: hda - Inform too slow responses (bsc#1051510).\n- ALSA: hda - Show the fatal CORB/RIRB error more clearly (bsc#1051510).\n- ALSA: hda/ca0132 - Fix possible workqueue stall (bsc#1155836).\n- ALSA: hda/hdmi: remove redundant assignment to variable pcm_idx (bsc#1051510).\n- ALSA: hda/realtek - Add support for ALC623 (bsc#1051510).\n- ALSA: hda/realtek - Add support for ALC711 (bsc#1051510).\n- ALSA: hda/realtek - Blacklist PC beep for Lenovo ThinkCentre M73/93 (bsc#1051510).\n- ALSA: hda/realtek - Check beep whitelist before assigning in all codecs (bsc#1051510).\n- ALSA: hda/realtek - Fix 2 front mics of codec 0x623 (bsc#1051510).\n- ALSA: hda/realtek - Fix alienware headset mic (bsc#1051510).\n- ALSA: hda/realtek: Reduce the Headphone static noise on XPS 9350/9360 (bsc#1051510).\n- ALSA: hda/sigmatel - remove unused variable \u0027stac9200_core_init\u0027 (bsc#1051510).\n- ALSA: hda: Add Elkhart Lake PCI ID (bsc#1051510).\n- ALSA: hda: Add support of Zhaoxin controller (bsc#1051510).\n- ALSA: hda: Add Tigerlake/Jasperlake PCI ID (bsc#1051510).\n- ALSA: hda: Flush interrupts on disabling (bsc#1051510).\n- ALSA: hda: Set fifo_size for both playback and capture streams (bsc#1051510).\n- ALSA: i2c: ak4xxx-adda: Fix a possible null pointer dereference in build_adc_controls() (bsc#1051510).\n- ALSA: line6: sizeof (byte) is always 1, use that fact (bsc#1051510).\n- ALSA: timer: Fix mutex deadlock at releasing card (bsc#1051510).\n- ALSA: usb-audio: Add Pioneer DDJ-SX3 PCM quirck (bsc#1051510).\n- ALSA: usb-audio: Disable quirks for BOSS Katana amplifiers (bsc#1051510).\n- ALSA: usb-audio: Skip bSynchAddress endpoint check if it is invalid (bsc#1051510).\n- appletalk: enforce CAP_NET_RAW for raw sockets (bsc#1051510).\n- arcnet: provide a buffer big enough to actually receive packets (networking-stable-19_09_30).\n- ASoC: Define a set of DAPM pre/post-up events (bsc#1051510).\n- ASoC: dmaengine: Make the pcm-\u003ename equal to pcm-\u003eid if the name is not set (bsc#1051510).\n- ASoC: Intel: Fix use of potentially uninitialized variable (bsc#1051510).\n- ASoC: Intel: NHLT: Fix debug print format (bsc#1051510).\n- ASoc: rockchip: i2s: Fix RPM imbalance (bsc#1051510).\n- ASoC: rsnd: Reinitialize bit clock inversion flag for every format setting (bsc#1051510).\n- ASoC: sgtl5000: Fix charge pump source assignment (bsc#1051510).\n- auxdisplay: panel: need to delete scan_timer when misc_register fails in panel_attach (bsc#1051510).\n- ax25: enforce CAP_NET_RAW for raw sockets (bsc#1051510).\n- Blacklist \u0027signal: Correct namespace fixups of si_pid and si_uid\u0027 (bsc#1142667)\n- blk-wbt: abstract out end IO completion handler (bsc#1135873).\n- blk-wbt: fix has-sleeper queueing check (bsc#1135873).\n- blk-wbt: improve waking of tasks (bsc#1135873).\n- blk-wbt: move disable check into get_limit() (bsc#1135873).\n- blk-wbt: use wq_has_sleeper() for wq active check (bsc#1135873).\n- block: add io timeout to sysfs (bsc#1148410).\n- block: do not show io_timeout if driver has no timeout handler (bsc#1148410).\n- Bluetooth: btrtl: Additional Realtek 8822CE Bluetooth devices (bsc#1051510).\n- bnx2x: Fix VF\u0027s VLAN reconfiguration in reload (bsc#1086323 ).\n- bpf: fix use after free in prog symbol exposure (bsc#1083647).\n- bridge/mdb: remove wrong use of NLM_F_MULTI (networking-stable-19_09_15).\n- Btrfs: bail out gracefully rather than BUG_ON (bsc#1153646).\n- btrfs: block-group: Fix a memory leak due to missing btrfs_put_block_group() (bsc#1155178).\n- Btrfs: check for the full sync flag while holding the inode lock during fsync (bsc#1153713).\n- btrfs: Ensure btrfs_init_dev_replace_tgtdev sees up to date values (bsc#1154651).\n- btrfs: Ensure replaced device does not have pending chunk allocation (bsc#1154607).\n- btrfs: qgroup: Always free PREALLOC META reserve in btrfs_delalloc_release_extents() (bsc#1155179).\n- btrfs: remove wrong use of volume_mutex from btrfs_dev_replace_start (bsc#1154651).\n- btrfs: tracepoints: Fix bad entry members of qgroup events (bsc#1155186).\n- btrfs: tracepoints: Fix wrong parameter order for qgroup events (bsc#1155184).\n- can: dev: call netif_carrier_off() in register_candev() (bsc#1051510).\n- can: mcp251x: mcp251x_hw_reset(): allow more time after a reset (bsc#1051510).\n- can: xilinx_can: xcan_probe(): skip error message on deferred probe (bsc#1051510).\n- cdc_ether: fix rndis support for Mediatek based smartphones (networking-stable-19_09_15).\n- cdc_ncm: fix divide-by-zero caused by invalid wMaxPacketSize (bsc#1051510).\n- ceph: fix directories inode i_blkbits initialization (bsc#1153717).\n- ceph: reconnect connection if session hang in opening state (bsc#1153718).\n- ceph: update the mtime when truncating up (bsc#1153719).\n- cfg80211: add and use strongly typed element iteration macros (bsc#1051510).\n- cfg80211: Purge frame registrations on iftype change (bsc#1051510).\n- clk: at91: select parent if main oscillator or bypass is enabled (bsc#1051510).\n- clk: qoriq: Fix -Wunused-const-variable (bsc#1051510).\n- clk: sirf: Do not reference clk_init_data after registration (bsc#1051510).\n- clk: zx296718: Do not reference clk_init_data after registration (bsc#1051510).\n- crypto: af_alg - consolidation of duplicate code (bsc#1154737).\n- crypto: af_alg - fix race accessing cipher request (bsc#1154737).\n- crypto: af_alg - Fix race around ctx-\u003ercvused by making it atomic_t (bsc#1154737).\n- crypto: af_alg - Initialize sg_num_bytes in error code path (bsc#1051510).\n- crypto: af_alg - remove locking in async callback (bsc#1154737).\n- crypto: af_alg - update correct dst SGL entry (bsc#1051510).\n- crypto: af_alg - wait for data at beginning of recvmsg (bsc#1154737).\n- crypto: algif - return error code when no data was processed (bsc#1154737).\n- crypto: algif_aead - copy AAD from src to dst (bsc#1154737).\n- crypto: algif_aead - fix reference counting of null skcipher (bsc#1154737).\n- crypto: algif_aead - overhaul memory management (bsc#1154737).\n- crypto: algif_aead - skip SGL entries with NULL page (bsc#1154737).\n- crypto: algif_skcipher - overhaul memory management (bsc#1154737).\n- crypto: talitos - fix missing break in switch statement (bsc#1142635).\n- cxgb4: fix endianness for vlan value in cxgb4_tc_flower (bsc#1064802 bsc#1066129).\n- cxgb4: offload VLAN flows regardless of VLAN ethtype (bsc#1064802 bsc#1066129).\n- cxgb4: reduce kernel stack usage in cudbg_collect_mem_region() (bsc#1073513).\n- cxgb4: Signedness bug in init_one() (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).\n- cxgb4: smt: Add lock for atomic_dec_and_test (bsc#1064802 bsc#1066129).\n- cxgb4:Fix out-of-bounds MSI-X info array access (networking-stable-19_10_05).\n- dmaengine: bcm2835: Print error in case setting DMA mask fails (bsc#1051510).\n- dmaengine: imx-sdma: fix size check for sdma script_number (bsc#1051510).\n- drm/amd/powerplay/smu7: enforce minimal VBITimeout (v2) (bsc#1051510).\n- drm/amdgpu/si: fix ASIC tests (git-fixes).\n- drm/amdgpu: Check for valid number of registers to read (bsc#1051510).\n- drm/ast: Fixed reboot test may cause system hanged (bsc#1051510).\n- drm/bridge: tc358767: Increase AUX transfer length limit (bsc#1051510).\n- drm/edid: Add 6 bpc quirk for SDC panel in Lenovo G50 (bsc#1051510).\n- drm/i915/cmdparser: Add support for backward jumps (bsc#1135967)\n- drm/i915/cmdparser: Ignore Length operands during command matching (bsc#1135967)\n- drm/i915/cmdparser: Use explicit goto for error paths (bsc#1135967)\n- drm/i915/gen8+: Add RC6 CTX corruption WA (bsc#1135967)\n- drm/i915/gtt: Add read only pages to gen8_pte_encode (bsc#1135967)\n- drm/i915/gtt: Disable read-only support under GVT (bsc#1135967)\n- drm/i915/gtt: Read-only pages for insert_entries on bdw (bsc#1135967)\n- drm/i915: Add gen9 BCS cmdparsing (bsc#1135967)\n- drm/i915: Add support for mandatory cmdparsing (bsc#1135967)\n- drm/i915: Allow parsing of unsized batches (bsc#1135967)\n- drm/i915: Disable Secure Batches for gen6+\n- drm/i915: Lower RM timeout to avoid DSI hard hangs (bsc#1135967)\n- drm/i915: Prevent writing into a read-only object via a GGTT mmap (bsc#1135967)\n- drm/i915: Remove Master tables from cmdparser\n- drm/i915: Rename gen7 cmdparser tables (bsc#1135967)\n- drm/i915: Support ro ppgtt mapped cmdparser shadow buffers (bsc#1135967)\n- drm/msm/dsi: Implement reset correctly (bsc#1051510).\n- drm/panel: simple: fix AUO g185han01 horizontal blanking (bsc#1051510).\n- drm/radeon: Fix EEH during kexec (bsc#1051510).\n- drm/tilcdc: Register cpufreq notifier after we have initialized crtc (bsc#1051510).\n- drm/vmwgfx: Fix double free in vmw_recv_msg() (bsc#1051510).\n- drm: Flush output polling on shutdown (bsc#1051510).\n- e1000e: add workaround for possible stalled packet (bsc#1051510).\n- efi/memattr: Do not bail on zero VA if it equals the region\u0027s PA (bsc#1051510).\n- efi: cper: print AER info of PCIe fatal error (bsc#1051510).\n- efivar/ssdt: Do not iterate over EFI vars if no SSDT override was specified (bsc#1051510).\n- firmware: dmi: Fix unlikely out-of-bounds read in save_mem_devices (git-fixes).\n- gpu: drm: radeon: Fix a possible null-pointer dereference in radeon_connector_set_property() (bsc#1051510).\n- HID: apple: Fix stuck function keys when using FN (bsc#1051510).\n- HID: fix error message in hid_open_report() (bsc#1051510).\n- HID: hidraw: Fix invalid read in hidraw_ioctl (bsc#1051510).\n- HID: logitech-hidpp: do all FF cleanup in hidpp_ff_destroy() (bsc#1051510).\n- HID: logitech: Fix general protection fault caused by Logitech driver (bsc#1051510).\n- HID: prodikeys: Fix general protection fault during probe (bsc#1051510).\n- HID: sony: Fix memory corruption issue on cleanup (bsc#1051510).\n- hso: fix NULL-deref on tty open (bsc#1051510).\n- hwmon: (acpi_power_meter) Change log level for \u0027unsafe software power cap\u0027 (bsc#1051510).\n- hwrng: core - do not wait on add_early_randomness() (git-fixes).\n- hyperv: set nvme msi interrupts to unmanaged (jsc#SLE-8953, jsc#SLE-9221, jsc#SLE-4941, bsc#1119461, bsc#1119465, bsc#1138190, bsc#1154905).\n- i2c: riic: Clear NACK in tend isr (bsc#1051510).\n- IB/core, ipoib: Do not overreact to SM LID change event (bsc#1154108)\n- IB/core: Add mitigation for Spectre V1 (bsc#1155671)\n- IB/hfi1: Remove overly conservative VM_EXEC flag check (bsc#1144449).\n- IB/mlx5: Consolidate use_umr checks into single function (bsc#1093205).\n- IB/mlx5: Fix MR re-registration flow to use UMR properly (bsc#1093205).\n- IB/mlx5: Report correctly tag matching rendezvous capability (bsc#1046305).\n- ieee802154: atusb: fix use-after-free at disconnect (bsc#1051510).\n- ieee802154: ca8210: prevent memory leak (bsc#1051510).\n- ieee802154: enforce CAP_NET_RAW for raw sockets (bsc#1051510).\n- iio: adc: ad799x: fix probe error handling (bsc#1051510).\n- iio: light: opt3001: fix mutex unlock race (bsc#1051510).\n- ima: always return negative code for error (bsc#1051510).\n- Input: da9063 - fix capability and drop KEY_SLEEP (bsc#1051510).\n- Input: synaptics-rmi4 - avoid processing unknown IRQs (bsc#1051510).\n- integrity: prevent deadlock during digsig verification (bsc#1090631).\n- iommu/amd: Apply the same IVRS IOAPIC workaround to Acer Aspire A315-41 (bsc#1137799).\n- iommu/amd: Check PM_LEVEL_SIZE() condition in locked section (bsc#1154608).\n- iommu/amd: Override wrong IVRS IOAPIC on Raven Ridge systems (bsc#1137799).\n- iommu/amd: Remove domain-\u003eupdated (bsc#1154610).\n- iommu/amd: Wait for completion of IOTLB flush in attach_device (bsc#1154611).\n- ipmi_si: Only schedule continuously in the thread in maintenance mode (bsc#1051510).\n- ipv6: drop incoming packets having a v4mapped source address (networking-stable-19_10_05).\n- ipv6: Fix the link time qualifier of \u0027ping_v6_proc_exit_net()\u0027 (networking-stable-19_09_15).\n- ipv6: Handle missing host route in __ipv6_ifa_notify (networking-stable-19_10_05).\n- iwlwifi: do not panic in error path on non-msix systems (bsc#1155692).\n- ixgbe: Prevent u8 wrapping of ITR value to something less than 10us (bsc#1101674).\n- ixgbe: sync the first fragment unconditionally (bsc#1133140).\n- kABI workaround for crypto/af_alg changes (bsc#1154737).\n- kABI workaround for drm_vma_offset_node readonly field addition (bsc#1135967)\n- kABI workaround for snd_hda_pick_pin_fixup() changes (bsc#1051510).\n- kabi/severities: Whitelist functions internal to radix mm. To call these functions you have to first detect if you are running in radix mm mode which can\u0027t be expected of OOT code.\n- kabi: net: sched: act_sample: fix psample group handling on overwrite (networking-stable-19_09_05).\n- kernel-binary.spec.in: Fix build of non-modular kernels (boo#1154578).\n- kernel-binary.spec.in: Obsolete kgraft packages only when not building them.\n- kernel-binary: check also bzImage on s390/s390x Starting with 4.19-rc1, uncompressed image is no longer built on s390x. If file \u0027image\u0027 is not found in arch/s390/boot after the build, try bzImage instead. For now, install bzImage under the name image-* until we know grub2 and our grub2 scripts can handle correct name.\n- kernel-subpackage-build: create zero size ghost for uncompressed vmlinux (bsc#1154354). It is not strictly necessary to uncompress it so maybe the ghost file can be 0 size in this case.\n- kernel/sysctl.c: do not override max_threads provided by userspace (bnc#1150875).\n- ksm: cleanup stable_node chain collapse case (bnc#1144338).\n- ksm: fix use after free with merge_across_nodes = 0 (bnc#1144338).\n- ksm: introduce ksm_max_page_sharing per page deduplication limit (bnc#1144338).\n- ksm: optimize refile of stable_node_dup at the head of the chain (bnc#1144338).\n- ksm: swap the two output parameters of chain/chain_prune (bnc#1144338).\n- kvm: Convert kvm_lock to a mutex (bsc#1117665).\n- KVM: MMU: drop vcpu param in gpte_access (bsc#1117665).\n- KVM: PPC: Book3S HV: use smp_mb() when setting/clearing host_ipi flag (bsc#1061840).\n- KVM: vmx, svm: always run with EFER.NXE=1 when shadow paging is active (bsc#1117665).\n- kvm: x86, powerpc: do not allow clearing largepages debugfs entry (bsc#1117665).\n- KVM: x86: add tracepoints around __direct_map and FNAME(fetch) (bsc#1117665).\n- KVM: x86: adjust kvm_mmu_page member to save 8 bytes (bsc#1117665).\n- KVM: x86: change kvm_mmu_page_get_gfn BUG_ON to WARN_ON (bsc#1117665).\n- kvm: x86: Do not release the page inside mmu_set_spte() (bsc#1117665).\n- KVM: x86: make FNAME(fetch) and __direct_map more similar (bsc#1117665).\n- KVM: x86: remove now unneeded hugepage gfn adjustment (bsc#1117665).\n- lib/mpi: Fix karactx leak in mpi_powm (bsc#1051510).\n- libertas: Add missing sentinel at end of if_usb.c fw_table (bsc#1051510).\n- mac80211: accept deauth frames in IBSS mode (bsc#1051510).\n- mac80211: fix txq null pointer dereference (bsc#1051510).\n- mac80211: Reject malformed SSID elements (bsc#1051510).\n- macsec: drop skb sk before calling gro_cells_receive (bsc#1051510).\n- md/raid0: avoid RAID0 data corruption due to layout confusion (bsc#1140090).\n- md/raid0: fix warning message for parameter default_layout (bsc#1140090).\n- media: atmel: atmel-isc: fix asd memory allocation (bsc#1135642).\n- media: cpia2_usb: fix memory leaks (bsc#1051510).\n- media: dvb-core: fix a memory leak bug (bsc#1051510).\n- media: exynos4-is: fix leaked of_node references (bsc#1051510).\n- media: gspca: zero usb_buf on error (bsc#1051510).\n- media: hdpvr: Add device num check and handling (bsc#1051510).\n- media: hdpvr: add terminating 0 at end of string (bsc#1051510).\n- media: i2c: ov5645: Fix power sequence (bsc#1051510).\n- media: iguanair: add sanity checks (bsc#1051510).\n- media: omap3isp: Do not set streaming state on random subdevs (bsc#1051510).\n- media: omap3isp: Set device on omap3isp subdevs (bsc#1051510).\n- media: ov9650: add a sanity check (bsc#1051510).\n- media: radio/si470x: kill urb on error (bsc#1051510).\n- media: saa7134: fix terminology around saa7134_i2c_eeprom_md7134_gate() (bsc#1051510).\n- media: saa7146: add cleanup in hexium_attach() (bsc#1051510).\n- media: sn9c20x: Add MSI MS-1039 laptop to flip_dmi_table (bsc#1051510).\n- media: stkwebcam: fix runtime PM after driver unbind (bsc#1051510).\n- media: ttusb-dec: Fix info-leak in ttusb_dec_send_command() (bsc#1051510).\n- memstick: jmb38x_ms: Fix an error handling path in \u0027jmb38x_ms_probe()\u0027 (bsc#1051510).\n- mfd: intel-lpss: Remove D3cold delay (bsc#1051510).\n- mISDN: enforce CAP_NET_RAW for raw sockets (bsc#1051510).\n- mld: fix memory leak in mld_del_delrec() (networking-stable-19_09_05).\n- mmc: sdhci-of-esdhc: set DMA snooping based on DMA coherence (bsc#1051510).\n- mmc: sdhci: Fix incorrect switch to HS mode (bsc#1051510).\n- mmc: sdhci: improve ADMA error reporting (bsc#1051510).\n- Move the upstreamed ath6kl fix into the sorted section\n- Move the upstreamed cfg80211 fix into the sorted section\n- net/ibmvnic: Fix EOI when running in XIVE mode (bsc#1089644, ltc#166495, ltc#165544, git-fixes).\n- net/mlx4_en: fix a memory leak bug (bsc#1046299).\n- net/mlx5: Add device ID of upcoming BlueField-2 (bsc#1046303 ).\n- net/mlx5: Fix error handling in mlx5_load() (bsc#1046305 ).\n- net/phy: fix DP83865 10 Mbps HDX loopback disable function (networking-stable-19_09_30).\n- net/rds: Fix error handling in rds_ib_add_one() (networking-stable-19_10_05).\n- net/rds: fix warn in rds_message_alloc_sgs (bsc#1154848).\n- net/rds: remove user triggered WARN_ON in rds_sendmsg (bsc#1154848).\n- net/sched: act_sample: do not push mac header on ip6gre ingress (networking-stable-19_09_30).\n- net/smc: fix SMCD link group creation with VLAN id (bsc#1154959).\n- net: Fix null de-reference of device refcount (networking-stable-19_09_15).\n- net: fix skb use after free in netpoll (networking-stable-19_09_05).\n- net: gso: Fix skb_segment splat when splitting gso_size mangled skb having linear-headed frag_list (networking-stable-19_09_15).\n- net: openvswitch: free vport unless register_netdevice() succeeds (git-fixes).\n- net: qlogic: Fix memory leak in ql_alloc_large_buffers (networking-stable-19_10_05).\n- net: qrtr: Stop rx_worker before freeing node (networking-stable-19_09_30).\n- net: Replace NF_CT_ASSERT() with WARN_ON() (bsc#1146612).\n- net: sched: act_sample: fix psample group handling on overwrite (networking-stable-19_09_05).\n- net: stmmac: dwmac-rk: Do not fail if phy regulator is absent (networking-stable-19_09_05).\n- net: Unpublish sk from sk_reuseport_cb before call_rcu (networking-stable-19_10_05).\n- netfilter: nf_nat: do not bug when mapping already exists (bsc#1146612).\n- net_sched: add policy validation for action attributes (networking-stable-19_09_30).\n- net_sched: fix backward compatibility for TCA_ACT_KIND (git-fixes).\n- NFC: fix attrs checks in netlink interface (bsc#1051510).\n- nfc: fix memory leak in llcp_sock_bind() (bsc#1051510).\n- NFC: pn533: fix use-after-free and memleaks (bsc#1051510).\n- NFSv4.1 - backchannel request should hold ref on xprt (bsc#1152624).\n- nl80211: fix null pointer dereference (bsc#1051510).\n- objtool: Clobber user CFLAGS variable (bsc#1153236).\n- openvswitch: change type of UPCALL_PID attribute to NLA_UNSPEC (networking-stable-19_09_30).\n- packaging: add support for riscv64\n- Parametrize kgraft vs livepatch.\n- PCI: Correct pci=resource_alignment parameter example (bsc#1051510).\n- PCI: dra7xx: Fix legacy INTD IRQ handling (bsc#1087092).\n- PCI: hv: Use bytes 4 and 5 from instance ID as the PCI domain numbers (bsc#1153263).\n- PCI: PM: Fix pci_power_up() (bsc#1051510).\n- pinctrl: tegra: Fix write barrier placement in pmx_writel (bsc#1051510).\n- platform/x86: classmate-laptop: remove unused variable (bsc#1051510).\n- platform/x86: pmc_atom: Add Siemens SIMATIC IPC277E to critclk_systems DMI table (bsc#1051510).\n- power: supply: sysfs: ratelimit property read error message (bsc#1051510).\n- powerpc/64s/pseries: radix flush translations before MMU is enabled at boot (bsc#1055186).\n- powerpc/64s/radix: keep kernel ERAT over local process/guest invalidates (bsc#1055186).\n- powerpc/64s/radix: tidy up TLB flushing code (bsc#1055186).\n- powerpc/64s: Rename PPC_INVALIDATE_ERAT to PPC_ISA_3_0_INVALIDATE_ERAT (bsc#1055186).\n- powerpc/mm/book3s64: Move book3s64 code to pgtable-book3s64 (bsc#1055186).\n- powerpc/mm/radix: mark as __tlbie_pid() and friends as__always_inline (bsc#1055186).\n- powerpc/mm/radix: mark __radix__flush_tlb_range_psize() as __always_inline (bsc#1055186).\n- powerpc/mm: mark more tlb functions as __always_inline (bsc#1055186).\n- powerpc/mm: Properly invalidate when setting process table base (bsc#1055186).\n- powerpc/pseries/mobility: use cond_resched when updating device tree (bsc#1153112 ltc#181778).\n- powerpc/pseries: Export maximum memory value (bsc#1122363).\n- powerpc/pseries: Export raw per-CPU VPA data via debugfs ().\n- powerpc/pseries: Remove confusing warning message (bsc#1109158).\n- powerpc/rtas: allow rescheduling while changing cpu states (bsc#1153112 ltc#181778).\n- Pull packaging cleanup from mkubecek.\n- qed: iWARP - Fix default window size to be based on chip (bsc#1050536 bsc#1050545).\n- qed: iWARP - Fix tc for MPA ll2 connection (bsc#1050536 bsc#1050545).\n- qed: iWARP - fix uninitialized callback (bsc#1050536 bsc#1050545).\n- qed: iWARP - Use READ_ONCE and smp_store_release to access ep-\u003estate (bsc#1050536 bsc#1050545).\n- qmi_wwan: add support for Cinterion CLS8 devices (networking-stable-19_10_05).\n- r8152: Set macpassthru in reset_resume callback (bsc#1051510).\n- RDMA/bnxt_re: Fix spelling mistake \u0027missin_resp\u0027 -\u003e \u0027missing_resp\u0027 (bsc#1050244).\n- RDMA: Fix goto target to release the allocated memory (bsc#1050244).\n- rds: Fix warning (bsc#1154848).\n- README.BRANCH: Add Denis as branch maintainer\n- reiserfs: fix extended attributes on the root directory (bsc#1151225).\n- Revert \u0027ALSA: hda: Flush interrupts on disabling\u0027 (bsc#1051510).\n- Revert \u0027drm/radeon: Fix EEH during kexec\u0027 (bsc#1051510).\n- Revert \u0027Revert \u0027rpm/kernel-binary.spec.in: rename kGraft to KLP ()\u0027\u0027 This reverts commit 468af43c8fd8509820798b6d8ed363fc417ca939 Should get this rename again with next SLE15 merge.\n- Revert synaptics-rmi4 patch due to regression (bsc#1155982) Also blacklisting it\n- rpm/constraints.in: lower disk space required for ARM With a requirement of 35GB, only 2 slow workers are usable for ARM. Current aarch64 build requires 27G and armv6/7 requires 14G. Set requirements respectively to 30GB and 20GB.\n- rpm/dtb.spec.in.in: do not make dtb directory inaccessible There is no reason to lock down the dtb directory for ordinary users.\n- rpm/kernel-binary.spec.in: build kernel-*-kgraft only for default SLE kernel RT and Azure variants are excluded for the moment. (bsc#1141600)\n- rpm/kernel-binary.spec.in: Fix kernel-livepatch description typo.\n- rpm/kernel-binary.spec.in: handle modules.builtin.modinfo It was added in 5.2.\n- rpm/kernel-binary.spec.in: support partial rt debug config.\n- rpm/kernel-subpackage-spec: Mention debuginfo in the subpackage description (bsc#1149119).\n- rpm/macros.kernel-source: KMPs should depend on kmod-compat to build. kmod-compat links are used in find-provides.ksyms, find-requires.ksyms, and find-supplements.ksyms in rpm-config-SUSE.\n- rpm/mkspec: Correct tarball URL for rc kernels.\n- rpm/mkspec: Make building DTBs optional.\n- rpm/modflist: Simplify compression support.\n- rpm: raise required disk space for binary packages Current disk space constraints (10 GB on s390x, 25 GB on other architectures) no longer suffice for 5.3 kernel builds. The statistics show ~30 GB of disk consumption on x86_64 and ~11 GB on s390x so raise the constraints to 35 GB in general and 14 GB on s390x.\n- rpm: support compressed modules Some of our scripts and scriptlets in rpm/ do not expect module files not ending with \u0027.ko\u0027 which currently leads to failure in preuninstall scriptlet of cluster-md-kmp-default (and probably also other subpackages). Let those which could be run on compressed module files recognize \u0027.ko.xz\u0027 in addition to \u0027.ko\u0027.\n- rtlwifi: rtl8192cu: Fix value set in descriptor (bsc#1142635).\n- s390/cmf: set_schib_wait add timeout (bsc#1153509, bsc#1153476).\n- s390/cpumsf: Check for CPU Measurement sampling (bsc#1153681 LTC#181855).\n- s390/crypto: fix gcm-aes-s390 selftest failures (bsc#1137861 LTC#178091).\n- sched/fair: Avoid divide by zero when rebalancing domains (bsc#1096254).\n- sch_cbq: validate TCA_CBQ_WRROPT to avoid crash (networking-stable-19_10_05).\n- sch_dsmark: fix potential NULL deref in dsmark_init() (networking-stable-19_10_05).\n- sch_hhf: ensure quantum and hhf_non_hh_weight are non-zero (networking-stable-19_09_15).\n- sch_netem: fix a divide by zero in tabledist() (networking-stable-19_09_30).\n- scripts/arch-symbols: add missing link.\n- scsi: lpfc: Fix devices that do not return after devloss followed by rediscovery (bsc#1137040).\n- scsi: lpfc: Fix null ptr oops updating lpfc_devloss_tmo via sysfs attribute (bsc#1140845).\n- scsi: lpfc: Fix propagation of devloss_tmo setting to nvme transport (bsc#1140883).\n- scsi: lpfc: Remove bg debugfs buffers (bsc#1144375).\n- scsi: qedf: fc_rport_priv reference counting fixes (bsc#1098291).\n- scsi: qedf: Modify abort and tmf handler to handle edge condition and flush (bsc#1098291).\n- scsi: qla2xxx: Add error handling for PLOGI ELS passthrough (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Capture FW dump on MPI heartbeat stop event (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Check for MB timeout while capturing ISP27/28xx FW dump (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Dual FCP-NVMe target port support (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Fix N2N link reset (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Fix N2N link up fail (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Fix partial flash write of MBI (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Fix stale mem access on driver unload (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Fix unbound sleep in fcport delete path (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Fix wait condition in loop (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: fixup incorrect usage of host_byte (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Improve logging for scan thread (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Initialized mailbox to prevent driver load failure (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Optimize NPIV tear down process (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: remove redundant assignment to pointer host (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Set remove flag for all VP (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Silence fwdump template message (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: stop timer in shutdown path (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Update driver version to 10.01.00.20-k (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: storvsc: setup 1:1 mapping between hardware queue and CPU queue (bsc#1140729).\n- scsi: zfcp: fix reaction on bit error threshold notification (bsc#1154956 LTC#182054).\n- sctp: Fix the link time qualifier of \u0027sctp_ctrlsock_exit()\u0027 (networking-stable-19_09_15).\n- sctp: use transport pf_retrans in sctp_do_8_2_transport_strike (networking-stable-19_09_15).\n- Sign non-x86 kernels when possible (boo#1134303)\n- skge: fix checksum byte order (networking-stable-19_09_30).\n- sock_diag: fix autoloading of the raw_diag module (bsc#1152791).\n- sock_diag: request _diag module only when the family or proto has been registered (bsc#1152791).\n- staging: vt6655: Fix memory leak in vt6655_probe (bsc#1051510).\n- staging: wlan-ng: fix exit return when sme-\u003ekey_idx \u003e= NUM_WEPKEYS (bsc#1051510).\n- supporte.conf: add efivarfs to kernel-default-base (bsc#1154858).\n- tcp: Do not dequeue SYN/FIN-segments from write-queue (git-gixes).\n- tcp: fix tcp_ecn_withdraw_cwr() to clear TCP_ECN_QUEUE_CWR (networking-stable-19_09_15).\n- tcp: inherit timestamp on mtu probe (networking-stable-19_09_05).\n- tcp: remove empty skb from write queue in error cases (networking-stable-19_09_05).\n- thermal: Fix use-after-free when unregistering thermal zone device (bsc#1051510).\n- thermal_hwmon: Sanitize thermal_zone type (bsc#1051510).\n- tipc: add NULL pointer check before calling kfree_rcu (networking-stable-19_09_15).\n- tipc: fix unlimited bundling of small messages (networking-stable-19_10_05).\n- tracing: Initialize iter-\u003eseq after zeroing in tracing_read_pipe() (bsc#1151508).\n- tun: fix use-after-free when register netdev failed (networking-stable-19_09_15).\n- tuntap: correctly set SOCKWQ_ASYNC_NOSPACE (bsc#1145099).\n- tuntap: correctly set SOCKWQ_ASYNC_NOSPACE (bsc#1145099).\n- USB: adutux: fix NULL-derefs on disconnect (bsc#1142635).\n- USB: adutux: fix use-after-free on disconnect (bsc#1142635).\n- USB: adutux: fix use-after-free on release (bsc#1051510).\n- USB: chaoskey: fix use-after-free on release (bsc#1051510).\n- USB: dummy-hcd: fix power budget for SuperSpeed mode (bsc#1051510).\n- usb: gadget: udc: atmel: Fix interrupt storm in FIFO mode (bsc#1051510).\n- USB: iowarrior: fix use-after-free after driver unbind (bsc#1051510).\n- USB: iowarrior: fix use-after-free on disconnect (bsc#1051510).\n- USB: iowarrior: fix use-after-free on release (bsc#1051510).\n- USB: ldusb: fix control-message timeout (bsc#1051510).\n- USB: ldusb: fix memleak on disconnect (bsc#1051510).\n- USB: ldusb: fix NULL-derefs on driver unbind (bsc#1051510).\n- USB: ldusb: fix read info leaks (bsc#1051510).\n- USB: ldusb: fix ring-buffer locking (bsc#1051510).\n- USB: legousbtower: fix a signedness bug in tower_probe() (bsc#1051510).\n- USB: legousbtower: fix deadlock on disconnect (bsc#1142635).\n- USB: legousbtower: fix memleak on disconnect (bsc#1051510).\n- USB: legousbtower: fix open after failed reset request (bsc#1142635).\n- USB: legousbtower: fix potential NULL-deref on disconnect (bsc#1142635).\n- USB: legousbtower: fix slab info leak at probe (bsc#1142635).\n- USB: legousbtower: fix use-after-free on release (bsc#1051510).\n- USB: microtek: fix info-leak at probe (bsc#1142635).\n- USB: serial: fix runtime PM after driver unbind (bsc#1051510).\n- USB: serial: ftdi_sio: add device IDs for Sienna and Echelon PL-20 (bsc#1051510).\n- USB: serial: keyspan: fix NULL-derefs on open() and write() (bsc#1051510).\n- USB: serial: option: add support for Cinterion CLS8 devices (bsc#1051510).\n- USB: serial: option: add Telit FN980 compositions (bsc#1051510).\n- USB: serial: ti_usb_3410_5052: fix port-close races (bsc#1051510).\n- USB: serial: whiteheat: fix potential slab corruption (bsc#1051510).\n- usb: udc: lpc32xx: fix bad bit shift operation (bsc#1051510).\n- USB: usb-skeleton: fix NULL-deref on disconnect (bsc#1051510).\n- USB: usb-skeleton: fix runtime PM after driver unbind (bsc#1051510).\n- USB: usb-skeleton: fix use-after-free after driver unbind (bsc#1051510).\n- USB: usblcd: fix I/O after disconnect (bsc#1142635).\n- USB: usblp: fix runtime PM after driver unbind (bsc#1051510).\n- USB: usblp: fix use-after-free on disconnect (bsc#1051510).\n- usb: xhci: wait for CNR controller not ready bit in xhci resume (bsc#1051510).\n- USB: yurex: Do not retry on unexpected errors (bsc#1051510).\n- USB: yurex: fix NULL-derefs on disconnect (bsc#1051510).\n- usbnet: ignore endpoints with invalid wMaxPacketSize (bsc#1051510).\n- usbnet: sanity checking of packet sizes and device mtu (bsc#1051510).\n- vfio_pci: Restore original state on release (bsc#1051510).\n- vhost_net: conditionally enable tx polling (bsc#1145099).\n- vhost_net: conditionally enable tx polling (bsc#1145099).\n- video: of: display_timing: Add of_node_put() in of_get_display_timing() (bsc#1051510).\n- vsock: Fix a lockdep warning in __vsock_release() (networking-stable-19_10_05).\n- watchdog: imx2_wdt: fix min() calculation in imx2_wdt_set_timeout (bsc#1051510).\n- x86/asm: Fix MWAITX C-state hint value (bsc#1114279).\n- x86/boot/64: Make level2_kernel_pgt pages invalid outside kernel area (bnc#1153969).\n- x86/boot/64: Round memory hole size up to next PMD page (bnc#1153969).\n- x86/mm: Use WRITE_ONCE() when setting PTEs (bsc#1114279).\n- xen-netfront: do not use ~0U as error return value for xennet_fill_frags() (bsc#1065600).\n- xen/netback: fix error path of xenvif_connect_data() (bsc#1065600).\n- xen/pv: Fix Xen PV guest int3 handling (bsc#1153811).\n- xen/xenbus: fix self-deadlock after killing user process (bsc#1065600).\n- xhci: Check all endpoints for LPM timeout (bsc#1051510).\n- xhci: Fix false warning message about wrong bounce buffer write length (bsc#1051510).\n- xhci: Increase STS_SAVE timeout in xhci_suspend() (bsc#1051510).\n- xhci: Prevent device initiated U1/U2 link pm if exit latency is too long (bsc#1051510).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2019-2953,SUSE-SLE-SERVER-12-SP4-2019-2953",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_2953-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2019:2953-1",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192953-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2019:2953-1",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192953-1.html"
},
{
"category": "self",
"summary": "SUSE Bug 1046299",
"url": "https://bugzilla.suse.com/1046299"
},
{
"category": "self",
"summary": "SUSE Bug 1046303",
"url": "https://bugzilla.suse.com/1046303"
},
{
"category": "self",
"summary": "SUSE Bug 1046305",
"url": "https://bugzilla.suse.com/1046305"
},
{
"category": "self",
"summary": "SUSE Bug 1050244",
"url": "https://bugzilla.suse.com/1050244"
},
{
"category": "self",
"summary": "SUSE Bug 1050536",
"url": "https://bugzilla.suse.com/1050536"
},
{
"category": "self",
"summary": "SUSE Bug 1050545",
"url": "https://bugzilla.suse.com/1050545"
},
{
"category": "self",
"summary": "SUSE Bug 1051510",
"url": "https://bugzilla.suse.com/1051510"
},
{
"category": "self",
"summary": "SUSE Bug 1055186",
"url": "https://bugzilla.suse.com/1055186"
},
{
"category": "self",
"summary": "SUSE Bug 1061840",
"url": "https://bugzilla.suse.com/1061840"
},
{
"category": "self",
"summary": "SUSE Bug 1064802",
"url": "https://bugzilla.suse.com/1064802"
},
{
"category": "self",
"summary": "SUSE Bug 1065600",
"url": "https://bugzilla.suse.com/1065600"
},
{
"category": "self",
"summary": "SUSE Bug 1066129",
"url": "https://bugzilla.suse.com/1066129"
},
{
"category": "self",
"summary": "SUSE Bug 1073513",
"url": "https://bugzilla.suse.com/1073513"
},
{
"category": "self",
"summary": "SUSE Bug 1082635",
"url": "https://bugzilla.suse.com/1082635"
},
{
"category": "self",
"summary": "SUSE Bug 1083647",
"url": "https://bugzilla.suse.com/1083647"
},
{
"category": "self",
"summary": "SUSE Bug 1086323",
"url": "https://bugzilla.suse.com/1086323"
},
{
"category": "self",
"summary": "SUSE Bug 1087092",
"url": "https://bugzilla.suse.com/1087092"
},
{
"category": "self",
"summary": "SUSE Bug 1089644",
"url": "https://bugzilla.suse.com/1089644"
},
{
"category": "self",
"summary": "SUSE Bug 1090631",
"url": "https://bugzilla.suse.com/1090631"
},
{
"category": "self",
"summary": "SUSE Bug 1093205",
"url": "https://bugzilla.suse.com/1093205"
},
{
"category": "self",
"summary": "SUSE Bug 1096254",
"url": "https://bugzilla.suse.com/1096254"
},
{
"category": "self",
"summary": "SUSE Bug 1097583",
"url": "https://bugzilla.suse.com/1097583"
},
{
"category": "self",
"summary": "SUSE Bug 1097584",
"url": "https://bugzilla.suse.com/1097584"
},
{
"category": "self",
"summary": "SUSE Bug 1097585",
"url": "https://bugzilla.suse.com/1097585"
},
{
"category": "self",
"summary": "SUSE Bug 1097586",
"url": "https://bugzilla.suse.com/1097586"
},
{
"category": "self",
"summary": "SUSE Bug 1097587",
"url": "https://bugzilla.suse.com/1097587"
},
{
"category": "self",
"summary": "SUSE Bug 1097588",
"url": "https://bugzilla.suse.com/1097588"
},
{
"category": "self",
"summary": "SUSE Bug 1098291",
"url": "https://bugzilla.suse.com/1098291"
},
{
"category": "self",
"summary": "SUSE Bug 1101674",
"url": "https://bugzilla.suse.com/1101674"
},
{
"category": "self",
"summary": "SUSE Bug 1109158",
"url": "https://bugzilla.suse.com/1109158"
},
{
"category": "self",
"summary": "SUSE Bug 1114279",
"url": "https://bugzilla.suse.com/1114279"
},
{
"category": "self",
"summary": "SUSE Bug 1117665",
"url": "https://bugzilla.suse.com/1117665"
},
{
"category": "self",
"summary": "SUSE Bug 1119461",
"url": "https://bugzilla.suse.com/1119461"
},
{
"category": "self",
"summary": "SUSE Bug 1119465",
"url": "https://bugzilla.suse.com/1119465"
},
{
"category": "self",
"summary": "SUSE Bug 1122363",
"url": "https://bugzilla.suse.com/1122363"
},
{
"category": "self",
"summary": "SUSE Bug 1123034",
"url": "https://bugzilla.suse.com/1123034"
},
{
"category": "self",
"summary": "SUSE Bug 1123080",
"url": "https://bugzilla.suse.com/1123080"
},
{
"category": "self",
"summary": "SUSE Bug 1127155",
"url": "https://bugzilla.suse.com/1127155"
},
{
"category": "self",
"summary": "SUSE Bug 1133140",
"url": "https://bugzilla.suse.com/1133140"
},
{
"category": "self",
"summary": "SUSE Bug 1134303",
"url": "https://bugzilla.suse.com/1134303"
},
{
"category": "self",
"summary": "SUSE Bug 1135642",
"url": "https://bugzilla.suse.com/1135642"
},
{
"category": "self",
"summary": "SUSE Bug 1135854",
"url": "https://bugzilla.suse.com/1135854"
},
{
"category": "self",
"summary": "SUSE Bug 1135873",
"url": "https://bugzilla.suse.com/1135873"
},
{
"category": "self",
"summary": "SUSE Bug 1135967",
"url": "https://bugzilla.suse.com/1135967"
},
{
"category": "self",
"summary": "SUSE Bug 1137040",
"url": "https://bugzilla.suse.com/1137040"
},
{
"category": "self",
"summary": "SUSE Bug 1137799",
"url": "https://bugzilla.suse.com/1137799"
},
{
"category": "self",
"summary": "SUSE Bug 1137861",
"url": "https://bugzilla.suse.com/1137861"
},
{
"category": "self",
"summary": "SUSE Bug 1138190",
"url": "https://bugzilla.suse.com/1138190"
},
{
"category": "self",
"summary": "SUSE Bug 1139073",
"url": "https://bugzilla.suse.com/1139073"
},
{
"category": "self",
"summary": "SUSE Bug 1140090",
"url": "https://bugzilla.suse.com/1140090"
},
{
"category": "self",
"summary": "SUSE Bug 1140729",
"url": "https://bugzilla.suse.com/1140729"
},
{
"category": "self",
"summary": "SUSE Bug 1140845",
"url": "https://bugzilla.suse.com/1140845"
},
{
"category": "self",
"summary": "SUSE Bug 1140883",
"url": "https://bugzilla.suse.com/1140883"
},
{
"category": "self",
"summary": "SUSE Bug 1141600",
"url": "https://bugzilla.suse.com/1141600"
},
{
"category": "self",
"summary": "SUSE Bug 1142635",
"url": "https://bugzilla.suse.com/1142635"
},
{
"category": "self",
"summary": "SUSE Bug 1142667",
"url": "https://bugzilla.suse.com/1142667"
},
{
"category": "self",
"summary": "SUSE Bug 1143706",
"url": "https://bugzilla.suse.com/1143706"
},
{
"category": "self",
"summary": "SUSE Bug 1144338",
"url": "https://bugzilla.suse.com/1144338"
},
{
"category": "self",
"summary": "SUSE Bug 1144375",
"url": "https://bugzilla.suse.com/1144375"
},
{
"category": "self",
"summary": "SUSE Bug 1144449",
"url": "https://bugzilla.suse.com/1144449"
},
{
"category": "self",
"summary": "SUSE Bug 1144903",
"url": "https://bugzilla.suse.com/1144903"
},
{
"category": "self",
"summary": "SUSE Bug 1145099",
"url": "https://bugzilla.suse.com/1145099"
},
{
"category": "self",
"summary": "SUSE Bug 1146612",
"url": "https://bugzilla.suse.com/1146612"
},
{
"category": "self",
"summary": "SUSE Bug 1148410",
"url": "https://bugzilla.suse.com/1148410"
},
{
"category": "self",
"summary": "SUSE Bug 1149119",
"url": "https://bugzilla.suse.com/1149119"
},
{
"category": "self",
"summary": "SUSE Bug 1150452",
"url": "https://bugzilla.suse.com/1150452"
},
{
"category": "self",
"summary": "SUSE Bug 1150457",
"url": "https://bugzilla.suse.com/1150457"
},
{
"category": "self",
"summary": "SUSE Bug 1150465",
"url": "https://bugzilla.suse.com/1150465"
},
{
"category": "self",
"summary": "SUSE Bug 1150875",
"url": "https://bugzilla.suse.com/1150875"
},
{
"category": "self",
"summary": "SUSE Bug 1151225",
"url": "https://bugzilla.suse.com/1151225"
},
{
"category": "self",
"summary": "SUSE Bug 1151508",
"url": "https://bugzilla.suse.com/1151508"
},
{
"category": "self",
"summary": "SUSE Bug 1151680",
"url": "https://bugzilla.suse.com/1151680"
},
{
"category": "self",
"summary": "SUSE Bug 1152497",
"url": "https://bugzilla.suse.com/1152497"
},
{
"category": "self",
"summary": "SUSE Bug 1152505",
"url": "https://bugzilla.suse.com/1152505"
},
{
"category": "self",
"summary": "SUSE Bug 1152506",
"url": "https://bugzilla.suse.com/1152506"
},
{
"category": "self",
"summary": "SUSE Bug 1152624",
"url": "https://bugzilla.suse.com/1152624"
},
{
"category": "self",
"summary": "SUSE Bug 1152685",
"url": "https://bugzilla.suse.com/1152685"
},
{
"category": "self",
"summary": "SUSE Bug 1152782",
"url": "https://bugzilla.suse.com/1152782"
},
{
"category": "self",
"summary": "SUSE Bug 1152788",
"url": "https://bugzilla.suse.com/1152788"
},
{
"category": "self",
"summary": "SUSE Bug 1152791",
"url": "https://bugzilla.suse.com/1152791"
},
{
"category": "self",
"summary": "SUSE Bug 1153108",
"url": "https://bugzilla.suse.com/1153108"
},
{
"category": "self",
"summary": "SUSE Bug 1153112",
"url": "https://bugzilla.suse.com/1153112"
},
{
"category": "self",
"summary": "SUSE Bug 1153158",
"url": "https://bugzilla.suse.com/1153158"
},
{
"category": "self",
"summary": "SUSE Bug 1153236",
"url": "https://bugzilla.suse.com/1153236"
},
{
"category": "self",
"summary": "SUSE Bug 1153263",
"url": "https://bugzilla.suse.com/1153263"
},
{
"category": "self",
"summary": "SUSE Bug 1153476",
"url": "https://bugzilla.suse.com/1153476"
},
{
"category": "self",
"summary": "SUSE Bug 1153509",
"url": "https://bugzilla.suse.com/1153509"
},
{
"category": "self",
"summary": "SUSE Bug 1153646",
"url": "https://bugzilla.suse.com/1153646"
},
{
"category": "self",
"summary": "SUSE Bug 1153681",
"url": "https://bugzilla.suse.com/1153681"
},
{
"category": "self",
"summary": "SUSE Bug 1153713",
"url": "https://bugzilla.suse.com/1153713"
},
{
"category": "self",
"summary": "SUSE Bug 1153717",
"url": "https://bugzilla.suse.com/1153717"
},
{
"category": "self",
"summary": "SUSE Bug 1153718",
"url": "https://bugzilla.suse.com/1153718"
},
{
"category": "self",
"summary": "SUSE Bug 1153719",
"url": "https://bugzilla.suse.com/1153719"
},
{
"category": "self",
"summary": "SUSE Bug 1153811",
"url": "https://bugzilla.suse.com/1153811"
},
{
"category": "self",
"summary": "SUSE Bug 1153969",
"url": "https://bugzilla.suse.com/1153969"
},
{
"category": "self",
"summary": "SUSE Bug 1154108",
"url": "https://bugzilla.suse.com/1154108"
},
{
"category": "self",
"summary": "SUSE Bug 1154189",
"url": "https://bugzilla.suse.com/1154189"
},
{
"category": "self",
"summary": "SUSE Bug 1154354",
"url": "https://bugzilla.suse.com/1154354"
},
{
"category": "self",
"summary": "SUSE Bug 1154372",
"url": "https://bugzilla.suse.com/1154372"
},
{
"category": "self",
"summary": "SUSE Bug 1154578",
"url": "https://bugzilla.suse.com/1154578"
},
{
"category": "self",
"summary": "SUSE Bug 1154607",
"url": "https://bugzilla.suse.com/1154607"
},
{
"category": "self",
"summary": "SUSE Bug 1154608",
"url": "https://bugzilla.suse.com/1154608"
},
{
"category": "self",
"summary": "SUSE Bug 1154610",
"url": "https://bugzilla.suse.com/1154610"
},
{
"category": "self",
"summary": "SUSE Bug 1154611",
"url": "https://bugzilla.suse.com/1154611"
},
{
"category": "self",
"summary": "SUSE Bug 1154651",
"url": "https://bugzilla.suse.com/1154651"
},
{
"category": "self",
"summary": "SUSE Bug 1154737",
"url": "https://bugzilla.suse.com/1154737"
},
{
"category": "self",
"summary": "SUSE Bug 1154747",
"url": "https://bugzilla.suse.com/1154747"
},
{
"category": "self",
"summary": "SUSE Bug 1154848",
"url": "https://bugzilla.suse.com/1154848"
},
{
"category": "self",
"summary": "SUSE Bug 1154858",
"url": "https://bugzilla.suse.com/1154858"
},
{
"category": "self",
"summary": "SUSE Bug 1154905",
"url": "https://bugzilla.suse.com/1154905"
},
{
"category": "self",
"summary": "SUSE Bug 1154956",
"url": "https://bugzilla.suse.com/1154956"
},
{
"category": "self",
"summary": "SUSE Bug 1154959",
"url": "https://bugzilla.suse.com/1154959"
},
{
"category": "self",
"summary": "SUSE Bug 1155178",
"url": "https://bugzilla.suse.com/1155178"
},
{
"category": "self",
"summary": "SUSE Bug 1155179",
"url": "https://bugzilla.suse.com/1155179"
},
{
"category": "self",
"summary": "SUSE Bug 1155184",
"url": "https://bugzilla.suse.com/1155184"
},
{
"category": "self",
"summary": "SUSE Bug 1155186",
"url": "https://bugzilla.suse.com/1155186"
},
{
"category": "self",
"summary": "SUSE Bug 1155671",
"url": "https://bugzilla.suse.com/1155671"
},
{
"category": "self",
"summary": "SUSE Bug 1155692",
"url": "https://bugzilla.suse.com/1155692"
},
{
"category": "self",
"summary": "SUSE Bug 1155812",
"url": "https://bugzilla.suse.com/1155812"
},
{
"category": "self",
"summary": "SUSE Bug 1155817",
"url": "https://bugzilla.suse.com/1155817"
},
{
"category": "self",
"summary": "SUSE Bug 1155836",
"url": "https://bugzilla.suse.com/1155836"
},
{
"category": "self",
"summary": "SUSE Bug 1155945",
"url": "https://bugzilla.suse.com/1155945"
},
{
"category": "self",
"summary": "SUSE Bug 1155982",
"url": "https://bugzilla.suse.com/1155982"
},
{
"category": "self",
"summary": "SUSE Bug 1156187",
"url": "https://bugzilla.suse.com/1156187"
},
{
"category": "self",
"summary": "SUSE Bug 919448",
"url": "https://bugzilla.suse.com/919448"
},
{
"category": "self",
"summary": "SUSE Bug 987367",
"url": "https://bugzilla.suse.com/987367"
},
{
"category": "self",
"summary": "SUSE Bug 998153",
"url": "https://bugzilla.suse.com/998153"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-12207 page",
"url": "https://www.suse.com/security/cve/CVE-2018-12207/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-10220 page",
"url": "https://www.suse.com/security/cve/CVE-2019-10220/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11135 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11135/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-16232 page",
"url": "https://www.suse.com/security/cve/CVE-2019-16232/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-16233 page",
"url": "https://www.suse.com/security/cve/CVE-2019-16233/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-16234 page",
"url": "https://www.suse.com/security/cve/CVE-2019-16234/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-16995 page",
"url": "https://www.suse.com/security/cve/CVE-2019-16995/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-17055 page",
"url": "https://www.suse.com/security/cve/CVE-2019-17055/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-17056 page",
"url": "https://www.suse.com/security/cve/CVE-2019-17056/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-17133 page",
"url": "https://www.suse.com/security/cve/CVE-2019-17133/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-17666 page",
"url": "https://www.suse.com/security/cve/CVE-2019-17666/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-18805 page",
"url": "https://www.suse.com/security/cve/CVE-2019-18805/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2019-11-12T18:13:32Z",
"generator": {
"date": "2019-11-12T18:13:32Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2019:2953-1",
"initial_release_date": "2019-11-12T18:13:32Z",
"revision_history": [
{
"date": "2019-11-12T18:13:32Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-azure-4.12.14-6.29.1.noarch",
"product": {
"name": "kernel-devel-azure-4.12.14-6.29.1.noarch",
"product_id": "kernel-devel-azure-4.12.14-6.29.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-azure-4.12.14-6.29.1.noarch",
"product": {
"name": "kernel-source-azure-4.12.14-6.29.1.noarch",
"product_id": "kernel-source-azure-4.12.14-6.29.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-azure-4.12.14-6.29.1.x86_64",
"product": {
"name": "cluster-md-kmp-azure-4.12.14-6.29.1.x86_64",
"product_id": "cluster-md-kmp-azure-4.12.14-6.29.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-azure-4.12.14-6.29.1.x86_64",
"product": {
"name": "dlm-kmp-azure-4.12.14-6.29.1.x86_64",
"product_id": "dlm-kmp-azure-4.12.14-6.29.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-azure-4.12.14-6.29.1.x86_64",
"product": {
"name": "gfs2-kmp-azure-4.12.14-6.29.1.x86_64",
"product_id": "gfs2-kmp-azure-4.12.14-6.29.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-4.12.14-6.29.1.x86_64",
"product": {
"name": "kernel-azure-4.12.14-6.29.1.x86_64",
"product_id": "kernel-azure-4.12.14-6.29.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-base-4.12.14-6.29.1.x86_64",
"product": {
"name": "kernel-azure-base-4.12.14-6.29.1.x86_64",
"product_id": "kernel-azure-base-4.12.14-6.29.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-devel-4.12.14-6.29.1.x86_64",
"product": {
"name": "kernel-azure-devel-4.12.14-6.29.1.x86_64",
"product_id": "kernel-azure-devel-4.12.14-6.29.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-extra-4.12.14-6.29.1.x86_64",
"product": {
"name": "kernel-azure-extra-4.12.14-6.29.1.x86_64",
"product_id": "kernel-azure-extra-4.12.14-6.29.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-kgraft-devel-4.12.14-6.29.1.x86_64",
"product": {
"name": "kernel-azure-kgraft-devel-4.12.14-6.29.1.x86_64",
"product_id": "kernel-azure-kgraft-devel-4.12.14-6.29.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-azure-4.12.14-6.29.1.x86_64",
"product": {
"name": "kernel-syms-azure-4.12.14-6.29.1.x86_64",
"product_id": "kernel-syms-azure-4.12.14-6.29.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-azure-4.12.14-6.29.1.x86_64",
"product": {
"name": "kselftests-kmp-azure-4.12.14-6.29.1.x86_64",
"product_id": "kselftests-kmp-azure-4.12.14-6.29.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-azure-4.12.14-6.29.1.x86_64",
"product": {
"name": "ocfs2-kmp-azure-4.12.14-6.29.1.x86_64",
"product_id": "ocfs2-kmp-azure-4.12.14-6.29.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP4",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:12:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp4"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-4.12.14-6.29.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.29.1.x86_64"
},
"product_reference": "kernel-azure-4.12.14-6.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-base-4.12.14-6.29.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.29.1.x86_64"
},
"product_reference": "kernel-azure-base-4.12.14-6.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-devel-4.12.14-6.29.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.29.1.x86_64"
},
"product_reference": "kernel-azure-devel-4.12.14-6.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-azure-4.12.14-6.29.1.noarch as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.29.1.noarch"
},
"product_reference": "kernel-devel-azure-4.12.14-6.29.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-azure-4.12.14-6.29.1.noarch as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.29.1.noarch"
},
"product_reference": "kernel-source-azure-4.12.14-6.29.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-azure-4.12.14-6.29.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.29.1.x86_64"
},
"product_reference": "kernel-syms-azure-4.12.14-6.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-4.12.14-6.29.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.29.1.x86_64"
},
"product_reference": "kernel-azure-4.12.14-6.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-base-4.12.14-6.29.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.29.1.x86_64"
},
"product_reference": "kernel-azure-base-4.12.14-6.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-devel-4.12.14-6.29.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.29.1.x86_64"
},
"product_reference": "kernel-azure-devel-4.12.14-6.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-azure-4.12.14-6.29.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.29.1.noarch"
},
"product_reference": "kernel-devel-azure-4.12.14-6.29.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-azure-4.12.14-6.29.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.29.1.noarch"
},
"product_reference": "kernel-source-azure-4.12.14-6.29.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-azure-4.12.14-6.29.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.29.1.x86_64"
},
"product_reference": "kernel-syms-azure-4.12.14-6.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-12207",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-12207"
}
],
"notes": [
{
"category": "general",
"text": "Improper invalidation for page table updates by a virtual guest operating system for multiple Intel(R) Processors may allow an authenticated user to potentially enable denial of service of the host system via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.29.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-12207",
"url": "https://www.suse.com/security/cve/CVE-2018-12207"
},
{
"category": "external",
"summary": "SUSE Bug 1117665 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1117665"
},
{
"category": "external",
"summary": "SUSE Bug 1139073 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1139073"
},
{
"category": "external",
"summary": "SUSE Bug 1152505 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1152505"
},
{
"category": "external",
"summary": "SUSE Bug 1155812 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1155812"
},
{
"category": "external",
"summary": "SUSE Bug 1155817 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1155817"
},
{
"category": "external",
"summary": "SUSE Bug 1155945 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1155945"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1201877"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.29.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.29.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:13:32Z",
"details": "moderate"
}
],
"title": "CVE-2018-12207"
},
{
"cve": "CVE-2019-10220",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-10220"
}
],
"notes": [
{
"category": "general",
"text": "Linux kernel CIFS implementation, version 4.9.0 is vulnerable to a relative paths injection in directory entry lists.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.29.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-10220",
"url": "https://www.suse.com/security/cve/CVE-2019-10220"
},
{
"category": "external",
"summary": "SUSE Bug 1144903 for CVE-2019-10220",
"url": "https://bugzilla.suse.com/1144903"
},
{
"category": "external",
"summary": "SUSE Bug 1153108 for CVE-2019-10220",
"url": "https://bugzilla.suse.com/1153108"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.29.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.29.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:13:32Z",
"details": "important"
}
],
"title": "CVE-2019-10220"
},
{
"cve": "CVE-2019-11135",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11135"
}
],
"notes": [
{
"category": "general",
"text": "TSX Asynchronous Abort condition on some CPUs utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.29.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11135",
"url": "https://www.suse.com/security/cve/CVE-2019-11135"
},
{
"category": "external",
"summary": "SUSE Bug 1139073 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1139073"
},
{
"category": "external",
"summary": "SUSE Bug 1152497 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1152497"
},
{
"category": "external",
"summary": "SUSE Bug 1152505 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1152505"
},
{
"category": "external",
"summary": "SUSE Bug 1152506 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1152506"
},
{
"category": "external",
"summary": "SUSE Bug 1160120 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1160120"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1201877"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.29.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.29.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:13:32Z",
"details": "moderate"
}
],
"title": "CVE-2019-11135"
},
{
"cve": "CVE-2019-16232",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-16232"
}
],
"notes": [
{
"category": "general",
"text": "drivers/net/wireless/marvell/libertas/if_sdio.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.29.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-16232",
"url": "https://www.suse.com/security/cve/CVE-2019-16232"
},
{
"category": "external",
"summary": "SUSE Bug 1150465 for CVE-2019-16232",
"url": "https://bugzilla.suse.com/1150465"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.29.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.29.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:13:32Z",
"details": "low"
}
],
"title": "CVE-2019-16232"
},
{
"cve": "CVE-2019-16233",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-16233"
}
],
"notes": [
{
"category": "general",
"text": "drivers/scsi/qla2xxx/qla_os.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.29.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-16233",
"url": "https://www.suse.com/security/cve/CVE-2019-16233"
},
{
"category": "external",
"summary": "SUSE Bug 1150457 for CVE-2019-16233",
"url": "https://bugzilla.suse.com/1150457"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.29.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.29.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:13:32Z",
"details": "low"
}
],
"title": "CVE-2019-16233"
},
{
"cve": "CVE-2019-16234",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-16234"
}
],
"notes": [
{
"category": "general",
"text": "drivers/net/wireless/intel/iwlwifi/pcie/trans.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.29.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-16234",
"url": "https://www.suse.com/security/cve/CVE-2019-16234"
},
{
"category": "external",
"summary": "SUSE Bug 1150452 for CVE-2019-16234",
"url": "https://bugzilla.suse.com/1150452"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.29.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.29.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:13:32Z",
"details": "low"
}
],
"title": "CVE-2019-16234"
},
{
"cve": "CVE-2019-16995",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-16995"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel before 5.0.3, a memory leak exits in hsr_dev_finalize() in net/hsr/hsr_device.c if hsr_add_port fails to add a port, which may cause denial of service, aka CID-6caabe7f197d.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.29.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-16995",
"url": "https://www.suse.com/security/cve/CVE-2019-16995"
},
{
"category": "external",
"summary": "SUSE Bug 1152685 for CVE-2019-16995",
"url": "https://bugzilla.suse.com/1152685"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.29.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.29.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:13:32Z",
"details": "moderate"
}
],
"title": "CVE-2019-16995"
},
{
"cve": "CVE-2019-17055",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-17055"
}
],
"notes": [
{
"category": "general",
"text": "base_sock_create in drivers/isdn/mISDN/socket.c in the AF_ISDN network module in the Linux kernel through 5.3.2 does not enforce CAP_NET_RAW, which means that unprivileged users can create a raw socket, aka CID-b91ee4aa2a21.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.29.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-17055",
"url": "https://www.suse.com/security/cve/CVE-2019-17055"
},
{
"category": "external",
"summary": "SUSE Bug 1152782 for CVE-2019-17055",
"url": "https://bugzilla.suse.com/1152782"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.29.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.29.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:13:32Z",
"details": "low"
}
],
"title": "CVE-2019-17055"
},
{
"cve": "CVE-2019-17056",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-17056"
}
],
"notes": [
{
"category": "general",
"text": "llcp_sock_create in net/nfc/llcp_sock.c in the AF_NFC network module in the Linux kernel through 5.3.2 does not enforce CAP_NET_RAW, which means that unprivileged users can create a raw socket, aka CID-3a359798b176.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.29.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-17056",
"url": "https://www.suse.com/security/cve/CVE-2019-17056"
},
{
"category": "external",
"summary": "SUSE Bug 1152788 for CVE-2019-17056",
"url": "https://bugzilla.suse.com/1152788"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.29.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.29.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:13:32Z",
"details": "moderate"
}
],
"title": "CVE-2019-17056"
},
{
"cve": "CVE-2019-17133",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-17133"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel through 5.3.2, cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c does not reject a long SSID IE, leading to a Buffer Overflow.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.29.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-17133",
"url": "https://www.suse.com/security/cve/CVE-2019-17133"
},
{
"category": "external",
"summary": "SUSE Bug 1153158 for CVE-2019-17133",
"url": "https://bugzilla.suse.com/1153158"
},
{
"category": "external",
"summary": "SUSE Bug 1153161 for CVE-2019-17133",
"url": "https://bugzilla.suse.com/1153161"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.29.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.29.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:13:32Z",
"details": "important"
}
],
"title": "CVE-2019-17133"
},
{
"cve": "CVE-2019-17666",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-17666"
}
],
"notes": [
{
"category": "general",
"text": "rtl_p2p_noa_ie in drivers/net/wireless/realtek/rtlwifi/ps.c in the Linux kernel through 5.3.6 lacks a certain upper-bound check, leading to a buffer overflow.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.29.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-17666",
"url": "https://www.suse.com/security/cve/CVE-2019-17666"
},
{
"category": "external",
"summary": "SUSE Bug 1154372 for CVE-2019-17666",
"url": "https://bugzilla.suse.com/1154372"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.29.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.29.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:13:32Z",
"details": "moderate"
}
],
"title": "CVE-2019-17666"
},
{
"cve": "CVE-2019-18805",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-18805"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in net/ipv4/sysctl_net_ipv4.c in the Linux kernel before 5.0.11. There is a net/ipv4/tcp_input.c signed integer overflow in tcp_ack_update_rtt() when userspace writes a very large integer to /proc/sys/net/ipv4/tcp_min_rtt_wlen, leading to a denial of service or possibly unspecified other impact, aka CID-19fad20d15a6.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.29.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-18805",
"url": "https://www.suse.com/security/cve/CVE-2019-18805"
},
{
"category": "external",
"summary": "SUSE Bug 1156187 for CVE-2019-18805",
"url": "https://bugzilla.suse.com/1156187"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.29.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.29.1.noarch",
"SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.29.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.29.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.29.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:13:32Z",
"details": "low"
}
],
"title": "CVE-2019-18805"
}
]
}
suse-su-2020:0093-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "The SUSE Linux Enterprise 12 SP5 Azure kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2019-20095: mwifiex_tm_cmd in drivers/net/wireless/marvell/mwifiex/cfg80211.c had some error-handling cases that did not free allocated hostcmd memory. This will cause a memory leak and denial of service (bnc#1159909).\n- CVE-2019-20054: Fixed a a NULL pointer dereference in drop_sysctl_table() in fs/proc/proc_sysctl.c, related to put_links (bnc#1159910).\n- CVE-2019-20096: Fixed a memory leak in __feat_register_sp() in net/dccp/feat.c, which may cause denial of service (bnc#1159908).\n- CVE-2019-19966: Fixed a use-after-free in cpia2_exit() in drivers/media/usb/cpia2/cpia2_v4l.c that will cause denial of service (bnc#1159841).\n- CVE-2019-19447: Mounting a crafted ext4 filesystem image, performing some operations, and unmounting can lead to a use-after-free in ext4_put_super in fs/ext4/super.c, related to dump_orphan_list in fs/ext4/super.c (bnc#1158819).\n- CVE-2019-19319: A setxattr operation, after a mount of a crafted ext4 image, can cause a slab-out-of-bounds write access because of an ext4_xattr_set_entry use-after-free in fs/ext4/xattr.c when a large old_size value is used in a memset call (bnc#1158021).\n- CVE-2019-19767: Fixed mishandling of ext4_expand_extra_isize, as demonstrated by use-after-free errors in __ext4_expand_extra_isize and ext4_xattr_set_entry, related to fs/ext4/inode.c and fs/ext4/super.c (bnc#1159297).\n- CVE-2019-18808: A memory leak in the ccp_run_sha_cmd() function in drivers/crypto/ccp/ccp-ops.c allowed attackers to cause a denial of service (memory consumption) (bnc#1156259).\n- CVE-2019-16746: An issue was discovered in net/wireless/nl80211.c where the length of variable elements in a beacon head were not checked, leading to a buffer overflow (bnc#1152107).\n- CVE-2019-19066: A memory leak in the bfad_im_get_stats() function in drivers/scsi/bfa/bfad_attr.c allowed attackers to cause a denial of service (memory consumption) by triggering bfa_port_get_stats() failures (bnc#1157303).\n- CVE-2019-19051: There was a memory leak in the i2400m_op_rfkill_sw_toggle() function in drivers/net/wimax/i2400m/op-rfkill.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) (bnc#1159024).\n- CVE-2019-19338: There was an incomplete fix for Transaction Asynchronous Abort (TAA) (bnc#1158954).\n- CVE-2019-19332: There was an OOB memory write via kvm_dev_ioctl_get_cpuid (bnc#1158827).\n- CVE-2019-19537: There was a race condition bug that can be caused by a malicious USB device in the USB character device driver layer (bnc#1158904).\n- CVE-2019-19535: There was an info-leak bug that can be caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_fd.c driver (bnc#1158903).\n- CVE-2019-19527: There was a use-after-free bug that can be caused by a malicious USB device in the drivers/hid/usbhid/hiddev.c driver (bnc#1158900).\n- CVE-2019-19526: There was a use-after-free bug that can be caused by a malicious USB device in the drivers/nfc/pn533/usb.c driver (bnc#1158893).\n- CVE-2019-19533: There was an info-leak bug that can be caused by a malicious USB device in the drivers/media/usb/ttusb-dec/ttusb_dec.c driver (bnc#1158834).\n- CVE-2019-19532: There were multiple out-of-bounds write bugs that can be caused by a malicious USB device in the Linux kernel HID drivers (bnc#1158824).\n- CVE-2019-19523: There was a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/misc/adutux.c driver, aka CID-44efc269db79 (bnc#1158381 1158823 1158834).\n- CVE-2019-15213: There was a use-after-free caused by a malicious USB device in the drivers/media/usb/dvb-usb/dvb-usb-init.c driver (bnc#1146544).\n- CVE-2019-19531: There was a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/misc/yurex.c driver (bnc#1158445).\n- CVE-2019-19543: There was a use-after-free in serial_ir_init_module() in drivers/media/rc/serial_ir.c (bnc#1158427).\n- CVE-2019-19525: There was a use-after-free bug that can be caused by a malicious USB device in the drivers/net/ieee802154/atusb.c driver (bnc#1158417).\n- CVE-2019-19530: There was a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/class/cdc-acm.c driver (bnc#1158410).\n- CVE-2019-19536: There was an info-leak bug that can be caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_pro.c driver (bnc#1158394).\n- CVE-2019-19524: There was a use-after-free bug that can be caused by a malicious USB device in the drivers/input/ff-memless.c driver (bnc#1158413).\n- CVE-2019-19528: There was a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/misc/iowarrior.c driver (bnc#1158407).\n- CVE-2019-19534: There was an info-leak bug that can be caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_core.c driver (bnc#1158398).\n- CVE-2019-19529: There was a use-after-free bug that can be caused by a malicious USB device in the drivers/net/can/usb/mcba_usb.c driver (bnc#1158381).\n- CVE-2019-14901: A heap overflow flaw was found in the Linux kernel in Marvell WiFi chip driver. The vulnerability allowed a remote attacker to cause a system crash, resulting in a denial of service, or execute arbitrary code. The highest threat with this vulnerability is with the availability of the system. If code execution occurs, the code will run with the permissions of root. This will affect both confidentiality and integrity of files on the system (bnc#1157042).\n- CVE-2019-14895: A heap-based buffer overflow was discovered in the Linux kernel in Marvell WiFi chip driver. The flaw could occur when the station attempts a connection negotiation during the handling of the remote devices country settings. This could have allowed the remote device to cause a denial of service (system crash) or possibly execute arbitrary code (bnc#1157158).\n- CVE-2019-18660: The Linux kernel on powerpc allowed Information Exposure because the Spectre-RSB mitigation is not in place for all applicable CPUs. This is related to arch/powerpc/kernel/entry_64.S and arch/powerpc/kernel/security.c (bnc#1157038).\n- CVE-2019-18683: An issue was discovered in drivers/media/platform/vivid in the Linux kernel. It is exploitable for privilege escalation on some Linux distributions where local users have /dev/video0 access, but only if the driver happens to be loaded. There are multiple race conditions during streaming stopping in this driver (part of the V4L2 subsystem). These issues are caused by wrong mutex locking in vivid_stop_generating_vid_cap(), vivid_stop_generating_vid_out(), sdr_cap_stop_streaming(), and the corresponding kthreads. At least one of these race conditions leads to a use-after-free (bnc#1155897).\n- CVE-2019-18809: A memory leak in the af9005_identify_state() function in drivers/media/usb/dvb-usb/af9005.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) (bnc#1156258).\n- CVE-2019-19046: A memory leak in the __ipmi_bmc_register() function in drivers/char/ipmi/ipmi_msghandler.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) by triggering ida_simple_get() failure (bnc#1157304).\n- CVE-2019-19078: A memory leak in the ath10k_usb_hif_tx_sg() function in drivers/net/wireless/ath/ath10k/usb.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) by triggering usb_submit_urb() failures (bnc#1157032).\n- CVE-2019-19062: A memory leak in the crypto_report() function in crypto/crypto_user_base.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) by triggering crypto_report_alg() failures (bnc#1157333).\n- CVE-2019-19057: Two memory leaks in the mwifiex_pcie_init_evt_ring() function in drivers/net/wireless/marvell/mwifiex/pcie.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) by triggering mwifiex_map_pci_memory() failures (bnc#1157197).\n- CVE-2019-19056: A memory leak in the mwifiex_pcie_alloc_cmdrsp_buf() function in drivers/net/wireless/marvell/mwifiex/pcie.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) by triggering mwifiex_map_pci_memory() failures (bnc#1157197).\n- CVE-2019-19068: A memory leak in the rtl8xxxu_submit_int_urb() function in drivers/net/wireless/realtek/rtl8xxxu/rtl8xxxu_core.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) by triggering usb_submit_urb() failures (bnc#1157307).\n- CVE-2019-19063: Two memory leaks in the rtl_usb_probe() function in drivers/net/wireless/realtek/rtlwifi/usb.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) (bnc#1157298).\n- CVE-2019-19227: In the AppleTalk subsystem in the Linux kernel there was a potential NULL pointer dereference because register_snap_client may return NULL. This will lead to denial of service in net/appletalk/aarp.c and net/appletalk/ddp.c, as demonstrated by unregister_snap_client (bnc#1157678).\n- CVE-2019-19081: A memory leak in the nfp_flower_spawn_vnic_reprs() function in drivers/net/ethernet/netronome/nfp/flower/main.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) (bnc#1157045).\n- CVE-2019-19080: Four memory leaks in the nfp_flower_spawn_phy_reprs() function in drivers/net/ethernet/netronome/nfp/flower/main.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) (bnc#1157044).\n- CVE-2019-19065: A memory leak in the sdma_init() function in drivers/infiniband/hw/hfi1/sdma.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) by triggering rhashtable_init() failures (bnc#1157191).\n- CVE-2019-19077: A memory leak in the bnxt_re_create_srq() function in drivers/infiniband/hw/bnxt_re/ib_verbs.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) by triggering copy to udata failures (bnc#1157171).\n- CVE-2019-19052: A memory leak in the gs_can_open() function in drivers/net/can/usb/gs_usb.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) by triggering usb_submit_urb() failures (bnc#1157324).\n- CVE-2019-19067: Four memory leaks in the acp_hw_init() function in drivers/gpu/drm/amd/amdgpu/amdgpu_acp.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) by triggering mfd_add_hotplug_devices() or pm_genpd_add_device() failures (bsc#1157180).\n- CVE-2019-19060: A memory leak in the adis_update_scan_mode() function in drivers/iio/imu/adis_buffer.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) (bnc#1157178).\n- CVE-2019-19049: A memory leak in the unittest_data_add() function in drivers/of/unittest.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) by triggering of_fdt_unflatten_tree() failures (bsc#1157173).\n- CVE-2019-19075: A memory leak in the ca8210_probe() function in drivers/net/ieee802154/ca8210.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) by triggering ca8210_get_platform_data() failures (bnc#1157162).\n- CVE-2019-19058: A memory leak in the alloc_sgtable() function in drivers/net/wireless/intel/iwlwifi/fw/dbg.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) by triggering alloc_page() failures (bnc#1157145).\n- CVE-2019-19074: A memory leak in the ath9k_wmi_cmd() function in drivers/net/wireless/ath/ath9k/wmi.c in the Linux kernel allowed attackers to cause a denial of service (memory consumption) (bnc#1157143).\n- CVE-2019-19073: Fixed memory leaks in drivers/net/wireless/ath/ath9k/htc_hst.c allowed attackers to cause a denial of service (memory consumption) by triggering wait_for_completion_timeout() failures (bnc#1157070).\n- CVE-2019-19083: Memory leaks in *clock_source_create() functions under drivers/gpu/drm/amd/display/dc in the Linux kernel allowed attackers to cause a denial of service (memory consumption) (bnc#1157049).\n- CVE-2019-19082: Memory leaks in *create_resource_pool() functions under drivers/gpu/drm/amd/display/dc in the Linux kernel allowed attackers to cause a denial of service (memory consumption) (bnc#1157046).\n- CVE-2019-15916: An issue was discovered in the Linux kernel There was a memory leak in register_queue_kobjects() in net/core/net-sysfs.c, which will cause denial of service (bnc#1149448).\n- CVE-2019-0154: Insufficient access control in subsystem for Intel (R) processor graphics in 6th, 7th, 8th and 9th Generation Intel(R) Core(TM) Processor Families; Intel(R) Pentium(R) Processor J, N, Silver and Gold Series; Intel(R) Celeron(R) Processor J, N, G3900 and G4900 Series; Intel(R) Atom(R) Processor A and E3900 Series; Intel(R) Xeon(R) Processor E3-1500 v5 and v6 and E-2100 Processor Families may have allowed an authenticated user to potentially enable denial of service via local access (bnc#1135966).\n- CVE-2019-0155: Insufficient access control in a subsystem for Intel (R) processor graphics in 6th, 7th, 8th and 9th Generation Intel(R) Core(TM) Processor Families; Intel(R) Pentium(R) Processor J, N, Silver and Gold Series; Intel(R) Celeron(R) Processor J, N, G3900 and G4900 Series; Intel(R) Atom(R) Processor A and E3900 Series; Intel(R) Xeon(R) Processor E3-1500 v5 and v6, E-2100 and E-2200 Processor Families; Intel(R) Graphics Driver for Windows (DCH) or 26.20.100.6812 and before 21.20.x.5077 (aka15.45.5077), i915 Linux Driver for Intel(R) Processor Graphics before versions 5.4-rc7, 5.3.11, 4.19.84, 4.14.154, 4.9.201, 4.4.201 may have allowed an authenticated user to potentially enable escalation of privilege via local access (bnc#1135967).\n- CVE-2019-16231: drivers/net/fjes/fjes_main.c in the Linux kernel 5.2.14 did not check the alloc_workqueue return value, leading to a NULL pointer dereference (bnc#1150466).\n- CVE-2019-18805: An issue was discovered in net/ipv4/sysctl_net_ipv4.c in the Linux kernel There was a net/ipv4/tcp_input.c signed integer overflow in tcp_ack_update_rtt() when userspace writes a very large integer to /proc/sys/net/ipv4/tcp_min_rtt_wlen, leading to a denial of service or possibly unspecified other impact (bnc#1156187).\n- CVE-2019-17055: base_sock_create in drivers/isdn/mISDN/socket.c in the AF_ISDN network module in the Linux kernel did not enforce CAP_NET_RAW, which means that unprivileged users can create a raw socket (bnc#1152782).\n- CVE-2019-16995: In the Linux kernel before 5.0.3, a memory leak exits in hsr_dev_finalize() in net/hsr/hsr_device.c if hsr_add_port fails to add a port, which may cause denial of service, aka CID-6caabe7f197d (bnc#1152685).\n- CVE-2019-11135: TSX Asynchronous Abort condition on some CPUs utilizing speculative execution may have allowed an authenticated user to potentially enable information disclosure via a side channel with local access (bnc#1139073).\n- CVE-2019-16233: drivers/scsi/qla2xxx/qla_os.c in the Linux kernel 5.2.14 did not check the alloc_workqueue return value, leading to a NULL pointer dereference (bnc#1150457).\n- CVE-2018-12207: Improper invalidation for page table updates by a virtual guest operating system for multiple Intel(R) Processors may have allowed an authenticated user to potentially enable denial of service of the host system via local access (bnc#1117665).\n- CVE-2019-10220: Linux kernel CIFS implementation, version 4.9.0 is vulnerable to a relative paths injection in directory entry lists (bnc#1144903).\n- CVE-2019-17666: rtl_p2p_noa_ie in drivers/net/wireless/realtek/rtlwifi/ps.c in the Linux kernel lacks a certain upper-bound check, leading to a buffer overflow (bnc#1154372).\n- CVE-2019-16232: drivers/net/wireless/marvell/libertas/if_sdio.c did not check the alloc_workqueue return value, leading to a NULL pointer dereference (bnc#1150465).\n- CVE-2019-16234: drivers/net/wireless/intel/iwlwifi/pcie/trans.c did not check the alloc_workqueue return value, leading to a NULL pointer dereference (bnc#1150452).\n- CVE-2019-17133: cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c did not reject a long SSID IE, leading to a Buffer Overflow (bnc#1153158).\n- CVE-2019-17056: llcp_sock_create in net/nfc/llcp_sock.c in the AF_NFC network module in the Linux kernel did not enforce CAP_NET_RAW, which means that unprivileged users can create a raw socket, aka CID-3a359798b176 (bnc#1152788).\n- CVE-2019-14821: An out-of-bounds access issue was found in the way Linux kernel\u0027s KVM hypervisor implements the Coalesced MMIO write operation (bnc#1151350).\n- CVE-2017-18595: An issue was discovered in the Linux kernel A double free may be caused by the function allocate_trace_buffer in the file kernel/trace/trace.c (bnc#1149555).\n- CVE-2019-9506: The Bluetooth BR/EDR specification up to and including version 5.1 permits sufficiently low encryption key length and did not prevent an attacker from influencing the key length negotiation. This allowed practical brute-force attacks (aka \u0027KNOB\u0027) that can decrypt traffic and inject arbitrary ciphertext without the victim noticing (bnc#1146042).\n- CVE-2019-14835: A buffer overflow flaw was found in the way Linux kernel\u0027s vhost functionality that translates virtqueue buffers to IOVs, logged the buffer descriptors during migration (bnc#1150112).\n- CVE-2019-9456: Ther is an issue inside the USB monitor driver that can lead to a possible OOB write due to a missing bounds check (bnc#1150025).\n- CVE-2019-15031: In the Linux kernel on the powerpc platform, a local user can read vector registers of other users\u0027 processes via an interrupt (bnc#1149713).\n- CVE-2019-15030: In the Linux kernel on the powerpc platform, a local user can read vector registers of other users\u0027 processes via a Facility Unavailable exception (bnc#1149713).\n\nThe following non-security bugs were fixed:\n\n- 9p: avoid attaching writeback_fid on mmap with type PRIVATE (bsc#1051510).\n- ACPI / APEI: Do not wait to serialise with oops messages when panic()ing (bsc#1051510).\n- ACPI / CPPC: do not require the _PSD method (bsc#1051510).\n- ACPI / LPSS: Exclude I2C busses shared with PUNIT from pmc_atom_d3_mask (bsc#1051510).\n- ACPI / LPSS: Ignore acpi_device_fix_up_power() return value (bsc#1051510).\n- ACPI / PCI: fix acpi_pci_irq_enable() memory leak (bsc#1051510).\n- ACPI / SBS: Fix rare oops when removing modules (bsc#1051510).\n- ACPI / hotplug / PCI: Allocate resources directly under the non-hotplug bridge (bsc#1111666).\n- ACPI / processor: do not print errors for processorIDs == 0xff (bsc#1051510).\n- ACPI / property: Fix acpi_graph_get_remote_endpoint() name in kerneldoc (bsc#1051510).\n- ACPI: CPPC: Set pcc_data[pcc_ss_id] to NULL in acpi_cppc_processor_exit() (bsc#1051510).\n- ACPI: OSL: only free map once in osl.c (bsc#1051510).\n- ACPI: bus: Fix NULL pointer check in acpi_bus_get_private_data() (bsc#1051510).\n- ACPI: custom_method: fix memory leaks (bsc#1051510).\n- ACPI: sysfs: Change ACPI_MASKABLE_GPE_MAX to 0x100 (bsc#1051510).\n- ACPICA: Increase total number of possible Owner IDs (bsc#1148859).\n- ACPICA: Never run _REG on system_memory and system_IO (bsc#1051510).\n- ACPICA: Use %d for signed int print formatting instead of %u (bsc#1051510).\n- ALSA: 6fire: Drop the dead code (git-fixes).\n- ALSA: aoa: onyx: always initialize register read value (bsc#1051510).\n- ALSA: bebob: Fix prototype of helper function to return negative value (bsc#1051510).\n- ALSA: bebob: fix to detect configured source of sampling clock for Focusrite Saffire Pro i/o series (git-fixes).\n- ALSA: cs4236: fix error return comparison of an unsigned integer (git-fixes).\n- ALSA: echoaudio: simplify get_audio_levels (bsc#1051510).\n- ALSA: fireface: fix return value in error path of isochronous resources reservation (bsc#1051510).\n- ALSA: firewire-motu: Correct a typo in the clock proc string (git-fixes).\n- ALSA: firewire-motu: add support for MOTU 4pre (bsc#1111666).\n- ALSA: firewire-tascam: check intermediate state of clock status and retry (bsc#1051510).\n- ALSA: firewire-tascam: handle error code when getting current source of clock (bsc#1051510).\n- ALSA: hda - Add a quirk model for fixing Huawei Matebook X right speaker (bsc#1051510).\n- ALSA: hda - Add laptop imic fixup for ASUS M9V laptop (bsc#1051510).\n- ALSA: hda - Add mute led support for HP ProBook 645 G4 (git-fixes).\n- ALSA: hda - Apply AMD controller workaround for Raven platform (bsc#1051510).\n- ALSA: hda - Define a fallback_pin_fixup_tbl for alc269 family (bsc#1051510).\n- ALSA: hda - Downgrade error message for single-cmd fallback (git-fixes).\n- ALSA: hda - Drop unsol event handler for Intel HDMI codecs (bsc#1051510).\n- ALSA: hda - Expand pin_match function to match upcoming new tbls (bsc#1051510).\n- ALSA: hda - Fix pending unsol events at shutdown (git-fixes).\n- ALSA: hda - Fix potential endless loop at applying quirks (bsc#1051510).\n- ALSA: hda - Force runtime PM on Nvidia HDMI codecs (bsc#1051510).\n- ALSA: hda - Inform too slow responses (bsc#1051510).\n- ALSA: hda - Show the fatal CORB/RIRB error more clearly (bsc#1051510).\n- ALSA: hda - fixup for the bass speaker on Lenovo Carbon X1 7th gen (git-fixes).\n- ALSA: hda/ca0132 - Avoid endless loop (git-fixes).\n- ALSA: hda/ca0132 - Fix possible workqueue stall (bsc#1155836).\n- ALSA: hda/ca0132 - Fix work handling in delayed HP detection (git-fixes).\n- ALSA: hda/ca0132 - Keep power on during processing DSP response (git-fixes).\n- ALSA: hda/hdmi - Add new pci ids for AMD GPU display audio (git-fixes).\n- ALSA: hda/hdmi - Clear codec-\u003erelaxed_resume flag at unbinding (git-fixes).\n- ALSA: hda/hdmi - Do not report spurious jack state changes (bsc#1051510).\n- ALSA: hda/hdmi - Fix duplicate unref of pci_dev (bsc#1051510).\n- ALSA: hda/hdmi - fix atpx_present when CLASS is not VGA (bsc#1051510).\n- ALSA: hda/hdmi - fix vgaswitcheroo detection for AMD (git-fixes).\n- ALSA: hda/hdmi: remove redundant assignment to variable pcm_idx (bsc#1051510).\n- ALSA: hda/intel: add CometLake PCI IDs (bsc#1156729).\n- ALSA: hda/realtek - Add headset Mic no shutup for ALC283 (bsc#1051510).\n- ALSA: hda/realtek - Add quirk for HP Pavilion 15 (bsc#1051510).\n- ALSA: hda/realtek - Add support for ALC623 (bsc#1051510).\n- ALSA: hda/realtek - Add support for ALC711 (bsc#1051510).\n- ALSA: hda/realtek - Blacklist PC beep for Lenovo ThinkCentre M73/93 (bsc#1051510).\n- ALSA: hda/realtek - Check beep whitelist before assigning in all codecs (bsc#1051510).\n- ALSA: hda/realtek - Dell headphone has noise on unmute for ALC236 (git-fixes).\n- ALSA: hda/realtek - Enable headset mic on Asus MJ401TA (bsc#1051510).\n- ALSA: hda/realtek - Enable internal speaker and headset mic of ASUS UX431FL (bsc#1051510).\n- ALSA: hda/realtek - Enable internal speaker of ASUS UX431FLC (git-fixes).\n- ALSA: hda/realtek - Enable the headset-mic on a Xiaomi\u0027s laptop (git-fixes).\n- ALSA: hda/realtek - Fix 2 front mics of codec 0x623 (bsc#1051510).\n- ALSA: hda/realtek - Fix alienware headset mic (bsc#1051510).\n- ALSA: hda/realtek - Fix inverted bass GPIO pin on Acer 8951G (git-fixes).\n- ALSA: hda/realtek - Fix overridden device-specific initialization (bsc#1051510).\n- ALSA: hda/realtek - Fix the problem of two front mics on a ThinkCentre (bsc#1051510).\n- ALSA: hda/realtek - Line-out jack does not work on a Dell AIO (bsc#1051510).\n- ALSA: hda/realtek - Move some alc236 pintbls to fallback table (git-fixes).\n- ALSA: hda/realtek - Move some alc256 pintbls to fallback table (git-fixes).\n- ALSA: hda/realtek - PCI quirk for Medion E4254 (bsc#1051510).\n- ALSA: hda/realtek: Reduce the Headphone static noise on XPS 9350/9360 (bsc#1051510).\n- ALSA: hda/sigmatel - remove unused variable \u0027stac9200_core_init\u0027 (bsc#1051510).\n- ALSA: hda: Add Cometlake-S PCI ID (git-fixes).\n- ALSA: hda: Add Elkhart Lake PCI ID (bsc#1051510).\n- ALSA: hda: Add Tigerlake/Jasperlake PCI ID (bsc#1051510).\n- ALSA: hda: Add support of Zhaoxin controller (bsc#1051510).\n- ALSA: hda: Fix racy display power access (bsc#1156928).\n- ALSA: hda: Flush interrupts on disabling (bsc#1051510).\n- ALSA: hda: Set fifo_size for both playback and capture streams (bsc#1051510).\n- ALSA: hda: hdmi - fix port numbering for ICL and TGL platforms (git-fixes).\n- ALSA: hda: hdmi - remove redundant code comments (git-fixes).\n- ALSA: hda: kabi workaround for generic parser flag (bsc#1051510).\n- ALSA: i2c/cs8427: Fix int to char conversion (bsc#1051510).\n- ALSA: i2c: ak4xxx-adda: Fix a possible null pointer dereference in build_adc_controls() (bsc#1051510).\n- ALSA: ice1724: Fix sleep-in-atomic in Infrasonic Quartet support code (bsc#1051510).\n- ALSA: intel8x0m: Register irq handler after register initializations (bsc#1051510).\n- ALSA: line6: sizeof (byte) is always 1, use that fact (bsc#1051510).\n- ALSA: oxfw: fix return value in error path of isochronous resources reservation (bsc#1051510).\n- ALSA: pcm: Avoid possible info leaks from PCM stream buffers (git-fixes).\n- ALSA: pcm: Fix stream lock usage in snd_pcm_period_elapsed() (git-fixes).\n- ALSA: pcm: Yet another missing check of non-cached buffer type (bsc#1111666).\n- ALSA: pcm: oss: Avoid potential buffer overflows (git-fixes).\n- ALSA: pcm: signedness bug in snd_pcm_plug_alloc() (bsc#1051510).\n- ALSA: seq: Do error checks at creating system ports (bsc#1051510).\n- ALSA: timer: Fix incorrectly assigned timer instance (git-fixes).\n- ALSA: timer: Fix mutex deadlock at releasing card (bsc#1051510).\n- ALSA: usb-audio: Add DSD support for EVGA NU Audio (bsc#1051510).\n- ALSA: usb-audio: Add DSD support for Gustard U16/X26 USB Interface (bsc#1051510).\n- ALSA: usb-audio: Add Hiby device family to quirks for native DSD support (bsc#1051510).\n- ALSA: usb-audio: Add Pioneer DDJ-SX3 PCM quirck (bsc#1051510).\n- ALSA: usb-audio: Add skip_validation option (git-fixes).\n- ALSA: usb-audio: Clean up check_input_term() (bsc#1051510).\n- ALSA: usb-audio: DSD auto-detection for Playback Designs (bsc#1051510).\n- ALSA: usb-audio: Disable quirks for BOSS Katana amplifiers (bsc#1051510).\n- ALSA: usb-audio: Disable quirks for BOSS Katana amplifiers (bsc#1111666).\n- ALSA: usb-audio: Fix Focusrite Scarlett 6i6 gen1 - input handling (git-fixes).\n- ALSA: usb-audio: Fix NULL dereference at parsing BADD (git-fixes).\n- ALSA: usb-audio: Fix copy and paste error in the validator (bsc#1111666).\n- ALSA: usb-audio: Fix incorrect NULL check in create_yamaha_midi_quirk() (git-fixes).\n- ALSA: usb-audio: Fix incorrect size check for processing/extension units (git-fixes).\n- ALSA: usb-audio: Fix missing error check at mixer resolution test (git-fixes).\n- ALSA: usb-audio: Fix possible NULL dereference at create_yamaha_midi_quirk() (bsc#1051510).\n- ALSA: usb-audio: More validations of descriptor units (bsc#1051510).\n- ALSA: usb-audio: Remove superfluous bLength checks (bsc#1051510).\n- ALSA: usb-audio: Simplify parse_audio_unit() (bsc#1051510).\n- ALSA: usb-audio: Skip bSynchAddress endpoint check if it is invalid (bsc#1051510).\n- ALSA: usb-audio: Unify audioformat release code (bsc#1051510).\n- ALSA: usb-audio: Unify the release of usb_mixer_elem_info objects (bsc#1051510).\n- ALSA: usb-audio: Update DSD support quirks for Oppo and Rotel (bsc#1051510).\n- ALSA: usb-audio: fix PCM device order (bsc#1051510).\n- ALSA: usb-audio: fix set_format altsetting sanity check (bsc#1051510).\n- ALSA: usb-audio: not submit urb for stopped endpoint (git-fixes).\n- ALSA: usb-audio: remove some dead code (bsc#1051510).\n- ALSA: usb-audio: sound: usb: usb true/false for bool return type (git-fixes).\n- ASoC: Define a set of DAPM pre/post-up events (bsc#1051510).\n- ASoC: Intel: Baytrail: Fix implicit fallthrough warning (bsc#1051510).\n- ASoC: Intel: Fix use of potentially uninitialized variable (bsc#1051510).\n- ASoC: Intel: NHLT: Fix debug print format (bsc#1051510).\n- ASoC: Intel: hdac_hdmi: Limit sampling rates at dai creation (bsc#1051510).\n- ASoC: Jack: Fix NULL pointer dereference in snd_soc_jack_report (bsc#1051510).\n- ASoC: compress: fix unsigned integer overflow check (bsc#1051510).\n- ASoC: davinci-mcasp: Handle return value of devm_kasprintf (stable 4.14.y).\n- ASoC: davinci: Kill BUG_ON() usage (stable 4.14.y).\n- ASoC: dmaengine: Make the pcm-\u003ename equal to pcm-\u003eid if the name is not set (bsc#1051510).\n- ASoC: dpcm: Properly initialise hw-\u003erate_max (bsc#1051510).\n- ASoC: es8328: Fix copy-paste error in es8328_right_line_controls (bsc#1051510).\n- ASoC: kirkwood: fix external clock probe defer (git-fixes).\n- ASoC: msm8916-wcd-analog: Fix RX1 selection in RDAC2 MUX (git-fixes).\n- ASoC: rsnd: Reinitialize bit clock inversion flag for every format setting (bsc#1051510).\n- ASoC: sgtl5000: Fix charge pump source assignment (bsc#1051510).\n- ASoC: sgtl5000: avoid division by zero if lo_vag is zero (bsc#1051510).\n- ASoC: sun4i-i2s: RX and TX counter registers are swapped (bsc#1051510).\n- ASoC: tegra_sgtl5000: fix device_node refcounting (bsc#1051510).\n- ASoC: tlv320aic31xx: Handle inverted BCLK in non-DSP modes (stable 4.14.y).\n- ASoC: tlv320dac31xx: mark expected switch fall-through (stable 4.14.y).\n- ASoC: wm8737: Fix copy-paste error in wm8737_snd_controls (bsc#1051510).\n- ASoC: wm8962: fix lambda value (git-fixes).\n- ASoC: wm8988: fix typo in wm8988_right_line_controls (bsc#1051510).\n- ASoc: rockchip: i2s: Fix RPM imbalance (bsc#1051510).\n- Add 3 not-needeed commits to blacklist.conf from git-fixes.\n- Add Acer Aspire Ethos 8951G model quirk (bsc#1051510).\n- Add kernel module compression support (bsc#1135854).\n- Add some qedf commits to blacklist file (bsc#1149976).\n- Bluetooth: Fix invalid-free in bcsp_close() (git-fixes).\n- Bluetooth: Fix memory leak in hci_connect_le_scan (bsc#1051510).\n- Bluetooth: L2CAP: Detect if remote is not able to use the whole MPS (bsc#1051510).\n- Bluetooth: btqca: Add a short delay before downloading the NVM (bsc#1051510).\n- Bluetooth: btrtl: Additional Realtek 8822CE Bluetooth devices (bsc#1051510).\n- Bluetooth: btusb: fix PM leak in error case of setup (bsc#1051510).\n- Bluetooth: delete a stray unlock (bsc#1051510).\n- Bluetooth: hci_bcm: Handle specific unknown packets after firmware loading (bsc#1051510).\n- Bluetooth: hci_core: fix init for HCI_USER_CHANNEL (bsc#1051510).\n- Btrfs: add missing extents release on file extent cluster relocation error (bsc#1159483).\n- Btrfs: avoid fallback to transaction commit during fsync of files with holes (bsc#1159569).\n- Btrfs: bail out gracefully rather than BUG_ON (bsc#1153646).\n- Btrfs: check for the full sync flag while holding the inode lock during fsync (bsc#1153713).\n- Btrfs: check for the full sync flag while holding the inode lock during fsync (bsc#1153713).\n- Btrfs: do not abort transaction at btrfs_update_root() after failure to COW path (bsc#1150933).\n- Btrfs: fix assertion failure during fsync and use of stale transaction (bsc#1150562).\n- Btrfs: fix log context list corruption after rename exchange operation (bsc#1156494).\n- Btrfs: fix use-after-free when using the tree modification log (bsc#1151891).\n- CDC-NCM: handle incomplete transfer of MTU (networking-stable-19_11_10).\n- CIFS: Fix SMB2 oplock break processing (bsc#1144333, bsc#1154355).\n- CIFS: Fix oplock handling for SMB 2.1+ protocols (bsc#1144333, bsc#1154355).\n- CIFS: Fix retry mid list corruption on reconnects (bsc#1144333, bsc#1154355).\n- CIFS: Fix use after free of file info structures (bsc#1144333, bsc#1154355).\n- CIFS: Force reval dentry if LOOKUP_REVAL flag is set (bsc#1144333, bsc#1154355).\n- CIFS: Force revalidate inode when dentry is stale (bsc#1144333, bsc#1154355).\n- CIFS: Gracefully handle QueryInfo errors during open (bsc#1144333, bsc#1154355).\n- CIFS: avoid using MID 0xFFFF (bsc#1144333, bsc#1154355).\n- CIFS: fix max ea value size (bsc#1144333, bsc#1154355).\n- Compile nvme.ko as module (bsc#1150846)\n- Disable CONFIG_DEBUG_PAGEALLOC (bsc#1159096).\n- Documentation: debugfs: Document debugfs helper for unsigned long values (git-fixes).\n- Documentation: x86: convert protection-keys.txt to reST (bsc#1078248).\n- Drop an ASoC fix that was reverted in 4.14.y stable\n- Drop multiversion(kernel) from the KMP template (bsc#1127155).\n- EDAC/amd64: Adjust printed chip select sizes when interleaved (bsc#1131489).\n- EDAC/amd64: Cache secondary Chip Select registers (bsc#1131489).\n- EDAC/amd64: Decode syndrome before translating address (bsc#1114279).\n- EDAC/amd64: Decode syndrome before translating address (bsc#1131489).\n- EDAC/amd64: Find Chip Select memory size using Address Mask (bsc#1131489).\n- EDAC/amd64: Initialize DIMM info for systems with more than two channels (bsc#1131489).\n- EDAC/amd64: Recognize DRAM device type ECC capability (bsc#1131489).\n- EDAC/amd64: Recognize x16 symbol size (bsc#1131489).\n- EDAC/amd64: Set maximum channel layer size depending on family (bsc#1131489).\n- EDAC/amd64: Support asymmetric dual-rank DIMMs (bsc#1131489).\n- EDAC/amd64: Support more than two Unified Memory Controllers (bsc#1131489).\n- EDAC/amd64: Support more than two controllers for chip selects handling (bsc#1131489).\n- EDAC/amd64: Use a macro for iterating over Unified Memory Controllers (bsc#1131489).\n- EDAC/ghes: Fix Use after free in ghes_edac remove path (bsc#1114279).\n- EDAC/ghes: Fix locking and memory barrier issues (bsc#1114279). EDAC/ghes: Do not warn when incrementing refcount on 0 (bsc#1114279).\n- HID: Add ASUS T100CHI keyboard dock battery quirks (bsc#1051510).\n- HID: Add quirk for Microsoft PIXART OEM mouse (bsc#1051510).\n- HID: Fix assumption that devices have inputs (git-fixes).\n- HID: apple: Fix stuck function keys when using FN (bsc#1051510).\n- HID: asus: Add T100CHI bluetooth keyboard dock special keys mapping (bsc#1051510).\n- HID: cp2112: prevent sleeping function called from invalid context (bsc#1051510).\n- HID: doc: fix wrong data structure reference for UHID_OUTPUT (bsc#1051510).\n- HID: fix error message in hid_open_report() (bsc#1051510).\n- HID: hidraw: Fix invalid read in hidraw_ioctl (bsc#1051510).\n- HID: intel-ish-hid: fixes incorrect error handling (bsc#1051510).\n- HID: logitech-hidpp: do all FF cleanup in hidpp_ff_destroy() (bsc#1051510).\n- HID: logitech: Fix general protection fault caused by Logitech driver (bsc#1051510).\n- HID: prodikeys: Fix general protection fault during probe (bsc#1051510).\n- HID: sony: Fix memory corruption issue on cleanup (bsc#1051510).\n- HID: wacom: generic: Treat serial number and related fields as unsigned (git-fixes).\n- IB/core, ipoib: Do not overreact to SM LID change event (bsc#1154108)\n- IB/core: Add mitigation for Spectre V1 (bsc#1155671)\n- IB/hfi1: Remove overly conservative VM_EXEC flag check (bsc#1144449).\n- IB/mlx5: Consolidate use_umr checks into single function (bsc#1093205).\n- IB/mlx5: Fix MR re-registration flow to use UMR properly (bsc#1093205).\n- IB/mlx5: Fix steering rule of drop and count (bsc#1103991 ).\n- IB/mlx5: Free mpi in mp_slave mode (bsc#1103991).\n- IB/mlx5: Remove dead code (bsc#1103991).\n- IB/mlx5: Report correctly tag matching rendezvous capability (bsc#1046305).\n- IB/mlx5: Support MLX5_CMD_OP_QUERY_LAG as a DEVX general command (bsc#1103991).\n- Input: cyttsp4_core - fix use after free bug (bsc#1051510).\n- Input: da9063 - fix capability and drop KEY_SLEEP (bsc#1051510).\n- Input: elan_i2c - remove Lenovo Legion Y7000 PnpID (bsc#1051510).\n- Input: ff-memless - kill timer in destroy() (bsc#1051510).\n- Input: goodix - add upside-down quirk for Teclast X89 tablet (bsc#1051510).\n- Input: silead - try firmware reload after unsuccessful resume (bsc#1051510).\n- Input: st1232 - set INPUT_PROP_DIRECT property (bsc#1051510).\n- Input: synaptics - switch another X1 Carbon 6 to RMI/SMbus (bsc#1051510).\n- Input: synaptics-rmi4 - avoid processing unknown IRQs (bsc#1051510).\n- Input: synaptics-rmi4 - clear IRQ enables for F54 (bsc#1051510).\n- Input: synaptics-rmi4 - destroy F54 poller workqueue when removing (bsc#1051510).\n- Input: synaptics-rmi4 - disable the relative position IRQ in the F12 driver (bsc#1051510).\n- Input: synaptics-rmi4 - do not consume more data than we have (F11, F12) (bsc#1051510).\n- Input: synaptics-rmi4 - do not increment rmiaddr for SMBus transfers (bsc#1051510).\n- Input: synaptics-rmi4 - fix video buffer size (git-fixes).\n- KABI protect struct vmem_altmap (bsc#1150305).\n- KVM: MMU: drop vcpu param in gpte_access (bsc#1117665).\n- KVM: PPC: Book3S HV: Check for MMU ready on piggybacked virtual cores (bsc#1061840).\n- KVM: PPC: Book3S HV: Do not lose pending doorbell request on migration on P9 (bsc#1061840).\n- KVM: PPC: Book3S HV: Do not push XIVE context when not using XIVE device (bsc#1061840).\n- KVM: PPC: Book3S HV: Fix lockdep warning when entering the guest (bsc#1061840).\n- KVM: PPC: Book3S HV: Fix race in re-enabling XIVE escalation interrupts (bsc#1061840).\n- KVM: PPC: Book3S HV: Handle virtual mode in XIVE VCPU push code (bsc#1061840).\n- KVM: PPC: Book3S HV: XIVE: Free escalation interrupts before disabling the VP (bsc#1061840).\n- KVM: PPC: Book3S HV: use smp_mb() when setting/clearing host_ipi flag (bsc#1061840).\n- KVM: PPC: Book3S: Fix incorrect guest-to-user-translation error handling (bsc#1061840).\n- KVM: SVM: Guard against DEACTIVATE when performing WBINVD/DF_FLUSH (bsc#1114279).\n- KVM: SVM: Serialize access to the SEV ASID bitmap (bsc#1114279).\n- KVM: VMX: Consider PID.PIR to determine if vCPU has pending interrupts (bsc#1158064).\n- KVM: VMX: Fix conditions for guest IA32_XSS support (bsc#1158065).\n- KVM: X86: Reduce the overhead when lapic_timer_advance is disabled (bsc#1149083).\n- KVM: X86: Reduce the overhead when lapic_timer_advance is disabled (bsc#1149083).\n- KVM: arm/arm64: Clean dcache to PoC when changing PTE due to CoW (jsc#ECO-561,jsc#SLE-10671).\n- KVM: arm/arm64: Detangle kvm_mmu.h from kvm_hyp.h (jsc#ECO-561,jsc#SLE-10671).\n- KVM: arm/arm64: Drop vcpu parameter from guest cache maintenance operartions (jsc#ECO-561,jsc#SLE-10671).\n- KVM: arm/arm64: Limit icache invalidation to prefetch aborts (jsc#ECO-561,jsc#SLE-10671).\n- KVM: arm/arm64: Only clean the dcache on translation fault (jsc#ECO-561,jsc#SLE-10671).\n- KVM: arm/arm64: Preserve Exec permission across R/W permission faults (jsc#ECO-561,jsc#SLE-10671).\n- KVM: arm/arm64: Split dcache/icache flushing (jsc#ECO-561,jsc#SLE-10671).\n- KVM: arm64: Set SCTLR_EL2.DSSBS if SSBD is forcefully disabled and !vhe (jsc#ECO-561).\n- KVM: s390: Do not leak kernel stack data in the KVM_S390_INTERRUPT ioctl (git-fixes).\n- KVM: s390: Test for bad access register and size at the start of S390_MEM_OP (git-fixes).\n- KVM: s390: fix __insn32_query() inline assembly (git-fixes).\n- KVM: s390: vsie: Do not shadow CRYCB when no AP and no keys (git-fixes).\n- KVM: s390: vsie: Return correct values for Invalid CRYCB format (git-fixes).\n- KVM: vmx, svm: always run with EFER.NXE=1 when shadow paging is active (bsc#1117665).\n- KVM: x86/mmu: Take slots_lock when using kvm_mmu_zap_all_fast() (bsc#1158067).\n- KVM: x86: Introduce vcpu-\u003earch.xsaves_enabled (bsc#1158066).\n- KVM: x86: Remove a spurious export of a static function (bsc#1158954).\n- KVM: x86: add tracepoints around __direct_map and FNAME(fetch) (bsc#1117665).\n- KVM: x86: add tracepoints around __direct_map and FNAME(fetch) (bsc#1117665).\n- KVM: x86: adjust kvm_mmu_page member to save 8 bytes (bsc#1117665).\n- KVM: x86: adjust kvm_mmu_page member to save 8 bytes (bsc#1117665).\n- KVM: x86: change kvm_mmu_page_get_gfn BUG_ON to WARN_ON (bsc#1117665).\n- KVM: x86: change kvm_mmu_page_get_gfn BUG_ON to WARN_ON (bsc#1117665).\n- KVM: x86: make FNAME(fetch) and __direct_map more similar (bsc#1117665).\n- KVM: x86: make FNAME(fetch) and __direct_map more similar (bsc#1117665).\n- KVM: x86: remove now unneeded hugepage gfn adjustment (bsc#1117665).\n- KVM: x86: remove now unneeded hugepage gfn adjustment (bsc#1117665).\n- NFC: fdp: fix incorrect free object (networking-stable-19_11_10).\n- NFC: fix attrs checks in netlink interface (bsc#1051510).\n- NFC: nxp-nci: Fix NULL pointer dereference after I2C communication error (git-fixes).\n- NFC: pn533: fix use-after-free and memleaks (bsc#1051510).\n- NFC: st21nfca: fix double free (networking-stable-19_11_10).\n- NFS: Do not interrupt file writeout due to fatal errors (git-fixes).\n- NFS: Do not open code clearing of delegation state (git-fixes).\n- NFS: Ensure O_DIRECT reports an error if the bytes read/written is 0 (git-fixes).\n- NFS: Fix regression whereby fscache errors are appearing on \u0027nofsc\u0027 mounts (git-fixes).\n- NFS: Forbid setting AF_INET6 to \u0027struct sockaddr_in\u0027-\u003esin_family (git-fixes).\n- NFS: Refactor nfs_lookup_revalidate() (git-fixes).\n- NFS: Remove redundant semicolon (git-fixes).\n- NFS4: Fix v4.0 client state corruption when mount (git-fixes).\n- NFSv4.1 - backchannel request should hold ref on xprt (bsc#1152624).\n- NFSv4.1: Again fix a race where CB_NOTIFY_LOCK fails to wake a waiter (git-fixes).\n- NFSv4.1: Fix open stateid recovery (git-fixes).\n- NFSv4.1: Only reap expired delegations (git-fixes).\n- NFSv4/pnfs: Fix a page lock leak in nfs_pageio_resend() (git-fixes).\n- NFSv4: Fix OPEN / CLOSE race (git-fixes).\n- NFSv4: Fix a potential sleep while atomic in nfs4_do_reclaim() (git-fixes).\n- NFSv4: Fix an Oops in nfs4_do_setattr (git-fixes).\n- NFSv4: Fix delegation state recovery (git-fixes).\n- NFSv4: Fix lookup revalidate of regular files (git-fixes).\n- NFSv4: Handle the special Linux file open access mode (git-fixes).\n- NFSv4: Only pass the delegation to setattr if we\u0027re sending a truncate (git-fixes).\n- PCI/ACPI: Correct error message for ASPM disabling (bsc#1051510).\n- PCI/MSI: Fix incorrect MSI-X masking on resume (bsc#1051510).\n- PCI/MSI: Return -ENOSPC from pci_alloc_irq_vectors_affinity() (bsc#1051510).\n- PCI/PM: Clear PCIe PME Status even for legacy power management (bsc#1111666).\n- PCI/PME: Fix possible use-after-free on remove (git-fixes).\n- PCI/PTM: Remove spurious \u0027d\u0027 from granularity message (bsc#1051510).\n- PCI/VPD: Prevent VPD access for Amazon\u0027s Annapurna Labs Root Port (bsc#1152187,bsc#1152525).\n- PCI: Add ACS quirk for Amazon Annapurna Labs root ports (bsc#1152187,bsc#1152525).\n- PCI: Add Amazon\u0027s Annapurna Labs vendor ID (bsc#1152187,bsc#1152525).\n- PCI: Add quirk to disable MSI-X support for Amazon\u0027s Annapurna Labs Root Port (bsc#1152187,bsc#1152525).\n- PCI: Apply Cavium ACS quirk to ThunderX2 and ThunderX3 (bsc#1051510).\n- PCI: Correct pci=resource_alignment parameter example (bsc#1051510).\n- PCI: Fix Intel ACS quirk UPDCR register address (bsc#1051510).\n- PCI: PM: Fix pci_power_up() (bsc#1051510).\n- PCI: al: Add Amazon Annapurna Labs PCIe host controller driver (SLE-9332).\n- PCI: dra7xx: Fix legacy INTD IRQ handling (bsc#1087092).\n- PCI: dwc: Fix find_next_bit() usage (bsc#1051510).\n- PCI: hv: Detect and fix Hyper-V PCI domain number collision (bsc#1150423).\n- PCI: hv: Use bytes 4 and 5 from instance ID as the PCI domain numbers (bsc#1153263).\n- PCI: pciehp: Avoid returning prematurely from sysfs requests (git-fixes).\n- PCI: pciehp: Do not disable interrupt twice on suspend (bsc#1111666).\n- PCI: rcar: Fix missing MACCTLR register setting in initialization sequence (bsc#1051510).\n- PCI: sysfs: Ignore lockdep for remove attribute (git-fixes).\n- PCI: tegra: Enable Relaxed Ordering only for Tegra20 and Tegra30 (git-fixes).\n- PM / AVS: SmartReflex: NULL check before some freeing functions is not needed (bsc#1051510).\n- PM / Domains: Deal with multiple states but no governor in genpd (bsc#1051510).\n- PM / devfreq: Check NULL governor in available_governors_show (git-fixes).\n- PM / devfreq: Lock devfreq in trans_stat_show (git-fixes).\n- PM / devfreq: exynos-bus: Correct clock enable sequence (bsc#1051510).\n- PM / devfreq: passive: Use non-devm notifiers (bsc#1051510).\n- PM / devfreq: passive: fix compiler warning (bsc#1051510).\n- PM / hibernate: Check the success of generating md5 digest before hibernation (bsc#1051510).\n- PM: sleep: Fix possible overflow in pm_system_cancel_wakeup() (bsc#1051510).\n- PNFS fallback to MDS if no deviceid found (git-fixes).\n- RDMA/bnxt_re: Enable SRIOV VF support on Broadcom\u0027s 57500 adapter series (bsc#1154916).\n- RDMA/bnxt_re: Fix chip number validation Broadcom\u0027s Gen P5 series (bsc#1157895).\n- RDMA/bnxt_re: Fix missing le16_to_cpu (bsc#1157895).\n- RDMA/bnxt_re: Fix spelling mistake \u0027missin_resp\u0027 -\u003e \u0027missing_resp\u0027 (bsc#1050244).\n- RDMA/bnxt_re: Fix stat push into dma buffer on gen p5 devices (bsc#1157115)\n- RDMA/efa: Add Amazon EFA driver (jsc#SLE-4805)\n- RDMA/efa: Clear the admin command buffer prior to its submission (git-fixes) Patch was already picked through Amazon driver repo but was not marked with a Git-commit tag\n- RDMA/hns: Add mtr support for mixed multihop addressing (bsc#1104427).\n- RDMA/hns: Add reset process for function-clear (bsc#1155061).\n- RDMA/hns: Bugfix for calculating qp buffer size (bsc#1104427 ).\n- RDMA/hns: Bugfix for filling the sge of srq (bsc#1104427 ).\n- RDMA/hns: Bugfix for qpc/cqc timer configuration (bsc#1104427 bsc#1126206).\n- RDMA/hns: Correct the value of srq_desc_size (bsc#1104427 ).\n- RDMA/hns: Fix an error code in hns_roce_set_user_sq_size() (bsc#1104427).\n- RDMA/hns: Fix comparison of unsigned long variable \u0027end\u0027 with less than zero (bsc#1104427 bsc#1137236).\n- RDMA/hns: Fix to support 64K page for srq (bsc#1104427 ).\n- RDMA/hns: Fix wrong assignment of qp_access_flags (bsc#1104427 ).\n- RDMA/hns: Fixs hw access invalid dma memory error (bsc#1104427 ).\n- RDMA/hns: Fixup qp release bug (bsc#1104427).\n- RDMA/hns: Modify ba page size for cqe (bsc#1104427).\n- RDMA/hns: Prevent memory leaks of eq-\u003ebuf_list (bsc#1104427 ).\n- RDMA/hns: Remove set but not used variable \u0027fclr_write_fail_flag\u0027 (bsc#1104427).\n- RDMA/hns: Remove the some magic number (bsc#1155061).\n- RDMA/hns: Remove unnecessary print message in aeq (bsc#1104427 ).\n- RDMA/hns: Replace magic numbers with #defines (bsc#1104427 ).\n- RDMA/hns: Set reset flag when hw resetting (bsc#1104427 ).\n- RDMA/hns: Use %pK format pointer print (bsc#1104427 ).\n- RDMA/hns: fix inverted logic of readl read and shift (bsc#1104427).\n- RDMA/hns: reset function when removing module (bsc#1104427 ).\n- RDMA/restrack: Track driver QP types in resource tracker (jsc#SLE-4805)\n- RDMA: Fix goto target to release the allocated memory (bsc#1050244).\n- RDMa/hns: Do not stuck in endless timeout loop (bsc#1104427 ).\n- README.BRANCH: Add Denis as branch maintainer\n- README.BRANCH: Removing myself from the maintainer list\n- README.BRANCH: Removing myself from the maintainer list.\n- README.BRANCH: removing myself from the maintainer list\n- Revert \u0027mmc: sdhci: Fix incorrect switch to HS mode\u0027 (bsc#1051510).\n- SUNRPC fix regression in umount of a secure mount (git-fixes).\n- SUNRPC/nfs: Fix return value for nfs4_callback_compound() (git-fixes).\n- SUNRPC: Handle connection breakages correctly in call_status() (git-fixes).\n- UAS: Revert commit 3ae62a42090f (\u0027UAS: fix alignment of scatter/gather segments\u0027).\n- USB: Allow USB device to be warm reset in suspended state (bsc#1051510).\n- USB: adutux: fix NULL-derefs on disconnect (bsc#1142635).\n- USB: adutux: fix interface sanity check (bsc#1051510).\n- USB: adutux: fix use-after-free on disconnect (bsc#1142635).\n- USB: adutux: fix use-after-free on release (bsc#1051510).\n- USB: chaoskey: fix error case of a timeout (git-fixes).\n- USB: chaoskey: fix use-after-free on release (bsc#1051510).\n- USB: core: urb: fix URB structure initialization function (bsc#1051510).\n- USB: documentation: flags on usb-storage versus UAS (bsc#1051510).\n- USB: dummy-hcd: fix power budget for SuperSpeed mode (bsc#1051510).\n- USB: dwc3: debugfs: Properly print/set link state for HS (bsc#1051510).\n- USB: dwc3: do not log probe deferrals; but do log other error codes (bsc#1051510).\n- USB: dwc3: ep0: Clear started flag on completion (bsc#1051510).\n- USB: gadget: Reject endpoints with 0 maxpacket value (bsc#1051510).\n- USB: gadget: pch_udc: fix use after free (bsc#1051510).\n- USB: gadget: u_serial: add missing port entry locking (bsc#1051510).\n- USB: idmouse: fix interface sanity checks (bsc#1051510).\n- USB: iowarrior: fix use-after-free after driver unbind (bsc#1051510).\n- USB: iowarrior: fix use-after-free on disconnect (bsc#1051510).\n- USB: iowarrior: fix use-after-free on release (bsc#1051510).\n- USB: ldusb: fix NULL-derefs on driver unbind (bsc#1051510).\n- USB: ldusb: fix control-message timeout (bsc#1051510).\n- USB: ldusb: fix memleak on disconnect (bsc#1051510).\n- USB: ldusb: fix read info leaks (bsc#1051510).\n- USB: ldusb: fix ring-buffer locking (bsc#1051510).\n- USB: legousbtower: fix a signedness bug in tower_probe() (bsc#1051510).\n- USB: legousbtower: fix deadlock on disconnect (bsc#1142635).\n- USB: legousbtower: fix memleak on disconnect (bsc#1051510).\n- USB: legousbtower: fix open after failed reset request (bsc#1142635).\n- USB: legousbtower: fix potential NULL-deref on disconnect (bsc#1142635).\n- USB: legousbtower: fix slab info leak at probe (bsc#1142635).\n- USB: legousbtower: fix use-after-free on release (bsc#1051510).\n- USB: microtek: fix info-leak at probe (bsc#1142635).\n- USB: misc: appledisplay: fix backlight update_status return code (bsc#1051510).\n- USB: mon: Fix a deadlock in usbmon between mmap and read (bsc#1051510).\n- USB: mtu3: fix dbginfo in qmu_tx_zlp_error_handler (bsc#1051510).\n- USB: serial: fix runtime PM after driver unbind (bsc#1051510).\n- USB: serial: ftdi_sio: add device IDs for Sienna and Echelon PL-20 (bsc#1051510).\n- USB: serial: ftdi_sio: add device IDs for U-Blox C099-F9P (bsc#1051510).\n- USB: serial: io_edgeport: fix epic endpoint lookup (bsc#1051510).\n- USB: serial: keyspan: fix NULL-derefs on open() and write() (bsc#1051510).\n- USB: serial: mos7720: fix remote wakeup (git-fixes).\n- USB: serial: mos7840: add USB ID to support Moxa UPort 2210 (bsc#1051510).\n- USB: serial: mos7840: fix remote wakeup (git-fixes).\n- USB: serial: option: add Telit FN980 compositions (bsc#1051510).\n- USB: serial: option: add support for Cinterion CLS8 devices (bsc#1051510).\n- USB: serial: option: add support for DW5821e with eSIM support (bsc#1051510).\n- USB: serial: option: add support for Foxconn T77W968 LTE modules (bsc#1051510).\n- USB: serial: ti_usb_3410_5052: fix port-close races (bsc#1051510).\n- USB: serial: whiteheat: fix line-speed endianness (bsc#1051510).\n- USB: serial: whiteheat: fix potential slab corruption (bsc#1051510).\n- USB: storage: ums-realtek: Update module parameter description for auto_delink_en (bsc#1051510).\n- USB: storage: ums-realtek: Whitelist auto-delink support (bsc#1051510).\n- USB: uas: heed CAPACITY_HEURISTICS (bsc#1051510).\n- USB: uas: honor flag to avoid CAPACITY16 (bsc#1051510).\n- USB: usb-skeleton: fix NULL-deref on disconnect (bsc#1051510).\n- USB: usb-skeleton: fix runtime PM after driver unbind (bsc#1051510).\n- USB: usb-skeleton: fix use-after-free after driver unbind (bsc#1051510).\n- USB: usbcore: Fix slab-out-of-bounds bug during device reset (bsc#1051510).\n- USB: usblcd: fix I/O after disconnect (bsc#1142635).\n- USB: usblp: fix runtime PM after driver unbind (bsc#1051510).\n- USB: usblp: fix use-after-free on disconnect (bsc#1051510).\n- USB: xhci: Fix build warning seen with CONFIG_PM=n (bsc#1051510).\n- USB: xhci: only set D3hot for pci device (bsc#1051510).\n- USB: yurex: Do not retry on unexpected errors (bsc#1051510).\n- USB: yurex: fix NULL-derefs on disconnect (bsc#1051510).\n- USBIP: add config dependency for SGL_ALLOC (git-fixes).\n- acpi/nfit, device-dax: Identify differentiated memory with a unique numa-node (bsc#1158071).\n- act_mirred: Fix mirred_init_module error handling (bsc#1051510).\n- alarmtimer: Use EOPNOTSUPP instead of ENOTSUPP (bsc#1151680).\n- apparmor: fix unsigned len comparison with less than zero (git-fixes).\n- appledisplay: fix error handling in the scheduled work (git-fixes).\n- appletalk: enforce CAP_NET_RAW for raw sockets (bsc#1051510).\n- ar5523: check NULL before memcpy() in ar5523_cmd() (bsc#1051510).\n- arcnet: provide a buffer big enough to actually receive packets (networking-stable-19_09_30).\n- arm64/cpufeature: Convert hook_lock to raw_spin_lock_t in cpu_enable_ssbs() (jsc#ECO-561).\n- arm64: Add decoding macros for CP15_32 and CP15_64 traps (jsc#ECO-561).\n- arm64: Add part number for Neoverse N1 (jsc#ECO-561).\n- arm64: Add silicon-errata.txt entry for ARM erratum 1188873 (jsc#ECO-561).\n- arm64: Apply ARM64_ERRATUM_1188873 to Neoverse-N1 (jsc#ECO-561).\n- arm64: Fake the IminLine size on systems affected by Neoverse-N1 #1542419 (jsc#ECO-561,jsc#SLE-10671).\n- arm64: Fix mismatched cache line size detection (jsc#ECO-561,jsc#SLE-10671).\n- arm64: Fix silly typo in comment (jsc#ECO-561).\n- arm64: Force SSBS on context switch (jsc#ECO-561).\n- arm64: Handle erratum 1418040 as a superset of erratum 1188873 (jsc#ECO-561). \n- arm64: Introduce sysreg_clear_set() (jsc#ECO-561).\n- arm64: KVM: Add invalidate_icache_range helper (jsc#ECO-561,jsc#SLE-10671).\n- arm64: KVM: PTE/PMD S2 XN bit definition (jsc#ECO-561,jsc#SLE-10671).\n- arm64: Make ARM64_ERRATUM_1188873 depend on COMPAT (jsc#ECO-561).\n- arm64: PCI: Preserve firmware configuration when desired (SLE-9332).\n- arm64: Restrict ARM64_ERRATUM_1188873 mitigation to AArch32 (jsc#ECO-561).\n- arm64: Update config files. (bsc#1156466) Enable HW_RANDOM_OMAP driver and mark driver omap-rng as supported.\n- arm64: arch_timer: Add workaround for ARM erratum 1188873 (jsc#ECO-561). \n- arm64: arch_timer: avoid unused function warning (jsc#ECO-561).\n- arm64: compat: Add CNTFRQ trap handler (jsc#ECO-561).\n- arm64: compat: Add CNTVCT trap handler (jsc#ECO-561).\n- arm64: compat: Add condition code checks and IT advance (jsc#ECO-561).\n- arm64: compat: Add cp15_32 and cp15_64 handler arrays (jsc#ECO-561).\n- arm64: compat: Add separate CP15 trapping hook (jsc#ECO-561).\n- arm64: compat: Workaround Neoverse-N1 #1542419 for compat user-space (jsc#ECO-561,jsc#SLE-10671).\n- arm64: cpu: Move errata and feature enable callbacks closer to callers (jsc#ECO-561).\n- arm64: cpu_errata: Remove ARM64_MISMATCHED_CACHE_LINE_SIZE (jsc#ECO-561,jsc#SLE-10671).\n- arm64: cpufeature: Detect SSBS and advertise to userspace (jsc#ECO-561). \n- arm64: cpufeature: Fix handling of CTR_EL0.IDC field (jsc#ECO-561,jsc#SLE-10671).\n- arm64: cpufeature: Trap CTR_EL0 access only where it is necessary (jsc#ECO-561,jsc#SLE-10671).\n- arm64: cpufeature: ctr: Fix cpu capability check for late CPUs (jsc#ECO-561,jsc#SLE-10671).\n- arm64: entry: Allow handling of undefined instructions from EL1 (jsc#ECO-561).\n- arm64: errata: Hide CTR_EL0.DIC on systems affected by Neoverse-N1 #1542419 (jsc#ECO-561,jsc#SLE-10671).\n- arm64: fix SSBS sanitization (jsc#ECO-561).\n- arm64: force_signal_inject: WARN if called from kernel context (jsc#ECO-561).\n- arm64: kill change_cpacr() (jsc#ECO-561).\n- arm64: kill config_sctlr_el1() (jsc#ECO-561).\n- arm64: move SCTLR_EL{1,2} assertions to asm/sysreg.h (jsc#ECO-561).\n- arm64: ssbd: Add support for PSTATE.SSBS rather than trapping to EL3 (jsc#ECO-561).\n- arm64: ssbd: Drop #ifdefs for PR_SPEC_STORE_BYPASS (jsc#ECO-561).\n- arm: KVM: Add optimized PIPT icache flushing (jsc#ECO-561,jsc#SLE-10671).\n- ata: ep93xx: Use proper enums for directions (bsc#1051510).\n- ath10k: Correct error handling of dma_map_single() (bsc#1111666).\n- ath10k: adjust skb length in ath10k_sdio_mbox_rx_packet (bsc#1111666).\n- ath10k: allocate small size dma memory in ath10k_pci_diag_write_mem (bsc#1111666).\n- ath10k: assign \u0027n_cipher_suites = 11\u0027 for WCN3990 to enable WPA3 (bsc#1111666).\n- ath10k: avoid possible memory access violation (bsc#1111666).\n- ath10k: fix fw crash by moving chip reset after napi disabled (bsc#1051510).\n- ath10k: fix kernel panic by moving pci flush after napi_disable (bsc#1051510).\n- ath10k: fix vdev-start timeout on error (bsc#1051510).\n- ath10k: limit available channels via DT ieee80211-freq-limit (bsc#1051510).\n- ath10k: skip resetting rx filter for WCN3990 (bsc#1111666).\n- ath10k: wmi: disable softirq\u0027s while calling ieee80211_rx (bsc#1051510).\n- ath6kl: Fix off by one error in scan completion (bsc#1051510).\n- ath9k: Fix a locking bug in ath9k_add_interface() (bsc#1051510).\n- ath9k: add back support for using active monitor interfaces for tx99 (bsc#1051510).\n- ath9k: dynack: fix possible deadlock in ath_dynack_node_{de}init (bsc#1051510).\n- ath9k: fix reporting calculated new FFT upper max (bsc#1051510).\n- ath9k: fix tx99 with monitor mode interface (bsc#1051510).\n- ath9k_hw: fix uninitialized variable data (bsc#1051510).\n- atl1e: checking the status of atl1e_write_phy_reg (bsc#1051510).\n- atm: iphase: Fix Spectre v1 vulnerability (networking-stable-19_08_08).\n- audit: Allow auditd to set pid to 0 to end auditing (bsc#1158094).\n- auxdisplay: panel: need to delete scan_timer when misc_register fails in panel_attach (bsc#1051510).\n- ax25: enforce CAP_NET_RAW for raw sockets (bsc#1051510).\n- ax88172a: fix information leak on short answers (bsc#1051510).\n- backlight: lm3639: Unconditionally call led_classdev_unregister (bsc#1051510).\n- bcma: fix incorrect update of BCMA_CORE_PCI_MDIO_DATA (bsc#1051510).\n- blk-flush: do not run queue for requests bypassing flush (bsc#1137959).\n- blk-flush: use blk_mq_request_bypass_insert() (bsc#1137959).\n- blk-mq-sched: decide how to handle flush rq via RQF_FLUSH_SEQ (bsc#1137959).\n- blk-mq: Fix memory leak in blk_mq_init_allocated_queue error handling (bsc#1151610).\n- blk-mq: backport fixes for blk_mq_complete_e_request_sync() (bsc#1145661).\n- blk-mq: do not allocate driver tag upfront for flush rq (bsc#1137959).\n- blk-mq: insert rq with DONTPREP to hctx dispatch list when requeue (bsc#1137959).\n- blk-mq: introduce blk_mq_complete_request_sync() (bsc#1145661).\n- blk-mq: introduce blk_mq_request_completed() (bsc#1149446).\n- blk-mq: introduce blk_mq_tagset_wait_completed_request() (bsc#1149446).\n- blk-mq: kABI fixes for blk-mq.h (bsc#1137959).\n- blk-mq: move blk_mq_put_driver_tag*() into blk-mq.h (bsc#1137959).\n- blk-mq: punt failed direct issue to dispatch list (bsc#1137959).\n- blk-mq: put the driver tag of nxt rq before first one is requeued (bsc#1137959).\n- blk-wbt: Avoid lock contention and thundering herd issue in wbt_wait (bsc#1141543).\n- blk-wbt: abstract out end IO completion handler (bsc#1135873).\n- blk-wbt: fix has-sleeper queueing check (bsc#1135873).\n- blk-wbt: improve waking of tasks (bsc#1135873).\n- blk-wbt: move disable check into get_limit() (bsc#1135873).\n- blk-wbt: use wq_has_sleeper() for wq active check (bsc#1135873).\n- block: add io timeout to sysfs (bsc#1148410).\n- block: do not show io_timeout if driver has no timeout handler (bsc#1148410).\n- block: fix timeout changes for legacy request drivers (bsc#1149446).\n- block: kABI fixes for BLK_EH_DONE renaming (bsc#1142076).\n- block: rename BLK_EH_NOT_HANDLED to BLK_EH_DONE (bsc#1142076).\n- bnx2x: Disable multi-cos feature (networking-stable-19_08_08).\n- bnx2x: Fix VF\u0027s VLAN reconfiguration in reload (bsc#1086323 ).\n- bnxt_en: Add PCI IDs for 57500 series NPAR devices (bsc#1153607).\n- bnxt_en: Fix VNIC clearing logic for 57500 chips (bsc#1104745 ).\n- bnxt_en: Fix to include flow direction in L2 key (bsc#1104745 ).\n- bnxt_en: Improve RX doorbell sequence (bsc#1104745).\n- bnxt_en: Increase timeout for HWRM_DBG_COREDUMP_XX commands (bsc#1104745).\n- bnxt_en: Update firmware interface spec. to 1.10.0.47 (bsc#1157115)\n- bnxt_en: Update firmware interface spec. to 1.10.0.89 (bsc#1157115)\n- bnxt_en: Update firmware interface to 1.10.0.69 (bsc#1157115)\n- bnxt_en: Use correct src_fid to determine direction of the flow (bsc#1104745).\n- bonding/802.3ad: fix link_failure_count tracking (bsc#1137069 bsc#1141013).\n- bonding/802.3ad: fix slave link initialization transition states (bsc#1137069 bsc#1141013).\n- bonding: Add vlan tx offload to hw_enc_features (networking-stable-19_08_21).\n- bonding: fix active-backup transition after link failure (git-fixes).\n- bonding: fix slave stuck in BOND_LINK_FAIL state (networking-stable-19_11_10).\n- bonding: fix state transition issue in link monitoring (networking-stable-19_11_10).\n- bonding: set default miimon value for non-arp modes if not set (bsc#1137069 bsc#1141013).\n- bonding: speed/duplex update at NETDEV_UP event (bsc#1137069 bsc#1141013).\n- bpf, offload: Unlock on error in bpf_offload_dev_create() (bsc#1109837).\n- bpf/stackmap: Fix deadlock with rq_lock in bpf_get_stack() (bsc#1083647).\n- bpf: Fix use after free in subprog\u0027s jited symbol removal (bsc#1109837).\n- bpf: Make use of probe_user_write in probe write helper (bsc#1083647).\n- bpf: fix BTF limits (bsc#1109837).\n- bpf: fix BTF verification of enums (bsc#1109837).\n- bpf: fix use after free in prog symbol exposure (bsc#1083647).\n- bpf: skmsg, fix potential psock NULL pointer dereference (bsc#1109837).\n- brcmfmac: fix full timeout waiting for action frame on-channel tx (bsc#1051510).\n- brcmfmac: fix wrong strnchr usage (bsc#1111666).\n- brcmfmac: increase buffer for obtaining firmware capabilities (bsc#1111666).\n- brcmfmac: reduce timeout for action frame scan (bsc#1051510).\n- brcmfmac: sdio: Disable auto-tuning around commands expected to fail (bsc#1111666).\n- brcmfmac: sdio: Do not tune while the card is off (bsc#1111666).\n- brcmfmac: set F2 watermark to 256 for 4373 (bsc#1111666).\n- brcmfmac: set SDIO F1 MesBusyCtrl for CYW4373 (bsc#1111666).\n- brcmsmac: AP mode: update beacon when TIM changes (bsc#1051510).\n- brcmsmac: Use kvmalloc() for ucode allocations (bsc#1111666).\n- brcmsmac: never log \u0027tid x is not agg\u0027able\u0027 by default (bsc#1051510).\n- bridge/mdb: remove wrong use of NLM_F_MULTI (networking-stable-19_09_15).\n- btrfs: Ensure btrfs_init_dev_replace_tgtdev sees up to date values (bsc#1154651).\n- btrfs: Ensure replaced device does not have pending chunk allocation (bsc#1154607).\n- btrfs: Ensure we trim ranges across block group boundary (bsc#1151910).\n- btrfs: block-group: Fix a memory leak due to missing btrfs_put_block_group() (bsc#1155178).\n- btrfs: harden agaist duplicate fsid on scanned devices (bsc#1134973).\n- btrfs: qgroup: Always free PREALLOC META reserve in btrfs_delalloc_release_extents() (bsc#1155179).\n- btrfs: qgroup: Fix reserved data space leak if we have multiple reserve calls (bsc#1152975).\n- btrfs: qgroup: Fix the wrong target io_tree when freeing reserved data space (bsc#1152974).\n- btrfs: relocation: fix use-after-free on dead relocation roots (bsc#1152972).\n- btrfs: remove wrong use of volume_mutex from btrfs_dev_replace_start (bsc#1154651).\n- btrfs: simplify inode locking for RWF_NOWAIT (git-fixes).\n- btrfs: tracepoints: Fix bad entry members of qgroup events (bsc#1155186).\n- btrfs: tracepoints: Fix wrong parameter order for qgroup events (bsc#1155184).\n- btrfs: volumes: Use more straightforward way to calculate map length (bsc#1151910).\n- can: c_can: D_CAN: c_can_chip_config(): perform a sofware reset on open (bsc#1051510).\n- can: c_can: c_can_poll(): only read status register after status IRQ (git-fixes).\n- can: dev: call netif_carrier_off() in register_candev() (bsc#1051510).\n- can: mcba_usb: fix use-after-free on disconnect (git-fixes).\n- can: mcp251x: mcp251x_hw_reset(): allow more time after a reset (bsc#1051510).\n- can: peak_usb: fix a potential out-of-sync while decoding packets (git-fixes).\n- can: peak_usb: fix slab info leak (git-fixes).\n- can: peak_usb: report bus recovery as well (bsc#1051510).\n- can: rx-offload: can_rx_offload_irq_offload_fifo(): continue on error (bsc#1051510).\n- can: rx-offload: can_rx_offload_irq_offload_timestamp(): continue on error (bsc#1051510).\n- can: rx-offload: can_rx_offload_offload_one(): do not increase the skb_queue beyond skb_queue_len_max (git-fixes).\n- can: rx-offload: can_rx_offload_offload_one(): increment rx_fifo_errors on queue overflow or OOM (bsc#1051510).\n- can: rx-offload: can_rx_offload_offload_one(): use ERR_PTR() to propagate error value in case of errors (bsc#1051510).\n- can: rx-offload: can_rx_offload_queue_sorted(): fix error handling, avoid skb mem leak (git-fixes).\n- can: rx-offload: can_rx_offload_queue_tail(): fix error handling, avoid skb mem leak (git-fixes).\n- can: slcan: Fix use-after-free Read in slcan_open (bsc#1051510).\n- can: usb_8dev: fix use-after-free on disconnect (git-fixes).\n- can: xilinx_can: xcan_probe(): skip error message on deferred probe (bsc#1051510).\n- cdc_ether: fix rndis support for Mediatek based smartphones (networking-stable-19_09_15).\n- cdc_ncm: fix divide-by-zero caused by invalid wMaxPacketSize (bsc#1051510).\n- ceph: add missing check in d_revalidate snapdir handling (bsc#1157183).\n- ceph: do not try to handle hashed dentries in non-O_CREAT atomic_open (bsc#1157184).\n- ceph: fix directories inode i_blkbits initialization (bsc#1153717).\n- ceph: fix use-after-free in __ceph_remove_cap() (bsc#1154058).\n- ceph: just skip unrecognized info in ceph_reply_info_extra (bsc#1157182).\n- ceph: reconnect connection if session hang in opening state (bsc#1153718).\n- ceph: update the mtime when truncating up (bsc#1153719).\n- ceph: use ceph_evict_inode to cleanup inode\u0027s resource (bsc#1148133).\n- cfg80211: Avoid regulatory restore when COUNTRY_IE_IGNORE is set (bsc#1051510).\n- cfg80211: Prevent regulatory restore during STA disconnect in concurrent interfaces (bsc#1051510).\n- cfg80211: Purge frame registrations on iftype change (bsc#1051510).\n- cfg80211: add and use strongly typed element iteration macros (bsc#1051510).\n- cfg80211: call disconnect_wk when AP stops (bsc#1051510).\n- cfg80211: validate wmm rule when setting (bsc#1111666).\n- cgroup,writeback: do not switch wbs immediately on dead wbs if the memcg is dead (bsc#1158645).\n- cifs: Fix cifsInodeInfo lock_sem deadlock when reconnect occurs (bsc#1144333, bsc#1154355).\n- cifs: Fix missed free operations (bsc#1144333, bsc#1154355).\n- cifs: Use kzfree() to zero out the password (bsc#1144333, bsc#1154355).\n- cifs: add a helper to find an existing readable handle to a file (bsc#1144333, bsc#1154355).\n- cifs: create a helper to find a writeable handle by path name (bsc#1144333, bsc#1154355).\n- cifs: handle netapp error codes (bsc#1136261).\n- cifs: move cifsFileInfo_put logic into a work-queue (bsc#1144333, bsc#1154355).\n- cifs: prepare SMB2_Flush to be usable in compounds (bsc#1144333, bsc#1154355).\n- cifs: set domainName when a domain-key is used in multiuser (bsc#1144333, bsc#1154355).\n- cifs: use cifsInodeInfo-\u003eopen_file_lock while iterating to avoid a panic (bsc#1144333, bsc#1154355).\n- cifs: use existing handle for compound_op(OP_SET_INFO) when possible (bsc#1144333, bsc#1154355).\n- clk: at91: avoid sleeping early (git-fixes).\n- clk: at91: fix update bit maps on CFG_MOR write (bsc#1051510).\n- clk: at91: select parent if main oscillator or bypass is enabled (bsc#1051510).\n- clk: pxa: fix one of the pxa RTC clocks (bsc#1051510).\n- clk: qoriq: Fix -Wunused-const-variable (bsc#1051510).\n- clk: samsung: Use clk_hw API for calling clk framework from clk notifiers (bsc#1051510).\n- clk: samsung: exynos5420: Preserve CPU clocks configuration during suspend/resume (bsc#1051510).\n- clk: samsung: exynos5420: Preserve PLL configuration during suspend/resume (git-fixes).\n- clk: sirf: Do not reference clk_init_data after registration (bsc#1051510).\n- clk: sunxi-ng: a80: fix the zero\u0027ing of bits 16 and 18 (git-fixes).\n- clk: sunxi-ng: v3s: add missing clock slices for MMC2 module clocks (bsc#1051510).\n- clk: sunxi-ng: v3s: add the missing PLL_DDR1 (bsc#1051510).\n- clk: zx296718: Do not reference clk_init_data after registration (bsc#1051510).\n- clocksource/drivers/sh_cmt: Fix clocksource width for 32-bit machines (bsc#1051510).\n- clocksource/drivers/sh_cmt: Fixup for 64-bit machines (bsc#1051510).\n- compat_ioctl: handle SIOCOUTQNSD (bsc#1051510).\n- component: fix loop condition to call unbind() if bind() fails (bsc#1051510).\n- config: arm64: enable erratum 1418040 and 1542419\n- configfs_register_group() shouldn\u0027t be (and isn\u0027t) called in rmdirable parts (bsc#1051510).\n- cpufreq/pasemi: fix use-after-free in pas_cpufreq_cpu_init() (bsc#1051510).\n- cpufreq: Skip cpufreq resume if it\u0027s not suspended (bsc#1051510).\n- cpufreq: intel_pstate: Register when ACPI PCCH is present (bsc#1051510).\n- cpufreq: powernv: fix stack bloat and hard limit on number of CPUs (bsc#1051510).\n- cpufreq: ti-cpufreq: add missing of_node_put() (bsc#1051510).\n- cpupower : Fix cpupower working when cpu0 is offline (bsc#1051510).\n- cpupower : frequency-set -r option misses the last cpu in related cpu list (bsc#1051510).\n- cpupower: Fix coredump on VMWare (bsc#1051510).\n- crypto: DRBG - add FIPS 140-2 CTRNG for noise source (bsc#1155334).\n- crypto: af_alg - Fix race around ctx-\u003ercvused by making it atomic_t (bsc#1154737).\n- crypto: af_alg - Initialize sg_num_bytes in error code path (bsc#1051510).\n- crypto: af_alg - cast ki_complete ternary op to int (bsc#1051510).\n- crypto: af_alg - consolidation of duplicate code (bsc#1154737).\n- crypto: af_alg - fix race accessing cipher request (bsc#1154737).\n- crypto: af_alg - remove locking in async callback (bsc#1154737).\n- crypto: af_alg - update correct dst SGL entry (bsc#1051510).\n- crypto: af_alg - wait for data at beginning of recvmsg (bsc#1154737).\n- crypto: algif - return error code when no data was processed (bsc#1154737).\n- crypto: algif_aead - copy AAD from src to dst (bsc#1154737).\n- crypto: algif_aead - fix reference counting of null skcipher (bsc#1154737).\n- crypto: algif_aead - overhaul memory management (bsc#1154737).\n- crypto: algif_aead - skip SGL entries with NULL page (bsc#1154737).\n- crypto: algif_skcipher - overhaul memory management (bsc#1154737).\n- crypto: caam - fix concurrency issue in givencrypt descriptor (bsc#1051510).\n- crypto: caam - free resources in case caam_rng registration failed (bsc#1051510).\n- crypto: caam/qi - fix error handling in ERN handler (bsc#1111666).\n- crypto: cavium/zip - Add missing single_release() (bsc#1051510).\n- crypto: ccp - Reduce maximum stack usage (bsc#1051510).\n- crypto: ccp - fix uninitialized list head (bsc#1051510).\n- crypto: crypto4xx - fix double-free in crypto4xx_destroy_sdr (bsc#1051510).\n- crypto: dh - add public key verification test (bsc#1155331).\n- crypto: dh - fix calculating encoded key size (bsc#1155331).\n- crypto: dh - fix memory leak (bsc#1155331).\n- crypto: dh - update test for public key verification (bsc#1155331).\n- crypto: ecdh - add public key verification test (bsc#1155331).\n- crypto: ecdh - fix big endian bug in ECC library (bsc#1051510).\n- crypto: ecdh - fix typo of P-192 b value (bsc#1155331).\n- crypto: fix a memory leak in rsa-kcs1pad\u0027s encryption mode (bsc#1051510).\n- crypto: geode-aes - switch to skcipher for cbc(aes) fallback (bsc#1051510).\n- crypto: mxc-scc - fix build warnings on ARM64 (bsc#1051510).\n- crypto: mxs-dcp - Fix AES issues (bsc#1051510).\n- crypto: mxs-dcp - Fix SHA null hashes and output length (bsc#1051510).\n- crypto: mxs-dcp - make symbols \u0027sha1_null_hash\u0027 and \u0027sha256_null_hash\u0027 static (bsc#1051510).\n- crypto: qat - Silence smp_processor_id() warning (bsc#1051510).\n- crypto: s5p-sss: Fix Fix argument list alignment (bsc#1051510).\n- crypto: skcipher - Unmap pages after an external error (bsc#1051510).\n- crypto: talitos - fix missing break in switch statement (bsc#1142635).\n- crypto: tgr192 - remove unneeded semicolon (bsc#1051510).\n- cw1200: Fix a signedness bug in cw1200_load_firmware() (bsc#1051510).\n- cx82310_eth: fix a memory leak bug (bsc#1051510).\n- cxgb4: Signedness bug in init_one() (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).\n- cxgb4: do not dma memory off of the stack (bsc#1152790).\n- cxgb4: fix endianness for vlan value in cxgb4_tc_flower (bsc#1064802 bsc#1066129).\n- cxgb4: fix panic when attaching to ULD fail (networking-stable-19_11_05).\n- cxgb4: offload VLAN flows regardless of VLAN ethtype (bsc#1064802 bsc#1066129).\n- cxgb4: reduce kernel stack usage in cudbg_collect_mem_region() (bsc#1073513).\n- cxgb4: request the TX CIDX updates to status page (bsc#1127354 bsc#1127371).\n- cxgb4: request the TX CIDX updates to status page (bsc#1127371).\n- cxgb4: smt: Add lock for atomic_dec_and_test (bsc#1064802 bsc#1066129).\n- cxgb4:Fix out-of-bounds MSI-X info array access (networking-stable-19_10_05).\n- dasd_fba: Display \u002700000000\u0027 for zero page when dumping sense (bsc#1123080).\n- dccp: do not leak jiffies on the wire (networking-stable-19_11_05).\n- dlm: do not leak kernel pointer to userspace (bsc#1051510).\n- dlm: fix invalid free (bsc#1051510).\n- dma-buf/sw_sync: Synchronize signal vs syncpt free (bsc#1111666).\n- dma-buf: Fix memory leak in sync_file_merge() (git-fixes).\n- dmaengine: bcm2835: Print error in case setting DMA mask fails (bsc#1051510).\n- dmaengine: dma-jz4780: Do not depend on MACH_JZ4780 (bsc#1051510).\n- dmaengine: dma-jz4780: Further residue status fix (bsc#1051510).\n- dmaengine: dw: platform: Switch to acpi_dma_controller_register() (bsc#1051510).\n- dmaengine: ep93xx: Return proper enum in ep93xx_dma_chan_direction (bsc#1051510).\n- dmaengine: imx-sdma: fix size check for sdma script_number (bsc#1051510).\n- dmaengine: imx-sdma: fix use-after-free on probe error path (bsc#1051510).\n- dmaengine: iop-adma.c: fix printk format warning (bsc#1051510).\n- dmaengine: rcar-dmac: set scatter/gather max segment size (bsc#1051510).\n- dmaengine: timb_dma: Use proper enum in td_prep_slave_sg (bsc#1051510).\n- docs: move protection-keys.rst to the core-api book (bsc#1078248).\n- drivers/base/platform.c: kmemleak ignore a known leak (bsc#1051510).\n- drivers/regulator: fix a missing check of return value (bsc#1051510).\n- drivers: thermal: int340x_thermal: Fix sysfs race condition (bsc#1051510).\n- drm/amd/display: Restore backlight brightness after system resume (bsc#1112178)\n- drm/amd/display: fix issue where 252-255 values are clipped (bsc#1111666).\n- drm/amd/display: fix odm combine pipe reset (bsc#1111666).\n- drm/amd/display: reprogram VM config when system resume (bsc#1111666).\n- drm/amd/display: support spdif (bsc#1111666).\n- drm/amd/dm: Understand why attaching path/tile properties are needed (bsc#1111666).\n- drm/amd/powerplay/smu7: enforce minimal VBITimeout (v2) (bsc#1051510).\n- drm/amd/powerplay: issue no PPSMC_MSG_GetCurrPkgPwr on unsupported (bsc#1113956)\n- drm/amd/pp: Fix truncated clock value when set watermark (bsc#1111666).\n- drm/amdgpu/gfx9: Update gfx9 golden settings (bsc#1111666).\n- drm/amdgpu/powerplay/vega10: allow undervolting in p7 (bsc#1111666).\n- drm/amdgpu/si: fix ASIC tests (git-fixes).\n- drm/amdgpu: Add APTX quirk for Dell Latitude 5495 (bsc#1142635)\n- drm/amdgpu: Check for valid number of registers to read (bsc#1051510).\n- drm/amdgpu: Fix KFD-related kernel oops on Hawaii (bsc#1111666).\n- drm/amdgpu: Update gc_9_0 golden settings (bsc#1111666).\n- drm/amdgpu: fix bad DMA from INTERRUPT_CNTL2 (bsc#1111666).\n- drm/amdgpu: fix bad DMA from INTERRUPT_CNTL2 (bsc#1114279)\n- drm/amdgpu: fix memory leak (bsc#1111666).\n- drm/amdkfd: Add missing Polaris10 ID (bsc#1111666).\n- drm/amdkfd: fix a use after free race with mmu_notifer unregister (bsc#1154048)\n- drm/ast: Fixed reboot test may cause system hanged (bsc#1051510).\n- drm/atomic_helper: Allow DPMS On/Off changes for unregistered connectors (bsc#1111666).\n- drm/atomic_helper: Disallow new modesets on unregistered connectors (bsc#1111666).\n- drm/atomic_helper: Stop modesets on unregistered connectors harder (bsc#1111666).\n- drm/bridge: tc358767: Increase AUX transfer length limit (bsc#1051510).\n- drm/bridge: tfp410: fix memleak in get_modes() (bsc#1111666).\n- drm/edid: Add 6 bpc quirk for SDC panel in Lenovo G50 (bsc#1051510).\n- drm/etnaviv: fix dumping of iommuv2 (bsc#1113722)\n- drm/i915/cmdparser: Add support for backward jumps (bsc#1135967)\n- drm/i915/cmdparser: Ignore Length operands during (bsc#1135967)\n- drm/i915/cmdparser: Ignore Length operands during command matching (bsc#1135967)\n- drm/i915/cmdparser: Use explicit goto for error paths (bsc#1135967)\n- drm/i915/cml: Add second PCH ID for CMP (bsc#1111666).\n- drm/i915/gen8+: Add RC6 CTX corruption WA (bsc#1135967)\n- drm/i915/gtt: Add read only pages to gen8_pte_encode (bsc#1135967)\n- drm/i915/gtt: Disable read-only support under GVT (bsc#1135967)\n- drm/i915/gtt: Read-only pages for insert_entries on bdw (bsc#1135967)\n- drm/i915/gvt: fix dropping obj reference twice (bsc#1111666).\n- drm/i915/gvt: update vgpu workload head pointer correctly (bsc#1112178)\n- drm/i915/ilk: Fix warning when reading emon_status with no output (bsc#1111666).\n- drm/i915/pmu: \u0027Frequency\u0027 is reported as accumulated cycles (bsc#1112178)\n- drm/i915: Add gen9 BCS cmdparsing (bsc#1135967)\n- drm/i915: Add support for mandatory cmdparsing (bsc#1135967)\n- drm/i915: Allow parsing of unsized batches (bsc#1135967)\n- drm/i915: Cleanup gt powerstate from gem (bsc#1111666).\n- drm/i915: Disable Secure Batches for gen6+ (bsc#1135967)\n- drm/i915: Do not deballoon unused ggtt drm_mm_node in linux guest (bsc#1142635)\n- drm/i915: Do not dereference request if it may have been retired when (bsc#1142635)\n- drm/i915: Fix and improve MCR selection logic (bsc#1112178)\n- drm/i915: Fix intel_dp_mst_best_encoder() (bsc#1111666).\n- drm/i915: Fix various tracepoints for gen2 (bsc#1113722)\n- drm/i915: Lock the engine while dumping the active request (bsc#1142635)\n- drm/i915: Lower RM timeout to avoid DSI hard hangs (bsc#1135967)\n- drm/i915: Prevent writing into a read-only object via a GGTT mmap (bsc#1135967)\n- drm/i915: Reacquire priolist cache after dropping the engine lock (bsc#1129770)\n- drm/i915: Remove Master tables from cmdparser (bsc#1135967)\n- drm/i915: Rename gen7 cmdparser tables (bsc#1135967)\n- drm/i915: Restore relaxed padding (OCL_OOB_SUPPRES_ENABLE) for skl+ (bsc#1142635)\n- drm/i915: Restore sane defaults for KMS on GEM error load (bsc#1111666).\n- drm/i915: Skip modeset for cdclk changes if possible (bsc#1156928).\n- drm/i915: Support ro ppgtt mapped cmdparser shadow (bsc#1135967)\n- drm/i915: Support ro ppgtt mapped cmdparser shadow buffers (bsc#1135967)\n- drm/imx: Drop unused imx-ipuv3-crtc.o build (bsc#1113722)\n- drm/mediatek: set DMA max segment size (bsc#1111666).\n- drm/msm/dpu: handle failures while initializing displays (bsc#1111666).\n- drm/msm/dsi: Fix return value check for clk_get_parent (bsc#1111666).\n- drm/msm/dsi: Implement reset correctly (bsc#1051510).\n- drm/msm/dsi: Implement reset correctly (bsc#1154048)\n- drm/msm: fix memleak on release (bsc#1111666).\n- drm/msm: include linux/sched/task.h (bsc#1112178)\n- drm/nouveau/disp/nv50-: fix center/aspect-corrected scaling (bsc#1111666).\n- drm/nouveau/kms/nv50-: Do not create MSTMs for eDP connectors (bsc#1112178)\n- drm/nouveau/volt: Fix for some cards having 0 maximum voltage (bsc#1111666).\n- drm/omap: fix max fclk divider for omap36xx (bsc#1111666).\n- drm/omap: fix max fclk divider for omap36xx (bsc#1113722)\n- drm/panel: check failure cases in the probe func (bsc#1111666).\n- drm/panel: make drm_panel.h self-contained (bsc#1111666).\n- drm/panel: simple: fix AUO g185han01 horizontal blanking (bsc#1051510).\n- drm/radeon: Bail earlier when radeon.cik_/si_support=0 is passed (bsc#1111666).\n- drm/radeon: Fix EEH during kexec (bsc#1051510).\n- drm/radeon: fix bad DMA from INTERRUPT_CNTL2 (git-fixes).\n- drm/radeon: fix si_enable_smc_cac() failed issue (bsc#1113722)\n- drm/rockchip: Check for fast link training before enabling psr (bsc#1111666).\n- drm/rockchip: Round up _before_ giving to the clock framework (bsc#1114279)\n- drm/stm: attach gem fence to atomic state (bsc#1111666).\n- drm/tilcdc: Register cpufreq notifier after we have initialized crtc (bsc#1051510).\n- drm/vmwgfx: Fix double free in vmw_recv_msg() (bsc#1051510).\n- drm: Flush output polling on shutdown (bsc#1051510).\n- drm: add __user attribute to ptr_to_compat() (bsc#1111666).\n- drm: fix module name in edid_firmware log message (bsc#1113956)\n- drm: meson: venc: cvbs: fix CVBS mode matching (bsc#1051510).\n- drm: panel-lvds: Potential Oops in probe error handling (bsc#1114279)\n- drm: panel-orientation-quirks: Add extra quirk table entry for GPD MicroPC (bsc#1111666).\n- drm: rcar-du: lvds: Fix bridge_to_rcar_lvds (bsc#1111666).\n- e1000e: Add support for Comet Lake (bsc#1158533).\n- e1000e: Add support for Tiger Lake (bsc#1158533).\n- e1000e: Drop unnecessary __E1000_DOWN bit twiddling (bsc#1158049).\n- e1000e: Increase pause and refresh time (bsc#1158533).\n- e1000e: Use dev_get_drvdata where possible (bsc#1158049).\n- e1000e: Use rtnl_lock to prevent race conditions between net and pci/pm (bsc#1158049).\n- e1000e: add workaround for possible stalled packet (bsc#1051510).\n- e100: Fix passing zero to \u0027PTR_ERR\u0027 warning in e100_load_ucode_wait (bsc#1051510).\n- ecryptfs_lookup_interpose(): lower_dentry-\u003ed_inode is not stable (bsc#1158646).\n- ecryptfs_lookup_interpose(): lower_dentry-\u003ed_parent is not stable either (bsc#1158647).\n- eeprom: at24: make spd world-readable again (git-fixes).\n- efi/arm: Show SMBIOS bank/device location in CPER and GHES error logs (bsc#1152033).\n- efi/memattr: Do not bail on zero VA if it equals the region\u0027s PA (bsc#1051510).\n- efi: cper: print AER info of PCIe fatal error (bsc#1051510).\n- efivar/ssdt: Do not iterate over EFI vars if no SSDT override was specified (bsc#1051510).\n- ext4: fix punch hole for inline_data file systems (bsc#1158640).\n- ext4: fix warning inside ext4_convert_unwritten_extents_endio (bsc#1152025).\n- ext4: set error return correctly when ext4_htree_store_dirent fails (bsc#1152024).\n- ext4: update direct I/O read lock pattern for IOCB_NOWAIT (bsc#1158639).\n- extcon: cht-wc: Return from default case to avoid warnings (bsc#1051510).\n- fbdev: sbuslib: integer overflow in sbusfb_ioctl_helper() (bsc#1051510).\n- fbdev: sbuslib: use checked version of put_user() (bsc#1051510).\n- firmware: dmi: Fix unlikely out-of-bounds read in save_mem_devices (git-fixes).\n- fix SCTP regression (bsc#1158082)\n- floppy: fix usercopy direction (bsc#1111666).\n- ftrace: Introduce PERMANENT ftrace_ops flag (bsc#1120853).\n- genirq: Prevent NULL pointer dereference in resend_irqs() (bsc#1051510).\n- genirq: Properly pair kobject_del() with kobject_add() (bsc#1051510).\n- gpio: Move gpiochip_lock/unlock_as_irq to gpio/driver.h (bsc#1051510).\n- gpio: fix line flag validation in lineevent_create (bsc#1051510).\n- gpio: fix line flag validation in linehandle_create (bsc#1051510).\n- gpio: mpc8xxx: Do not overwrite default irq_set_type callback (bsc#1051510).\n- gpio: syscon: Fix possible NULL ptr usage (bsc#1051510).\n- gpiolib: acpi: Add Terra Pad 1061 to the run_edge_events_on_boot_blacklist (bsc#1051510).\n- gpiolib: acpi: Add gpiolib_acpi_run_edge_events_on_boot option and blacklist (bsc#1051510).\n- gpiolib: only check line handle flags once (bsc#1051510).\n- gpu: drm: radeon: Fix a possible null-pointer dereference in radeon_connector_set_property() (bsc#1051510).\n- gsmi: Fix bug in append_to_eventlog sysfs handler (bsc#1051510).\n- hso: fix NULL-deref on tty open (bsc#1051510).\n- hwmon: (acpi_power_meter) Change log level for \u0027unsafe software power cap\u0027 (bsc#1051510).\n- hwmon: (ina3221) Fix INA3221_CONFIG_MODE macros (bsc#1051510).\n- hwmon: (lm75) Fix write operations for negative temperatures (bsc#1051510).\n- hwmon: (pwm-fan) Silence error on probe deferral (bsc#1051510).\n- hwmon: (shtc1) fix shtc1 and shtw1 id mask (bsc#1051510).\n- hwrng: core - do not wait on add_early_randomness() (git-fixes).\n- hwrng: omap - Fix RNG wait loop timeout (bsc#1051510).\n- hwrng: omap3-rom - Call clk_disable_unprepare() on exit only if not idled (bsc#1051510).\n- hwrng: stm32 - fix unbalanced pm_runtime_enable (bsc#1051510).\n- hyperv: set nvme msi interrupts to unmanaged (jsc#SLE-8953, jsc#SLE-9221, jsc#SLE-4941, bsc#1119461, bsc#1119465, bsc#1138190, bsc#1154905).\n- hypfs: Fix error number left in struct pointer member (bsc#1051510).\n- i2c: designware: Synchronize IRQs when unregistering slave client (bsc#1111666).\n- i2c: emev2: avoid race when unregistering slave client (bsc#1051510).\n- i2c: of: Try to find an I2C adapter matching the parent (bsc#1129770)\n- i2c: piix4: Fix port selection for AMD Family 16h Model 30h (bsc#1051510).\n- i2c: riic: Clear NACK in tend isr (bsc#1051510).\n- i40e: Add support for X710 device (bsc#1151067).\n- i40e: enable X710 support (bsc#1151067).\n- ibmveth: Detect unsupported packets before sending to the hypervisor (bsc#1159484 ltc#182983).\n- ibmvnic: Bound waits for device queries (bsc#1155689 ltc#182047).\n- ibmvnic: Bound waits for device queries (bsc#1155689 ltc#182047).\n- ibmvnic: Do not process reset during or after device removal (bsc#1149652 ltc#179635).\n- ibmvnic: Fix completion structure initialization (bsc#1155689 ltc#182047).\n- ibmvnic: Fix completion structure initialization (bsc#1155689 ltc#182047).\n- ibmvnic: Serialize device queries (bsc#1155689 ltc#182047).\n- ibmvnic: Serialize device queries (bsc#1155689 ltc#182047).\n- ibmvnic: Terminate waiting device threads after loss of service (bsc#1155689 ltc#182047).\n- ibmvnic: Terminate waiting device threads after loss of service (bsc#1155689 ltc#182047).\n- ice: fix potential infinite loop because loop counter being too small (bsc#1118661).\n- ice: fix stack leakage (bsc#1118661).\n- idr: Fix idr_alloc_u32 on 32-bit systems (bsc#1051510).\n- ieee802154: atusb: fix use-after-free at disconnect (bsc#1051510).\n- ieee802154: ca8210: prevent memory leak (bsc#1051510).\n- ieee802154: enforce CAP_NET_RAW for raw sockets (bsc#1051510).\n- ife: error out when nla attributes are empty (networking-stable-19_08_08).\n- iio: adc: ad799x: fix probe error handling (bsc#1051510).\n- iio: adc: max9611: explicitly cast gain_selectors (bsc#1051510).\n- iio: adc: stm32-adc: fix stopping dma (git-fixes).\n- iio: dac: ad5380: fix incorrect assignment to val (bsc#1051510).\n- iio: dac: mcp4922: fix error handling in mcp4922_write_raw (bsc#1051510).\n- iio: imu: adis16480: assign bias value only if operation succeeded (git-fixes).\n- iio: imu: adis16480: make sure provided frequency is positive (git-fixes).\n- iio: imu: adis: assign read val in debugfs hook only if op successful (git-fixes).\n- iio: imu: adis: assign value only if return code zero in read funcs (git-fixes).\n- iio: light: opt3001: fix mutex unlock race (bsc#1051510).\n- ima: always return negative code for error (bsc#1051510).\n- include/linux/bitrev.h: fix constant bitrev (bsc#1114279).\n- inet: stop leaking jiffies on the wire (networking-stable-19_11_05).\n- integrity: prevent deadlock during digsig verification (bsc#1090631).\n- intel_th: Fix a double put_device() in error path (git-fixes).\n- intel_th: pci: Add Tiger Lake support (bsc#1051510).\n- intel_th: pci: Add support for another Lewisburg PCH (bsc#1051510).\n- iomap: Fix pipe page leakage during splicing (bsc#1158651).\n- iommu/amd: Apply the same IVRS IOAPIC workaround to Acer Aspire A315-41 (bsc#1137799).\n- iommu/amd: Check PM_LEVEL_SIZE() condition in locked section (bsc#1154608).\n- iommu/amd: Fix race in increase_address_space() (bsc#1150860).\n- iommu/amd: Flush old domains in kdump kernel (bsc#1150861).\n- iommu/amd: Override wrong IVRS IOAPIC on Raven Ridge systems (bsc#1137799).\n- iommu/amd: Remove domain-\u003eupdated (bsc#1154610).\n- iommu/amd: Wait for completion of IOTLB flush in attach_device (bsc#1154611).\n- iommu/dma: Fix for dereferencing before null checking (bsc#1151667).\n- iommu/iova: Avoid false sharing on fq_timer_on (bsc#1151662).\n- iommu/iova: Avoid false sharing on fq_timer_on (bsc#1151671).\n- iommu/vt-d: Fix QI_DEV_IOTLB_PFSID and QI_DEV_EIOTLB_PFSID macros (bsc#1158063).\n- iommu: Do not use sme_active() in generic code (bsc#1151661).\n- ip6_tunnel: fix possible use-after-free on xmit (networking-stable-19_08_08).\n- ipmi: Do not allow device module unload when in use (bsc#1154768).\n- ipmi:dmi: Ignore IPMI SMBIOS entries with a zero base address (bsc#1051510).\n- ipmi_si: Only schedule continuously in the thread in maintenance mode (bsc#1051510).\n- ipv4: Fix table id reference in fib_sync_down_addr (networking-stable-19_11_10).\n- ipv4: Return -ENETUNREACH if we can\u0027t create route but saddr is valid (networking-stable-19_10_24).\n- ipv6/addrconf: allow adding multicast addr if IFA_F_MCAUTOJOIN is set (networking-stable-19_08_28).\n- ipv6: Fix the link time qualifier of \u0027ping_v6_proc_exit_net()\u0027 (networking-stable-19_09_15).\n- ipv6: Handle missing host route in __ipv6_ifa_notify (networking-stable-19_10_05).\n- ipv6: drop incoming packets having a v4mapped source address (networking-stable-19_10_05).\n- irqchip/gic-v2m: Add support for Amazon Graviton variant of GICv3+GICv2m (SLE-9332).\n- irqchip/gic-v3-its: Fix LPI release for Multi-MSI devices (jsc#ECO-561).\n- irqchip/gic-v3-its: Fix command queue pointer comparison bug (jsc#ECO-561).\n- irqchip/gic-v3-its: Fix misuse of GENMASK macro (jsc#ECO-561).\n- irqdomain: Add the missing assignment of domain-\u003efwnode for named fwnode (bsc#1111666).\n- isdn/capi: check message length in capi_write() (bsc#1051510).\n- iwlwifi: api: annotate compressed BA notif array sizes (bsc#1051510).\n- iwlwifi: check kasprintf() return value (bsc#1051510).\n- iwlwifi: do not panic in error path on non-msix systems (bsc#1155692).\n- iwlwifi: drop packets with bad status in CD (bsc#1111666).\n- iwlwifi: exclude GEO SAR support for 3168 (bsc#1111666).\n- iwlwifi: fix bad dma handling in page_mem dumping flow (bsc#1120902).\n- iwlwifi: fw: do not send GEO_TX_POWER_LIMIT command to FW version 36 (bsc#1111666).\n- iwlwifi: fw: use helper to determine whether to dump paging (bsc#1106434). Patch needed to be adjusted, because our tree does not have the global variable IWL_FW_ERROR_DUMP_PAGING\n- iwlwifi: mvm: Send non offchannel traffic via AP sta (bsc#1051510).\n- iwlwifi: mvm: avoid sending too many BARs (bsc#1051510).\n- iwlwifi: mvm: do not send keys when entering D3 (bsc#1051510).\n- iwlwifi: mvm: force TCM re-evaluation on TCM resume (bsc#1111666).\n- iwlwifi: mvm: synchronize TID queue removal (bsc#1051510).\n- iwlwifi: mvm: use correct FIFO length (bsc#1111666).\n- iwlwifi: pcie: fit reclaim msg to MAX_MSG_LEN (bsc#1111666).\n- iwlwifi: pcie: fix erroneous print (bsc#1111666).\n- iwlwifi: pcie: fix memory leaks in iwl_pcie_ctxt_info_gen3_init (bsc#1111666).\n- iwlwifi: pcie: read correct prph address for newer devices (bsc#1111666).\n- ixgbe: Fix secpath usage for IPsec TX offload (bsc#1113994 bsc#1151807).\n- ixgbe: Prevent u8 wrapping of ITR value to something less than 10us (bsc#1101674).\n- ixgbe: fix double clean of Tx descriptors with xdp (bsc#1113994 ).\n- ixgbe: fix possible deadlock in ixgbe_service_task() (bsc#1113994).\n- ixgbe: sync the first fragment unconditionally (bsc#1133140).\n- ixgbevf: Fix secpath usage for IPsec Tx offload (bsc#1113994 ).\n- kABI fix for \u0027ipmi: Do not allow device module unload when in use\u0027 (bsc#1154768).\n- kABI fixup alloc_dax_region (bsc#1158071).\n- kABI workaround for ath10k hw_filter_reset_required field (bsc#1111666).\n- kABI workaround for ath10k last_wmi_vdev_start_status field (bsc#1051510).\n- kABI workaround for crypto/af_alg changes (bsc#1154737).\n- kABI workaround for drm_connector.registered type changes (bsc#1111666).\n- kABI workaround for drm_vma_offset_node readonly field addition (bsc#1135967)\n- kABI workaround for iwlwifi iwl_rx_cmd_buffer change (bsc#1111666).\n- kABI workaround for mmc_host retune_crc_disable flag addition (bsc#1111666).\n- kABI workaround for snd_hda_pick_pin_fixup() changes (bsc#1051510).\n- kABI workaround for struct mwifiex_power_cfg change (bsc#1051510).\n- kABI: Fix for \u0027KVM: x86: Introduce vcpu-\u003earch.xsaves_enabled\u0027 (bsc#1158066).\n- kABI: add _q suffix to exports that take struct dh (bsc#1155331).\n- kABI: media: em28xx: fix handler for vidioc_s_input() (bsc#1051510). fixes kABI\n- kABI: media: em28xx: stop rewriting device\u0027s struct (bsc#1051510). fixes kABI\n- kabi protect enum RDMA_DRIVER_EFA (jsc#SLE-4805)\n- kabi/severities: Whitelist a couple of xive functions xive_cleanup_irq_data and xive_native_populate_irq_data are exported by the xive interupt controller driver and used by KVM. I do not expect any out-of-tree driver can sanely use these.\n- kabi/severities: Whitelist functions internal to radix mm. To call these functions you have to first detect if you are running in radix mm mode which can\u0027t be expected of OOT code.\n- kabi: net: sched: act_sample: fix psample group handling on overwrite (networking-stable-19_09_05).\n- kabi: s390: struct subchannel (git-fixes).\n- kernel-binary.spec.in: Fix build of non-modular kernels (boo#1154578).\n- kernel-subpackage-build: create zero size ghost for uncompressed vmlinux (bsc#1154354). \n- kernel/sysctl.c: do not override max_threads provided by userspace (bnc#1150875).\n- kernfs: Fix range checks in kernfs_get_target_path (bsc#1051510).\n- kexec: bail out upon SIGKILL when allocating memory (git-fixes).\n- keys: Fix missing null pointer check in request_key_auth_describe() (bsc#1051510).\n- ksm: cleanup stable_node chain collapse case (bnc#1144338).\n- ksm: fix use after free with merge_across_nodes = 0 (bnc#1144338).\n- ksm: introduce ksm_max_page_sharing per page deduplication limit (bnc#1144338).\n- ksm: optimize refile of stable_node_dup at the head of the chain (bnc#1144338).\n- ksm: swap the two output parameters of chain/chain_prune (bnc#1144338).\n- kvm: Convert kvm_lock to a mutex (bsc#1117665).\n- kvm: x86, powerpc: do not allow clearing largepages debugfs entry (bsc#1117665).\n- kvm: x86: Do not release the page inside mmu_set_spte() (bsc#1117665).\n- lan78xx: Fix memory leaks (bsc#1051510).\n- leds: leds-lp5562 allow firmware files up to the maximum length (bsc#1051510).\n- leds: trigger: gpio: GPIO 0 is valid (bsc#1051510).\n- lib/mpi: Fix karactx leak in mpi_powm (bsc#1051510).\n- lib/scatterlist: Fix chaining support in sgl_alloc_order() (git-fixes).\n- lib/scatterlist: Introduce sgl_alloc() and sgl_free() (git-fixes).\n- libertas: Add missing sentinel at end of if_usb.c fw_table (bsc#1051510).\n- libertas_tf: Use correct channel range in lbtf_geo_init (bsc#1051510).\n- libiscsi: do not try to bypass SCSI EH (bsc#1142076).\n- libnvdimm/altmap: Track namespace boundaries in altmap (bsc#1150305).\n- libnvdimm/security: provide fix for secure-erase to use zero-key (bsc#1149853).\n- libnvdimm: Export the target_node attribute for regions and namespaces (bsc#1158071).\n- libnvdimm: prevent nvdimm from requesting key when security is disabled (bsc#1137982).\n- lightnvm: remove dependencies on BLK_DEV_NVME and PCI (bsc#1150846).\n- liquidio: add cleanup in octeon_setup_iq() (bsc#1051510).\n- liquidio: fix race condition in instruction completion processing (bsc#1051510).\n- livepatch: Allow to distinguish different version of system state changes (bsc#1071995).\n- livepatch: Basic API to track system state changes (bsc#1071995 ).\n- livepatch: Keep replaced patches until post_patch callback is called (bsc#1071995).\n- livepatch: Nullify obj-\u003emod in klp_module_coming()\u0027s error path (bsc#1071995).\n- livepatch: Selftests of the API for tracking system state changes (bsc#1071995).\n- loop: add ioctl for changing logical block size (bsc#1108043).\n- loop: fix no-unmap write-zeroes request behavior (bsc#1158637).\n- lpfc: Add FA-WWN Async Event reporting (bsc#1154521).\n- lpfc: Add FC-AL support to lpe32000 models (bsc#1154521).\n- lpfc: Add additional discovery log messages (bsc#1154521).\n- lpfc: Add log macros to allow print by serverity or verbocity setting (bsc#1154521).\n- lpfc: Fix SLI3 hba in loop mode not discovering devices (bsc#1154521).\n- lpfc: Fix bad ndlp ptr in xri aborted handling (bsc#1154521).\n- lpfc: Fix hardlockup in lpfc_abort_handler (bsc#1154521).\n- lpfc: Fix lockdep errors in sli_ringtx_put (bsc#1154521).\n- lpfc: Fix reporting of read-only fw error errors (bsc#1154521).\n- lpfc: Make FW logging dynamically configurable (bsc#1154521).\n- lpfc: Remove lock contention target write path (bsc#1154521).\n- lpfc: Revise interrupt coalescing for missing scenarios (bsc#1154521).\n- lpfc: Slight fast-path Performance optimizations (bsc#1154521).\n- lpfc: Update lpfc version to 12.6.0.0 (bsc#1154521).\n- lpfc: fix coverity error of dereference after null check (bsc#1154521).\n- lpfc: fix lpfc_nvmet_mrq to be bound by hdw queue count (bsc#1154521).\n- lpfc: size cpu map by last cpu id set (bsc#1157160).\n- mISDN: Fix type of switch control variable in ctrl_teimanager (bsc#1051510).\n- mISDN: enforce CAP_NET_RAW for raw sockets (bsc#1051510).\n- mac80211: Reject malformed SSID elements (bsc#1051510).\n- mac80211: accept deauth frames in IBSS mode (bsc#1051510).\n- mac80211: consider QoS Null frames for STA_NULLFUNC_ACKED (bsc#1051510).\n- mac80211: fix station inactive_time shortly after boot (bsc#1051510).\n- mac80211: fix txq null pointer dereference (bsc#1051510).\n- mac80211: minstrel: fix CCK rate group streams value (bsc#1051510).\n- mac80211: minstrel: fix sampling/reporting of CCK rates in HT mode (bsc#1051510).\n- mac80211: minstrel_ht: fix per-group max throughput rate initialization (bsc#1051510).\n- macsec: drop skb sk before calling gro_cells_receive (bsc#1051510).\n- macvlan: schedule bc_work even if error (bsc#1051510).\n- mailbox: mailbox-test: fix null pointer if no mmio (bsc#1051510).\n- mailbox: reset txdone_method TXDONE_BY_POLL if client knows_txdone (git-fixes).\n- md/raid0: avoid RAID0 data corruption due to layout confusion (bsc#1140090).\n- md/raid0: fix warning message for parameter default_layout (bsc#1140090).\n- md/raid6: Set R5_ReadError when there is read failure on parity disk (git-fixes).\n- md: do not report active array_state until after revalidate_disk() completes (git-fixes).\n- md: only call set_in_sync() when it is expected to succeed (git-fixes).\n- media: Revert \u0027[media] marvell-ccic: reset ccic phy when stop streaming for stability\u0027 (bsc#1051510).\n- media: atmel: atmel-isc: fix asd memory allocation (bsc#1135642).\n- media: atmel: atmel-isi: fix timeout value for stop streaming (bsc#1051510).\n- media: au0828: Fix incorrect error messages (bsc#1051510).\n- media: bdisp: fix memleak on release (git-fixes).\n- media: cec.h: CEC_OP_REC_FLAG_ values were swapped (bsc#1051510).\n- media: cec: report Vendor ID after initialization (bsc#1051510).\n- media: cpia2_usb: fix memory leaks (bsc#1051510).\n- media: cxusb: detect cxusb_ctrl_msg error in query (bsc#1051510).\n- media: davinci: Fix implicit enum conversion warning (bsc#1051510).\n- media: dib0700: fix link error for dibx000_i2c_set_speed (bsc#1051510).\n- media: dvb-core: fix a memory leak bug (bsc#1051510).\n- media: em28xx: fix handler for vidioc_s_input() (bsc#1051510).\n- media: em28xx: stop rewriting device\u0027s struct (bsc#1051510).\n- media: exynos4-is: Fix recursive locking in isp_video_release() (git-fixes).\n- media: exynos4-is: fix leaked of_node references (bsc#1051510).\n- media: fdp1: Reduce FCP not found message level to debug (bsc#1051510).\n- media: fix: media: pci: meye: validate offset to avoid arbitrary access (bsc#1051510).\n- media: flexcop-usb: ensure -EIO is returned on error condition (git-fixes).\n- media: gspca: zero usb_buf on error (bsc#1051510).\n- media: hdpvr: Add device num check and handling (bsc#1051510).\n- media: hdpvr: add terminating 0 at end of string (bsc#1051510).\n- media: i2c: ov5645: Fix power sequence (bsc#1051510).\n- media: iguanair: add sanity checks (bsc#1051510).\n- media: imon: invalid dereference in imon_touch_event (bsc#1051510).\n- media: isif: fix a NULL pointer dereference bug (bsc#1051510).\n- media: marvell-ccic: do not generate EOF on parallel bus (bsc#1051510).\n- media: mc-device.c: do not memset __user pointer contents (bsc#1051510).\n- media: omap3isp: Do not set streaming state on random subdevs (bsc#1051510).\n- media: omap3isp: Set device on omap3isp subdevs (bsc#1051510).\n- media: ov6650: Fix control handler not freed on init error (git-fixes).\n- media: ov6650: Fix sensor possibly not detected on probe (bsc#1051510).\n- media: ov6650: Move v4l2_clk_get() to ov6650_video_probe() helper (bsc#1051510).\n- media: ov9650: add a sanity check (bsc#1051510).\n- media: pci: ivtv: Fix a sleep-in-atomic-context bug in ivtv_yuv_init() (bsc#1051510).\n- media: pulse8-cec: return 0 when invalidating the logical address (bsc#1051510).\n- media: pxa_camera: Fix check for pdev-\u003edev.of_node (bsc#1051510).\n- media: radio/si470x: kill urb on error (bsc#1051510).\n- media: radio: wl1273: fix interrupt masking on release (git-fixes).\n- media: replace strcpy() by strscpy() (bsc#1051510).\n- media: saa7134: fix terminology around saa7134_i2c_eeprom_md7134_gate() (bsc#1051510).\n- media: saa7146: add cleanup in hexium_attach() (bsc#1051510).\n- media: sn9c20x: Add MSI MS-1039 laptop to flip_dmi_table (bsc#1051510).\n- media: stkwebcam: Bugfix for wrong return values (bsc#1051510).\n- media: stkwebcam: fix runtime PM after driver unbind (bsc#1051510).\n- media: technisat-usb2: break out of loop at end of buffer (bsc#1051510).\n- media: ti-vpe: vpe: Fix Motion Vector vpdma stride (git-fixes).\n- media: tm6000: double free if usb disconnect while streaming (bsc#1051510).\n- media: ttusb-dec: Fix info-leak in ttusb_dec_send_command() (bsc#1051510).\n- media: usbvision: Fix races among open, close, and disconnect (bsc#1051510).\n- media: uvcvideo: Fix error path in control parsing failure (git-fixes).\n- media: v4l2-ctrl: fix flags for DO_WHITE_BALANCE (bsc#1051510).\n- media: vb2: Fix videobuf2 to map correct area (bsc#1051510).\n- media: vim2m: Fix abort issue (git-fixes).\n- media: vivid: Set vid_cap_streaming and vid_out_streaming to true (bsc#1051510).\n- mei: bus: prefix device names on bus with the bus name (bsc#1051510).\n- mei: fix modalias documentation (git-fixes).\n- mei: samples: fix a signedness bug in amt_host_if_call() (bsc#1051510).\n- memstick: jmb38x_ms: Fix an error handling path in \u0027jmb38x_ms_probe()\u0027 (bsc#1051510).\n- mfd: intel-lpss: Add default I2C device properties for Gemini Lake (bsc#1051510).\n- mfd: intel-lpss: Remove D3cold delay (bsc#1051510).\n- mfd: max8997: Enale irq-wakeup unconditionally (bsc#1051510).\n- mfd: mc13xxx-core: Fix PMIC shutdown when reading ADC values (bsc#1051510).\n- mfd: palmas: Assign the right powerhold mask for tps65917 (git-fixes).\n- mfd: ti_am335x_tscadc: Keep ADC interface on if child is wakeup capable (bsc#1051510).\n- mic: avoid statically declaring a \u0027struct device\u0027 (bsc#1051510).\n- mld: fix memory leak in mld_del_delrec() (networking-stable-19_09_05).\n- mlx5: add parameter to disable enhanced IPoIB (bsc#1142095)\n- mlxsw: spectrum_flower: Fail in case user specifies multiple mirror actions (bsc#1112374).\n- mlxsw: spectrum_router: Fix determining underlay for a GRE tunnel (bsc#1112374).\n- mm, memory_hotplug: do not clear numa_node association after hot_remove (bnc#1115026).\n- mm, page_owner, debug_pagealloc: save and dump freeing stack trace (jsc#SLE-8956, bsc#1144653, VM Debug Functionality).\n- mm, page_owner: decouple freeing stack trace from debug_pagealloc (jsc#SLE-8956, bsc#1144653, VM Debug Functionality).\n- mm, page_owner: fix off-by-one error in __set_page_owner_handle() (jsc#SLE-8956, bsc#1144653, VM Debug Functionality).\n- mm, page_owner: keep owner info when freeing the page (jsc#SLE-8956, bsc#1144653, VM Debug Functionality).\n- mm, page_owner: make init_pages_in_zone() faster (jsc#SLE-8956, bsc#1144653, VM Debug Functionality).\n- mm, page_owner: record page owner for each subpage (jsc#SLE-8956, bsc#1144653, VM Debug Functionality).\n- mm, page_owner: rename flag indicating that page is allocated (jsc#SLE-8956, bsc#1144653, VM Debug Functionality).\n- mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d() (git fixes (mm/gup)).\n- mm/compaction.c: clear total_{migrate,free}_scanned before scanning a new zone (git fixes (mm/compaction)).\n- mm/debug.c: PageAnon() is true for PageKsm() pages (git fixes (mm/debug)).\n- mm/memcontrol.c: fix use after free in mem_cgroup_iter() (bsc#1149224, VM Functionality).\n- mmc: core: API to temporarily disable retuning for SDIO CRC errors (bsc#1111666).\n- mmc: core: Add sdio_retune_hold_now() and sdio_retune_release() (bsc#1111666).\n- mmc: core: Fix init of SD cards reporting an invalid VDD range (bsc#1051510).\n- mmc: core: fix wl1251 sdio quirks (git-fixes).\n- mmc: host: omap_hsmmc: add code for special init of wl1251 to get rid of pandora_wl1251_init_card (git-fixes).\n- mmc: mediatek: fix CMD_TA to 2 for MT8173 HS200/HS400 mode (bsc#1051510).\n- mmc: mediatek: fix cannot receive new request when msdc_cmd_is_ready fail (bsc#1051510).\n- mmc: sdhci-esdhc-imx: correct the fix of ERR004536 (git-fixes).\n- mmc: sdhci-msm: fix mutex while in spinlock (bsc#1142635).\n- mmc: sdhci-of-arasan: Do now show error message in case of deffered probe (bsc#1119086).\n- mmc: sdhci-of-at91: fix quirk2 overwrite (git-fixes).\n- mmc: sdhci-of-esdhc: Revert \u0027mmc: sdhci-of-esdhc: add erratum A-009204 support\u0027 (bsc#1051510).\n- mmc: sdhci-of-esdhc: fix P2020 errata handling (bsc#1051510).\n- mmc: sdhci-of-esdhc: set DMA snooping based on DMA coherence (bsc#1051510).\n- mmc: sdhci: Fix incorrect switch to HS mode (bsc#1051510).\n- mmc: sdhci: improve ADMA error reporting (bsc#1051510).\n- mmc: sdio: fix wl1251 vendor id (git-fixes).\n- moduleparam: fix parameter description mismatch (bsc#1051510).\n- mqprio: Fix out-of-bounds access in mqprio_dump (bsc#1109837).\n- mt7601u: fix bbp version check in mt7601u_wait_bbp_ready (bsc#1051510).\n- mt76x0: init hw capabilities.\n- mtd: nand: mtk: fix incorrect register setting order about ecc irq.\n- mtd: spear_smi: Fix Write Burst mode (bsc#1051510).\n- mtd: spi-nor: Fix Cadence QSPI RCU Schedule Stall (bsc#1051510).\n- mtd: spi-nor: fix silent truncation in spi_nor_read() (bsc#1051510).\n- mvpp2: refactor MTU change code (networking-stable-19_08_08).\n- mwifex: free rx_cmd skb in suspended state (bsc#1111666).\n- mwifiex: Fix NL80211_TX_POWER_LIMITED (bsc#1051510).\n- mwifiex: debugfs: correct histogram spacing, formatting (bsc#1051510).\n- mwifiex: do no submit URB in suspended state (bsc#1111666).\n- mwifiex: fix potential NULL dereference and use after free (bsc#1051510).\n- nbd: prevent memory leak (bsc#1158638).\n- net/ibmvnic: Fix EOI when running in XIVE mode (bsc#1089644, ltc#166495, ltc#165544, git-fixes).\n- net/ibmvnic: Fix missing { in __ibmvnic_reset (bsc#1149652 ltc#179635).\n- net/ibmvnic: Fix typo in retry check (bsc#1155689 ltc#182047).\n- net/ibmvnic: Ignore H_FUNCTION return from H_EOI to tolerate XIVE mode (bsc#1089644, ltc#166495, ltc#165544, git-fixes).\n- net/ibmvnic: free reset work of removed device from queue (bsc#1149652 ltc#179635).\n- net/ibmvnic: prevent more than one thread from running in reset (bsc#1152457 ltc#174432).\n- net/ibmvnic: unlock rtnl_lock in reset so linkwatch_event can run (bsc#1152457 ltc#174432).\n- net/mlx4_core: Dynamically set guaranteed amount of counters per VF (networking-stable-19_11_05).\n- net/mlx4_en: Fix wrong limitation for number of TX rings (bsc#1103989).\n- net/mlx4_en: fix a memory leak bug (bsc#1046299).\n- net/mlx5: Accumulate levels for chains prio namespaces (bsc#1103990).\n- net/mlx5: Add device ID of upcoming BlueField-2 (bsc#1046303 ).\n- net/mlx5: FWTrace, Reduce stack usage (bsc#1103990).\n- net/mlx5: Fix error handling in mlx5_load() (bsc#1046305 ).\n- net/mlx5: Update the list of the PCI supported devices (bsc#1127611).\n- net/mlx5: Use reversed order when unregister devices (networking-stable-19_08_08).\n- net/mlx5: prevent memory leak in mlx5_fpga_conn_create_cq (bsc#1046303).\n- net/mlx5e: Fix SFF 8472 eeprom length (git-fixes).\n- net/mlx5e: Fix eswitch debug print of max fdb flow (bsc#1103990 ).\n- net/mlx5e: Fix ethtool self test: link speed (bsc#1103990 ).\n- net/mlx5e: Fix handling of compressed CQEs in case of low NAPI budget (networking-stable-19_11_05).\n- net/mlx5e: Only support tx/rx pause setting for port owner (networking-stable-19_08_21).\n- net/mlx5e: Print a warning when LRO feature is dropped or not allowed (bsc#1103990).\n- net/mlx5e: Query global pause state before setting prio2buffer (bsc#1103990).\n- net/mlx5e: Use flow keys dissector to parse packets for ARFS (networking-stable-19_08_21).\n- net/packet: fix race in tpacket_snd() (networking-stable-19_08_21).\n- net/phy: fix DP83865 10 Mbps HDX loopback disable function (networking-stable-19_09_30).\n- net/rds: Fix error handling in rds_ib_add_one() (networking-stable-19_10_05).\n- net/rds: fix warn in rds_message_alloc_sgs (bsc#1154848).\n- net/rds: remove user triggered WARN_ON in rds_sendmsg (bsc#1154848).\n- net/sched: act_sample: do not push mac header on ip6gre ingress (networking-stable-19_09_30).\n- net/sched: cbs: Fix not adding cbs instance to list (bsc#1109837).\n- net/sched: cbs: Set default link speed to 10 Mbps in cbs_set_port_rate (bsc#1109837).\n- net/smc: Fix error path in smc_init (git-fixes).\n- net/smc: avoid fallback in case of non-blocking connect (git-fixes).\n- net/smc: do not schedule tx_work in SMC_CLOSED state (git-fixes).\n- net/smc: fix SMCD link group creation with VLAN id (git-fixes).\n- net/smc: fix closing of fallback SMC sockets (git-fixes).\n- net/smc: fix ethernet interface refcounting (git-fixes).\n- net/smc: fix fastopen for non-blocking connect() (git-fixes).\n- net/smc: fix refcount non-blocking connect() -part 2 (git-fixes).\n- net/smc: fix refcounting for non-blocking connect() (git-fixes).\n- net/smc: keep vlan_id for SMC-R in smc_listen_work() (git-fixes).\n- net/smc: make sure EPOLLOUT is raised (networking-stable-19_08_28).\n- net/smc: original socket family in inet_sock_diag (bsc#1149959).\n- net: Fix null de-reference of device refcount (networking-stable-19_09_15).\n- net: Replace NF_CT_ASSERT() with WARN_ON() (bsc#1146612).\n- net: Unpublish sk from sk_reuseport_cb before call_rcu (networking-stable-19_10_05).\n- net: Zeroing the structure ethtool_wolinfo in ethtool_get_wol() (networking-stable-19_11_05).\n- net: add READ_ONCE() annotation in __skb_wait_for_more_packets() (networking-stable-19_11_05).\n- net: add skb_queue_empty_lockless() (networking-stable-19_11_05).\n- net: annotate accesses to sk-\u003esk_incoming_cpu (networking-stable-19_11_05).\n- net: annotate lockless accesses to sk-\u003esk_napi_id (networking-stable-19_11_05).\n- net: avoid potential infinite loop in tc_ctl_action() (networking-stable-19_10_24).\n- net: bcmgenet: Fix RGMII_MODE_EN value for GENET v1/2/3 (networking-stable-19_10_24).\n- net: bcmgenet: Set phydev-\u003edev_flags only for internal PHYs (networking-stable-19_10_24).\n- net: bcmgenet: reset 40nm EPHY on energy detect (networking-stable-19_11_05).\n- net: cdc_ncm: Signedness bug in cdc_ncm_set_dgram_size() (git-fixes).\n- net: dsa: b53: Do not clear existing mirrored port mask (networking-stable-19_11_05).\n- net: dsa: bcm_sf2: Fix IMP setup for port different than 8 (networking-stable-19_11_05).\n- net: dsa: fix switch tree list (networking-stable-19_11_05).\n- net: ethernet: ftgmac100: Fix DMA coherency issue with SW checksum (networking-stable-19_11_05).\n- net: ethernet: octeon_mgmt: Account for second possible VLAN header (networking-stable-19_11_10).\n- net: fix data-race in neigh_event_send() (networking-stable-19_11_10).\n- net: fix ifindex collision during namespace removal (networking-stable-19_08_08).\n- net: fix sk_page_frag() recursion from memory reclaim (networking-stable-19_11_05).\n- net: fix skb use after free in netpoll (networking-stable-19_09_05).\n- net: gso: Fix skb_segment splat when splitting gso_size mangled skb having linear-headed frag_list (networking-stable-19_09_15).\n- net: hisilicon: Fix ping latency when deal with high throughput (networking-stable-19_11_05).\n- net: hns3: Add missing newline at end of file (bsc#1104353 ).\n- net: hns3: add Asym Pause support to fix autoneg problem (bsc#1104353).\n- net: hns3: add a check to pointer in error_detected and slot_reset (bsc#1104353).\n- net: hns3: add aRFS support for PF (bsc#1104353).\n- net: hns3: add all IMP return code (bsc#1104353).\n- net: hns3: add check to number of buffer descriptors (bsc#1104353).\n- net: hns3: add default value for tc_size and tc_offset (bsc#1104353).\n- net: hns3: add exception handling when enable NIC HW error interrupts (bsc#1104353).\n- net: hns3: add handling of two bits in MAC tunnel interrupts (bsc#1104353).\n- net: hns3: add handshake with hardware while doing reset (bsc#1104353).\n- net: hns3: add opcode about query and clear RAS and MSI-X to special opcode (bsc#1104353).\n- net: hns3: add recovery for the H/W errors occurred before the HNS dev initialization (bsc#1104353).\n- net: hns3: add some error checking in hclge_tm module (bsc#1104353).\n- net: hns3: add support for dump firmware statistics by debugfs (bsc#1104353).\n- net: hns3: adjust hns3_uninit_phy()\u0027s location in the hns3_client_uninit() (bsc#1104353).\n- net: hns3: bitwise operator should use unsigned type (bsc#1104353).\n- net: hns3: change GFP flag during lock period (bsc#1104353 ).\n- net: hns3: change SSU\u0027s buffer allocation according to UM (bsc#1104353).\n- net: hns3: check msg_data before memcpy in hclgevf_send_mbx_msg (bsc#1104353).\n- net: hns3: clear restting state when initializing HW device (bsc#1104353).\n- net: hns3: code optimizaition of hclge_handle_hw_ras_error() (bsc#1104353).\n- net: hns3: delay and separate enabling of NIC and ROCE HW errors (bsc#1104353).\n- net: hns3: delay ring buffer clearing during reset (bsc#1104353 ).\n- net: hns3: delay setting of reset level for hw errors until slot_reset is called (bsc#1104353).\n- net: hns3: delete the redundant user NIC codes (bsc#1104353 ).\n- net: hns3: do not configure new VLAN ID into VF VLAN table when it\u0027s full (bsc#1104353).\n- net: hns3: do not query unsupported commands in debugfs (bsc#1104353).\n- net: hns3: enable DCB when TC num is one and pfc_en is non-zero (bsc#1104353).\n- net: hns3: enable broadcast promisc mode when initializing VF (bsc#1104353).\n- net: hns3: extract handling of mpf/pf msi-x errors into functions (bsc#1104353).\n- net: hns3: fix ETS bandwidth validation bug (bsc#1104353 ).\n- net: hns3: fix GFP flag error in hclge_mac_update_stats() (bsc#1126390).\n- net: hns3: fix VLAN filter restore issue after reset (bsc#1104353).\n- net: hns3: fix __QUEUE_STATE_STACK_XOFF not cleared issue (bsc#1104353).\n- net: hns3: fix a -Wformat-nonliteral compile warning (bsc#1104353).\n- net: hns3: fix a memory leak issue for hclge_map_unmap_ring_to_vf_vector (bsc#1104353).\n- net: hns3: fix a statistics issue about l3l4 checksum error (bsc#1104353).\n- net: hns3: fix avoid unnecessary resetting for the H/W errors which do not require reset (bsc#1104353).\n- net: hns3: fix compile warning without CONFIG_RFS_ACCEL (bsc#1104353).\n- net: hns3: fix dereference of ae_dev before it is null checked (bsc#1104353).\n- net: hns3: fix flow control configure issue for fibre port (bsc#1104353).\n- net: hns3: fix for dereferencing before null checking (bsc#1104353).\n- net: hns3: fix for skb leak when doing selftest (bsc#1104353 ).\n- net: hns3: fix race conditions between reset and module loading and unloading (bsc#1104353).\n- net: hns3: fix some coding style issues (bsc#1104353 ).\n- net: hns3: fix some reset handshake issue (bsc#1104353 ).\n- net: hns3: fix wrong size of mailbox responding data (bsc#1104353).\n- net: hns3: fixes wrong place enabling ROCE HW error when loading (bsc#1104353).\n- net: hns3: free irq when exit from abnormal branch (bsc#1104353 ).\n- net: hns3: handle empty unknown interrupt (bsc#1104353 ).\n- net: hns3: initialize CPU reverse mapping (bsc#1104353 ).\n- net: hns3: log detail error info of ROCEE ECC and AXI errors (bsc#1104353).\n- net: hns3: make HW GRO handling compliant with SW GRO (bsc#1104353).\n- net: hns3: modify handling of out of memory in hclge_err.c (bsc#1104353).\n- net: hns3: modify hclge_init_client_instance() (bsc#1104353 ).\n- net: hns3: modify hclgevf_init_client_instance() (bsc#1104353 ).\n- net: hns3: optimize the CSQ cmd error handling (bsc#1104353 ).\n- net: hns3: prevent unnecessary MAC TNL interrupt (bsc#1104353 bsc#1134983).\n- net: hns3: process H/W errors occurred before HNS dev initialization (bsc#1104353).\n- net: hns3: re-schedule reset task while VF reset fail (bsc#1104353).\n- net: hns3: refactor PF/VF RSS hash key configuration (bsc#1104353).\n- net: hns3: refactor hns3_get_new_int_gl function (bsc#1104353 ).\n- net: hns3: refine the flow director handle (bsc#1104353 ).\n- net: hns3: remove RXD_VLD check in hns3_handle_bdinfo (bsc#1104353).\n- net: hns3: remove VF VLAN filter entry inexistent warning print (bsc#1104353).\n- net: hns3: remove override_pci_need_reset (bsc#1104353 ).\n- net: hns3: remove redundant core reset (bsc#1104353 ).\n- net: hns3: remove setting bit of reset_requests when handling mac tunnel interrupts (bsc#1104353).\n- net: hns3: remove unused linkmode definition (bsc#1104353 ).\n- net: hns3: replace numa_node_id with numa_mem_id for buffer reusing (bsc#1104353).\n- net: hns3: set default value for param \u0027type\u0027 in hclgevf_bind_ring_to_vector (bsc#1104353).\n- net: hns3: set maximum length to resp_data_len for exceptional case (bsc#1104353).\n- net: hns3: set ops to null when unregister ad_dev (bsc#1104353 ).\n- net: hns3: set the port shaper according to MAC speed (bsc#1104353).\n- net: hns3: small changes for magic numbers (bsc#1104353 ).\n- net: hns3: some changes of MSI-X bits in PPU(RCB) (bsc#1104353 ).\n- net: hns3: some modifications to simplify and optimize code (bsc#1104353).\n- net: hns3: some variable modification (bsc#1104353).\n- net: hns3: stop schedule reset service while unloading driver (bsc#1104353).\n- net: hns3: sync VLAN filter entries when kill VLAN ID failed (bsc#1104353).\n- net: hns3: trigger VF reset if a VF had an over_8bd_nfe_err (bsc#1104353).\n- net: hns3: typo in the name of a constant (bsc#1104353 ).\n- net: hns3: use HCLGEVF_STATE_NIC_REGISTERED to indicate VF NIC client has registered (bsc#1104353).\n- net: hns3: use HCLGE_STATE_NIC_REGISTERED to indicate PF NIC client has registered (bsc#1104353).\n- net: hns3: use HCLGE_STATE_ROCE_REGISTERED to indicate PF ROCE client has registered (bsc#1104353).\n- net: hns3: use macros instead of magic numbers (bsc#1104353 ).\n- net: hns: Fix the stray netpoll locks causing deadlock in NAPI path (bsc#1104353).\n- net: hns: add support for vlan TSO (bsc#1104353).\n- net: openvswitch: free vport unless register_netdevice() succeeds (git-fixes).\n- net: phy: Check against net_device being NULL (bsc#1051510).\n- net: phy: Fix not to call phy_resume() if PHY is not attached (bsc#1051510).\n- net: phy: Fix the register offsets in Broadcom iProc mdio mux driver (bsc#1051510).\n- net: phy: at803x: Change error to EINVAL for invalid MAC (bsc#1051510).\n- net: phy: bcm7xxx: define soft_reset for 40nm EPHY (bsc#1119113 ).\n- net: phy: broadcom: Use strlcpy() for ethtool::get_strings (bsc#1051510).\n- net: phy: dp83867: Set up RGMII TX delay (bsc#1051510).\n- net: phy: fixed_phy: Fix fixed_phy not checking GPIO (bsc#1051510).\n- net: phy: marvell: Use strlcpy() for ethtool::get_strings (bsc#1051510).\n- net: phy: marvell: clear wol event before setting it (bsc#1051510).\n- net: phy: meson-gxl: check phy_write return value (bsc#1051510).\n- net: phy: micrel: Use strlcpy() for ethtool::get_strings (bsc#1051510).\n- net: phy: mscc: read \u0027vsc8531, edge-slowdown\u0027 as an u32 (bsc#1051510).\n- net: phy: mscc: read \u0027vsc8531,vddmac\u0027 as an u32 (bsc#1051510).\n- net: phy: xgene: disable clk on error paths (bsc#1051510).\n- net: phy: xgmiitorgmii: Check phy_driver ready before accessing (bsc#1051510).\n- net: phy: xgmiitorgmii: Check read_status results (bsc#1051510).\n- net: phy: xgmiitorgmii: Support generic PHY status read (bsc#1051510).\n- net: phylink: Fix flow control resolution (bsc#1119113 ).\n- net: qlogic: Fix memory leak in ql_alloc_large_buffers (networking-stable-19_10_05).\n- net: qrtr: Stop rx_worker before freeing node (networking-stable-19_09_30).\n- net: sched: Fix a possible null-pointer dereference in dequeue_func() (networking-stable-19_08_08).\n- net: sched: act_sample: fix psample group handling on overwrite (networking-stable-19_09_05).\n- net: sched: cbs: Avoid division by zero when calculating the port rate (bsc#1109837).\n- net: sched: ensure opts_len \u0026lt;= IP_TUNNEL_OPTS_MAX in act_tunnel_key (bsc#1109837).\n- net: sched: fix dump qlen for sch_mq/sch_mqprio with NOLOCK subqueues (bsc#1109837).\n- net: sched: fix possible crash in tcf_action_destroy() (bsc#1109837).\n- net: sched: fix reordering issues (bsc#1109837).\n- net: sock_map, fix missing ulp check in sock hash case (bsc#1109837).\n- net: stmmac: disable/enable ptp_ref_clk in suspend/resume flow (networking-stable-19_10_24).\n- net: stmmac: dwmac-rk: Do not fail if phy regulator is absent (networking-stable-19_09_05).\n- net: usb: qmi_wwan: add support for DW5821e with eSIM support (networking-stable-19_11_10).\n- net: use skb_queue_empty_lockless() in busy poll contexts (networking-stable-19_11_05).\n- net: use skb_queue_empty_lockless() in poll() handlers (networking-stable-19_11_05).\n- net: wireless: ti: remove local VENDOR_ID and DEVICE_ID definitions (git-fixes).\n- net: wireless: ti: wl1251 use new SDIO_VENDOR_ID_TI_WL1251 definition (git-fixes).\n- net_sched: add policy validation for action attributes (networking-stable-19_09_30).\n- net_sched: fix backward compatibility for TCA_ACT_KIND (git-fixes).\n- netfilter: nf_nat: do not bug when mapping already exists (bsc#1146612).\n- netfilter: nf_queue: enqueue skbs with NULL dst (git-fixes).\n- netns: fix GFP flags in rtnl_net_notifyid() (networking-stable-19_11_05).\n- nfc: fix memory leak in llcp_sock_bind() (bsc#1051510).\n- nfc: netlink: fix double device reference drop (git-fixes).\n- nfc: port100: handle command failure cleanly (git-fixes).\n- nfp: flower: fix memory leak in nfp_flower_spawn_vnic_reprs (bsc#1109837).\n- nfp: flower: prevent memory leak in nfp_flower_spawn_phy_reprs (bsc#1109837).\n- nfsd: Do not release the callback slot unless it was actually held (git-fixes).\n- nfsd: Fix overflow causing non-working mounts on 1 TB machines (bsc#1150381).\n- nfsd: degraded slot-count more gracefully as allocation nears exhaustion (bsc#1150381).\n- nfsd: fix performance-limiting session calculation (bsc#1150381).\n- nfsd: give out fewer session slots as limit approaches (bsc#1150381).\n- nfsd: handle drc over-allocation gracefully (bsc#1150381).\n- nfsd: increase DRC cache limit (bsc#1150381).\n- nl80211: Fix a GET_KEY reply attribute (bsc#1051510).\n- nl80211: Fix possible Spectre-v1 for CQM RSSI thresholds (bsc#1051510).\n- nl80211: fix null pointer dereference (bsc#1051510).\n- null_blk: complete requests from -\u003etimeout (bsc#1149446).\n- null_blk: wire up timeouts (bsc#1149446).\n- nvme-fc: fix module unloads while lports still pending (bsc#1150033).\n- nvme-multipath: relax ANA state check (bsc#1123105).\n- nvme-rdma: Allow DELETING state change failure in (bsc#1104967,).\n- nvme-rdma: centralize admin/io queue teardown sequence (bsc#1142076).\n- nvme-rdma: centralize controller setup sequence (bsc#1142076).\n- nvme-rdma: fix a NULL deref when an admin connect times out (bsc#1149446).\n- nvme-rdma: fix a NULL deref when an admin connect times out (bsc#1149446).\n- nvme-rdma: fix timeout handler (bsc#1149446).\n- nvme-rdma: fix timeout handler (bsc#1149446).\n- nvme-rdma: remove redundant reference between ib_device and tagset (bsc#149446).\n- nvme-rdma: stop admin queue before freeing it (bsc#1140155).\n- nvme-rdma: support up to 4 segments of inline data (bsc#1142076).\n- nvme-rdma: unquiesce queues when deleting the controller (bsc#1142076).\n- nvme-rdma: use dynamic dma mapping per command (bsc#1149446).\n- nvme-tcp: fix a NULL deref when an admin connect times out (bsc#1149446).\n- nvme-tcp: fix timeout handler (bsc#1149446).\n- nvme-tcp: support C2HData with SUCCESS flag (bsc#1157386).\n- nvme: cancel request synchronously (bsc#1145661).\n- nvme: do not abort completed request in nvme_cancel_request (bsc#1149446).\n- nvme: fix multipath crash when ANA is deactivated (bsc#1149446).\n- nvme: remove ns sibling before clearing path (bsc#1140155).\n- nvme: return BLK_EH_DONE from -\u003etimeout (bsc#1142076).\n- nvme: wait until all completed request\u0027s complete fn is called (bsc#1149446).\n- nvmem: Use the same permissions for eeprom as for nvmem (git-fixes).\n- objtool: Clobber user CFLAGS variable (bsc#1153236).\n- ocfs2: fix panic due to ocfs2_wq is null (bsc#1158644).\n- ocfs2: fix passing zero to \u0027PTR_ERR\u0027 warning (bsc#1158649).\n- openvswitch: change type of UPCALL_PID attribute to NLA_UNSPEC (networking-stable-19_09_30).\n- openvswitch: fix flow command message size (git-fixes).\n- pNFS/flexfiles: Turn off soft RPC calls (git-fixes).\n- padata: use smp_mb in padata_reorder to avoid orphaned padata jobs (git-fixes).\n- perf/x86/amd: Change/fix NMI latency mitigation to use a timestamp (bsc#1142924).\n- phy: phy-twl4030-usb: fix denied runtime access (git-fixes).\n- phy: renesas: rcar-gen3-usb2: Disable clearing VBUS in over-current (bsc#1051510).\n- phylink: fix kernel-doc warnings (bsc#1111666).\n- pinctl: ti: iodelay: fix error checking on pinctrl_count_index_with_args call (git-fixes).\n- pinctrl: at91: do not use the same irqchip with multiple gpiochips (git-fixes).\n- pinctrl: cherryview: Allocate IRQ chip dynamic (git-fixes).\n- pinctrl: cherryview: restore Strago DMI workaround for all versions (bsc#1111666).\n- pinctrl: lewisburg: Update pin list according to v1.1v6 (bsc#1051510).\n- pinctrl: lpc18xx: Use define directive for PIN_CONFIG_GPIO_PIN_INT (bsc#1051510).\n- pinctrl: qcom: spmi-gpio: fix gpio-hog related boot issues (bsc#1051510).\n- pinctrl: samsung: Fix device node refcount leaks in S3C24xx wakeup controller init (bsc#1051510).\n- pinctrl: samsung: Fix device node refcount leaks in S3C64xx wakeup controller init (bsc#1051510).\n- pinctrl: samsung: Fix device node refcount leaks in init code (bsc#1051510).\n- pinctrl: sunxi: Fix a memory leak in \u0027sunxi_pinctrl_build_state()\u0027 (bsc#1051510).\n- pinctrl: tegra: Fix write barrier placement in pmx_writel (bsc#1051510).\n- pinctrl: xway: fix gpio-hog related boot issues (bsc#1051510).\n- pinctrl: zynq: Use define directive for PIN_CONFIG_IO_STANDARD (bsc#1051510).\n- pktcdvd: remove warning on attempting to register non-passthrough dev (bsc#1051510).\n- platform/x86: classmate-laptop: remove unused variable (bsc#1051510).\n- platform/x86: hp-wmi: Fix ACPI errors caused by passing 0 as input size (bsc#1051510).\n- platform/x86: hp-wmi: Fix ACPI errors caused by too small buffer (bsc#1051510).\n- platform/x86: hp-wmi: Make buffer for HPWMI_FEATURE2_QUERY 128 bytes (bsc#1051510).\n- platform/x86: i2c-multi-instantiate: Derive the device name from parent (bsc#1111666).\n- platform/x86: i2c-multi-instantiate: Fail the probe if no IRQ provided (bsc#1111666).\n- platform/x86: pmc_atom: Add Siemens CONNECT X300 to critclk_systems DMI table (bsc#1051510).\n- platform/x86: pmc_atom: Add Siemens SIMATIC IPC227E to critclk_systems DMI table (bsc#1051510).\n- pnfs/flexfiles: Fix PTR_ERR() dereferences in ff_layout_track_ds_error (git-fixes).\n- power: reset: at91-poweroff: do not procede if at91_shdwc is allocated (bsc#1051510).\n- power: reset: gpio-restart: Fix typo when gpio reset is not found (bsc#1051510).\n- power: supply: Init device wakeup after device_add() (bsc#1051510).\n- power: supply: ab8500_fg: silence uninitialized variable warnings (bsc#1051510).\n- power: supply: max14656: fix potential use-after-free (bsc#1051510).\n- power: supply: sysfs: ratelimit property read error message (bsc#1051510).\n- power: supply: twl4030_charger: disable eoc interrupt on linear charge (bsc#1051510).\n- power: supply: twl4030_charger: fix charging current out-of-bounds (bsc#1051510).\n- powerpc/64: Make meltdown reporting Book3S 64 specific (bsc#1091041).\n- powerpc/64: Make sys_switch_endian() traceable (bsc#1065729).\n- powerpc/64s/pseries: radix flush translations before MMU is enabled at boot (bsc#1055186).\n- powerpc/64s/radix: Fix MADV_[FREE|DONTNEED] TLB flush miss problem with THP (bsc#1152161 ltc#181664).\n- powerpc/64s/radix: Fix memory hot-unplug page table split (bsc#1065729).\n- powerpc/64s/radix: Fix memory hotplug section page table creation (bsc#1065729).\n- powerpc/64s/radix: Implement _tlbie(l)_va_range flush functions (bsc#1152161 ltc#181664).\n- powerpc/64s/radix: Improve TLB flushing for page table freeing (bsc#1152161 ltc#181664).\n- powerpc/64s/radix: Improve preempt handling in TLB code (bsc#1152161 ltc#181664).\n- powerpc/64s/radix: Introduce local single page ceiling for TLB range\n- powerpc/64s/radix: Optimize flush_tlb_range (bsc#1152161 ltc#181664).\n- powerpc/64s/radix: keep kernel ERAT over local process/guest invalidates (bsc#1055186).\n- powerpc/64s/radix: tidy up TLB flushing code (bsc#1055186).\n- powerpc/64s: Rename PPC_INVALIDATE_ERAT to PPC_ISA_3_0_INVALIDATE_ERAT (bsc#1055186).\n- powerpc/archrandom: fix arch_get_random_seed_int() (bsc#1065729).\n- powerpc/book3s64/hash: Use secondary hash for bolted mapping if the primary is full (bsc#1157778 ltc#182520).\n- powerpc/book3s64/mm: Do not do tlbie fixup for some hardware revisions (bsc#1152161 ltc#181664).\n- powerpc/book3s64/radix: Rename CPU_FTR_P9_TLBIE_BUG feature flag (bsc#1152161 ltc#181664).\n- powerpc/bpf: Fix tail call implementation (bsc#1157698).\n- powerpc/bpf: use unsigned division instruction for 64-bit operations (bsc#1065729).\n- powerpc/irq: Do not WARN continuously in arch_local_irq_restore() (bsc#1065729).\n- powerpc/irq: drop arch_early_irq_init() (bsc#1065729).\n- powerpc/mm/book3s64: Move book3s64 code to pgtable-book3s64 (bsc#1055186).\n- powerpc/mm/radix: Drop unneeded NULL check (bsc#1152161 ltc#181664).\n- powerpc/mm/radix: implement LPID based TLB flushes to be used by KVM (bsc#1152161 ltc#181664).\n- powerpc/mm/radix: mark __radix__flush_tlb_range_psize() as __always_inline (bsc#1055186).\n- powerpc/mm/radix: mark as __tlbie_pid() and friends as__always_inline (bsc#1055186).\n- powerpc/mm: Fixup tlbie vs mtpidr/mtlpidr ordering issue on POWER9 (bsc#1152161 ltc#181664).\n- powerpc/mm: Properly invalidate when setting process table base (bsc#1055186).\n- powerpc/mm: Simplify page_is_ram by using memblock_is_memory (bsc#1065729).\n- powerpc/mm: Use memblock API for PPC32 page_is_ram (bsc#1065729).\n- powerpc/mm: mark more tlb functions as __always_inline (bsc#1055186).\n- powerpc/module64: Fix comment in R_PPC64_ENTRY handling (bsc#1065729).\n- powerpc/powernv/ioda2: Allocate TCE table levels on demand for default DMA window (bsc#1061840).\n- powerpc/powernv/ioda: Fix race in TCE level allocation (bsc#1061840).\n- powerpc/powernv/npu: Remove obsolete comment about TCE_KILL_INVAL_ALL (bsc#1065729).\n- powerpc/powernv: Disable native PCIe port management (bsc#1065729).\n- powerpc/powernv: Fix compile without CONFIG_TRACEPOINTS (bsc#1065729).\n- powerpc/powernv: Flush console before platform error reboot (bsc#1149940 ltc#179958).\n- powerpc/powernv: Restrict OPAL symbol map to only be readable by root (bsc#1152885).\n- powerpc/powernv: Use kernel crash path for machine checks (bsc#1149940 ltc#179958).\n- powerpc/powernv: move OPAL call wrapper tracing and interrupt handling to C (bsc#1065729).\n- powerpc/pseries, ps3: panic flush kernel messages before halting system (bsc#1149940 ltc#179958).\n- powerpc/pseries/memory-hotplug: Fix return value type of find_aa_index (bsc#1065729).\n- powerpc/pseries/mobility: notify network peers after migration (bsc#1152631 ltc#181798).\n- powerpc/pseries/mobility: use cond_resched when updating device tree (bsc#1153112 ltc#181778).\n- powerpc/pseries: Call H_BLOCK_REMOVE when supported (bsc#1109158).\n- powerpc/pseries: Do not fail hash page table insert for bolted mapping (bsc#1157778 ltc#182520).\n- powerpc/pseries: Do not opencode HPTE_V_BOLTED (bsc#1157778 ltc#182520).\n- powerpc/pseries: Drop pointless static qualifier in vpa_debugfs_init() (git-fixes).\n- powerpc/pseries: Export maximum memory value (bsc#1122363).\n- powerpc/pseries: Export raw per-CPU VPA data via debugfs ().\n- powerpc/pseries: Fix cpu_hotplug_lock acquisition in resize_hpt() (bsc#1065729).\n- powerpc/pseries: Read TLB Block Invalidate Characteristics (bsc#1109158).\n- powerpc/pseries: Remove confusing warning message (bsc#1109158).\n- powerpc/pseries: address checkpatch warnings in dlpar_offline_cpu (bsc#1156700 ltc#182459).\n- powerpc/pseries: correctly track irq state in default idle (bsc#1150727 ltc#178925).\n- powerpc/pseries: safely roll back failed DLPAR cpu add (bsc#1156700 ltc#182459).\n- powerpc/ptrace: Simplify vr_get/set() to avoid GCC warning (bsc#1148868).\n- powerpc/rtas: allow rescheduling while changing cpu states (bsc#1153112 ltc#181778).\n- powerpc/security/book3s64: Report L1TF status in sysfs (bsc#1091041).\n- powerpc/security: Fix wrong message when RFI Flush is disable (bsc#1131107).\n- powerpc/xive: Fix bogus error code returned by OPAL (bsc#1065729).\n- powerpc/xive: Implement get_irqchip_state method for XIVE to fix shutdown race (bsc#1065729).\n- powerpc/xive: Prevent page fault issues in the machine crash handler (bsc#1156882 ltc#182435).\n- powerpc/xmon: Fix opcode being uninitialized in print_insn_powerpc (bsc#1065729).\n- powerpc: Drop page_is_ram() and walk_system_ram_range() (bsc#1065729).\n- powerpc: Fix vDSO clock_getres() (bsc#1065729).\n- powerpc: bpf: Fix generation of load/store DW instructions (bsc#1065729).\n- powerpc: dump kernel log before carrying out fadump or kdump (bsc#1149940 ltc#179958).\n- powerplay: Respect units on max dcfclk watermark (bsc#1111666).\n- ppdev: fix PPGETTIME/PPSETTIME ioctls (bsc#1051510).\n- ppp: Fix memory leak in ppp_write (git-fixes).\n- prevent active file list thrashing due to refault detection (VM Performance, bsc#1156286).\n- printk/panic: Avoid deadlock in printk() after stopping CPUs by NMI (bsc#1148712).\n- printk: Do not lose last line in kmsg buffer dump (bsc#1152460).\n- printk: Export console_printk (bsc#1071995).\n- printk: fix printk_time race (bsc#1152466).\n- pwm: Clear chip_data in pwm_put() (bsc#1051510).\n- pwm: bcm-iproc: Prevent unloading the driver module while in use (git-fixes).\n- pwm: clps711x: Fix period calculation (bsc#1051510).\n- pwm: lpss: Only set update bit if we are actually changing the settings (bsc#1051510).\n- qed: iWARP - Fix default window size to be based on chip (bsc#1050536 bsc#1050545).\n- qed: iWARP - Fix tc for MPA ll2 connection (bsc#1050536 bsc#1050545).\n- qed: iWARP - Use READ_ONCE and smp_store_release to access ep-\u003estate (bsc#1050536 bsc#1050545).\n- qed: iWARP - fix uninitialized callback (bsc#1050536 bsc#1050545).\n- qede: fix NULL pointer deref in __qede_remove() (networking-stable-19_11_10).\n- qla2xxx: kABI fixes for v10.01.00.18-k (bsc#1123034 bsc#1131304 bsc#1127988).\n- qla2xxx: remove SGI SN2 support (bsc#1123034 bsc#1131304 bsc#1127988).\n- qmi_wwan: add support for Cinterion CLS8 devices (networking-stable-19_10_05).\n- quota: fix wrong condition in is_quota_modification() (bsc#1152026).\n- qxl: fix null-pointer crash during suspend (bsc#1111666).\n- r8152: Set macpassthru in reset_resume callback (bsc#1051510).\n- r8152: Set memory to all 0xFFs on failed reg reads (bsc#1051510).\n- r8152: add device id for Lenovo ThinkPad USB-C Dock Gen 2 (networking-stable-19_11_05).\n- random: move FIPS continuous test to output functions (bsc#1155334).\n- rds: Fix warning (bsc#1154848).\n- regulator: ab8500: Remove AB8505 USB regulator (bsc#1051510).\n- regulator: ab8500: Remove SYSCLKREQ from enum ab8505_regulator_id (bsc#1051510).\n- regulator: lm363x: Fix off-by-one n_voltages for lm3632 ldo_vpos/ldo_vneg (bsc#1051510).\n- regulator: tps65910: fix a missing check of return value (bsc#1051510).\n- reiserfs: fix extended attributes on the root directory (bsc#1151225).\n- remoteproc: Check for NULL firmwares in sysfs interface (git-fixes).\n- reset: Fix potential use-after-free in __of_reset_control_get() (bsc#1051510).\n- reset: fix of_reset_simple_xlate kerneldoc comment (bsc#1051510).\n- reset: fix reset_control_get_exclusive kerneldoc comment (bsc#1051510).\n- reset: fix reset_control_ops kerneldoc comment (bsc#1051510).\n- resource: fix locking in find_next_iomem_res() (bsc#1114279).\n- rpm/config.sh: Enable kgraft.\n- rpm/config.sh: Enable livepatch.\n- rpm/constraints.in: lower disk space required for ARM With a requirement of 35GB, only 2 slow workers are usable for ARM. Current aarch64 build requires 27G and armv6/7 requires 14G. Set requirements respectively to 30GB and 20GB.\n- rpm/dtb.spec.in.in: do not make dtb directory inaccessible There is no reason to lock down the dtb directory for ordinary users.\n- rpm/kernel-binary.spec.in: Fix kernel-livepatch description typo.\n- rpm/kernel-binary.spec.in: add COMPRESS_VMLINUX (bnc#1155921) Let COMPRESS_VMLINUX determine the compression used for vmlinux. By default (historically), it is gz.\n- rpm/kernel-binary.spec.in: handle modules.builtin.modinfo It was added in 5.2.\n- rpm/kernel-binary.spec.in: remove code duplicated by merge.\n- rpm/kernel-binary.spec.in: support partial rt debug config.\n- rpm/kernel-source.spec.in: Fix dependency of kernel-devel (bsc#1154043)\n- rpm/kernel-subpackage-spec: Exclude kernel-firmware recommends (bsc#1143959) For reducing the dependency on kernel-firmware in sub packages\n- rpm/kernel-subpackage-spec: Fix empty Recommends tag (bsc#1143959)\n- rpm/kernel-subpackage-spec: Mention debuginfo in the subpackage description (bsc#1149119).\n- rpm/kernel-subpackage-spec: Unify dependency handling.\n- rpm/kernel-subpackage-spec: fix kernel-default-base build There were some issues with recent changes to subpackage dependencies handling:\n- rpm/macros.kernel-source: KMPs should depend on kmod-compat to build. kmod-compat links are used in find-provides.ksyms, find-requires.ksyms, and find-supplements.ksyms in rpm-config-SUSE.\n- rpm/mkspec: Correct tarball URL for rc kernels.\n- rpm/mkspec: Make building DTBs optional.\n- rpm/modflist: Simplify compression support.\n- rpm/modules.fips: update module list (bsc#1157853)\n- rpm: raise required disk space for binary packages Current disk space constraints (10 GB on s390x, 25 GB on other architectures) no longer suffice for 5.3 kernel builds. The statistics show ~30 GB of disk consumption on x86_64 and ~11 GB on s390x so raise the constraints to 35 GB in general and 14 GB on s390x.\n- rpm: support compressed modules Some of our scripts and scriptlets in rpm/ do not expect module files not ending with \u0027.ko\u0027 which currently leads to failure in preuninstall scriptlet of cluster-md-kmp-default (and probably also other subpackages). Let those which could be run on compressed module files recognize \u0027.ko.xz\u0027 in addition to \u0027.ko\u0027.\n- rt2800: remove errornous duplicate condition (git-fixes).\n- rtl8187: Fix warning generated when strncpy() destination length matches the sixe argument (bsc#1051510).\n- rtl818x: fix potential use after free (bsc#1051510).\n- rtlwifi: Fix file release memory leak (bsc#1111666).\n- rtlwifi: Remove unnecessary NULL check in rtl_regd_init (bsc#1051510).\n- rtlwifi: btcoex: Use proper enumerated types for Wi-Fi only interface (bsc#1111666).\n- rtlwifi: rtl8192cu: Fix value set in descriptor (bsc#1142635).\n- rtlwifi: rtl8192de: Fix misleading REG_MCUFWDL information (bsc#1051510).\n- rtlwifi: rtl8192de: Fix missing callback that tests for hw release of buffer (bsc#1111666).\n- rtlwifi: rtl8192de: Fix missing code to retrieve RX buffer address (bsc#1051510).\n- rtlwifi: rtl8192de: Fix missing enable interrupt flag (bsc#1051510).\n- s390/bpf: fix lcgr instruction encoding (bsc#1051510).\n- s390/bpf: use 32-bit index for tail calls (bsc#1051510).\n- s390/cio: avoid calling strlen on null pointer (bsc#1051510).\n- s390/cio: exclude subchannels with no parent from pseudo check (bsc#1051510).\n- s390/cio: fix virtio-ccw DMA without PV (git-fixes).\n- s390/cmf: set_schib_wait add timeout (bsc#1153509, bsc#1153476).\n- s390/cmm: fix information leak in cmm_timeout_handler() (bsc#1051510).\n- s390/cpumsf: Check for CPU Measurement sampling (bsc#1153681 LTC#181855).\n- s390/crypto: fix gcm-aes-s390 selftest failures (bsc#1137861 LTC#178091).\n- s390/idle: fix cpu idle time calculation (bsc#1051510).\n- s390/mm: properly clear _PAGE_NOEXEC bit when it is not supported (bsc#1051510).\n- s390/pci: add mio_enabled attribute (bsc#1152665 LTC#181729).\n- s390/pci: correctly handle MIO opt-out (bsc#1152665 LTC#181729).\n- s390/pci: deal with devices that have no support for MIO instructions (bsc#1152665 LTC#181729).\n- s390/pci: fix MSI message data (bsc#1152697 LTC#181730).\n- s390/process: avoid potential reading of freed stack (bsc#1051510).\n- s390/qdio: (re-)initialize tiqdio list entries (bsc#1051510).\n- s390/qdio: do not touch the dsci in tiqdio_add_input_queues() (bsc#1051510).\n- s390/qeth: clean up page frag creation (git-fixes).\n- s390/qeth: consolidate skb allocation (git-fixes).\n- s390/qeth: ensure linear access to packet headers (git-fixes).\n- s390/qeth: guard against runt packets (git-fixes).\n- s390/qeth: return proper errno on IO error (bsc#1051510).\n- s390/setup: fix boot crash for machine without EDAT-1 (bsc#1051510 bsc#1140948).\n- s390/setup: fix early warning messages (bsc#1051510 bsc#1140948).\n- s390/topology: avoid firing events before kobjs are created (bsc#1051510).\n- s390/zcrypt: fix memleak at release (git-fixes).\n- s390: add support for IBM z15 machines (bsc#1152696 LTC#181731).\n- s390: fix setting of mio addressing control (bsc#1152665 LTC#181729).\n- s390: fix stfle zero padding (bsc#1051510).\n- s390: vfio-ccw: Do not attempt to free no-op, test and tic cda (bsc#1154244).\n- s390: vsie: Use effective CRYCBD.31 to check CRYCBD validity (git-fixes).\n- sc16is7xx: Fix for \u0027Unexpected interrupt: 8\u0027 (bsc#1051510).\n- sch_cbq: validate TCA_CBQ_WRROPT to avoid crash (networking-stable-19_10_05).\n- sch_dsmark: fix potential NULL deref in dsmark_init() (networking-stable-19_10_05).\n- sch_hhf: ensure quantum and hhf_non_hh_weight are non-zero (networking-stable-19_09_15).\n- sch_netem: fix a divide by zero in tabledist() (networking-stable-19_09_30).\n- sched/fair: Add tmp_alone_branch assertion (bnc#1156462).\n- sched/fair: Avoid divide by zero when rebalancing domains (bsc#1096254).\n- sched/fair: Fix O(nr_cgroups) in the load balancing path (bnc#1156462).\n- sched/fair: Fix insertion in rq-\u003eleaf_cfs_rq_list (bnc#1156462).\n- sched/fair: Optimize update_blocked_averages() (bnc#1156462).\n- sched/fair: WARN() and refuse to set buddy when !se-\u003eon_rq (bsc#1158132).\n- scripts/arch-symbols: add missing link.\n- scripts/git_sort/git_sort.py:\n- scripts/run_oldconfig.sh: Fix update-vanilla When CC is set we want to use it for native only. Cross-compilation still needs the crosscompilers. flush (bsc#1055117 bsc#1152161 ltc#181664).\n- scsi: bfa: convert to strlcpy/strlcat (git-fixes).\n- scsi: cxlflash: Prevent deadlock when adapter probe fails (git-fixes).\n- scsi: lpfc: Add enablement of multiple adapter dumps (bsc#1154601).\n- scsi: lpfc: Add registration for CPU Offline/Online events (bsc#1154601).\n- scsi: lpfc: Change default IRQ model on AMD architectures (bsc#1154601).\n- scsi: lpfc: Check queue pointer before use (bsc#1154242).\n- scsi: lpfc: Clarify FAWNN error message (bsc#1154601).\n- scsi: lpfc: Complete removal of FCoE T10 PI support on SLI-4 adapters (bsc#1154521).\n- scsi: lpfc: Convert existing %pf users to %ps (bsc#1154521).\n- scsi: lpfc: Fix GPF on scsi command completion (bsc#1154521).\n- scsi: lpfc: Fix NULL check before mempool_destroy is not needed (bsc#1154601).\n- scsi: lpfc: Fix NVME io abort failures causing hangs (bsc#1154521).\n- scsi: lpfc: Fix NVMe ABTS in response to receiving an ABTS (bsc#1154521).\n- scsi: lpfc: Fix Oops in nvme_register with target logout/login (bsc#1151900).\n- scsi: lpfc: Fix a kernel warning triggered by lpfc_get_sgl_per_hdwq() (bsc#1154601).\n- scsi: lpfc: Fix a kernel warning triggered by lpfc_sli4_enable_intr() (bsc#1154601).\n- scsi: lpfc: Fix configuration of BB credit recovery in service parameters (bsc#1154601).\n- scsi: lpfc: Fix coverity errors on NULL pointer checks (bsc#1154521).\n- scsi: lpfc: Fix device recovery errors after PLOGI failures (bsc#1154521).\n- scsi: lpfc: Fix devices that do not return after devloss followed by rediscovery (bsc#1137040).\n- scsi: lpfc: Fix discovery failures when target device connectivity bounces (bsc#1154521).\n- scsi: lpfc: Fix duplicate unreg_rpi error in port offline flow (bsc#1154601).\n- scsi: lpfc: Fix dynamic fw log enablement check (bsc#1154601).\n- scsi: lpfc: Fix hdwq sgl locks and irq handling (bsc#1154521).\n- scsi: lpfc: Fix host hang at boot or slow boot (bsc#1154521).\n- scsi: lpfc: Fix kernel crash at lpfc_nvme_info_show during remote port bounce (bsc#1154601).\n- scsi: lpfc: Fix list corruption detected in lpfc_put_sgl_per_hdwq (bsc#1154521).\n- scsi: lpfc: Fix list corruption in lpfc_sli_get_iocbq (bsc#1154521).\n- scsi: lpfc: Fix locking on mailbox command completion (bsc#1154521).\n- scsi: lpfc: Fix lpfc_cpumask_of_node_init() (bsc#1154601).\n- scsi: lpfc: Fix miss of register read failure check (bsc#1154521).\n- scsi: lpfc: Fix null ptr oops updating lpfc_devloss_tmo via sysfs attribute (bsc#1140845).\n- scsi: lpfc: Fix premature re-enabling of interrupts in lpfc_sli_host_down (bsc#1154521).\n- scsi: lpfc: Fix propagation of devloss_tmo setting to nvme transport (bsc#1140883).\n- scsi: lpfc: Fix pt2pt discovery on SLI3 HBAs (bsc#1154521).\n- scsi: lpfc: Fix reset recovery paths that are not recovering (bsc#1144375).\n- scsi: lpfc: Fix rpi release when deleting vport (bsc#1154521).\n- scsi: lpfc: Fix spinlock_irq issues in lpfc_els_flush_cmd() (bsc#1154521).\n- scsi: lpfc: Fix unexpected error messages during RSCN handling (bsc#1154601).\n- scsi: lpfc: Honor module parameter lpfc_use_adisc (bsc#1153628).\n- scsi: lpfc: Honor module parameter lpfc_use_adisc (bsc#1154601).\n- scsi: lpfc: Initialize cpu_map for not present cpus (bsc#1154601).\n- scsi: lpfc: Limit xri count for kdump environment (bsc#1154124).\n- scsi: lpfc: Make function lpfc_defer_pt2pt_acc static (bsc#1154521).\n- scsi: lpfc: Make lpfc_debugfs_ras_log_data static (bsc#1154601).\n- scsi: lpfc: Mitigate high memory pre-allocation by SCSI-MQ (bsc#1154601).\n- scsi: lpfc: Raise config max for lpfc_fcp_mq_threshold variable (bsc#1154601).\n- scsi: lpfc: Remove bg debugfs buffers (bsc#1144375).\n- scsi: lpfc: Remove bg debugfs buffers (bsc#1144375).\n- scsi: lpfc: Resolve checker warning for lpfc_new_io_buf() (bsc#1144375).\n- scsi: lpfc: Sync with FC-NVMe-2 SLER change to require Conf with SLER (bsc#1154601).\n- scsi: lpfc: Update async event logging (bsc#1154521).\n- scsi: lpfc: Update lpfc version to 12.4.0.1 (bsc#1154521).\n- scsi: lpfc: Update lpfc version to 12.6.0.1 (bsc#1154601).\n- scsi: lpfc: Update lpfc version to 12.6.0.2 (bsc#1154601).\n- scsi: lpfc: cleanup: remove unused fcp_txcmlpq_cnt (bsc#1154521).\n- scsi: lpfc: fix build error of lpfc_debugfs.c for vfree/vmalloc (bsc#1154601).\n- scsi: lpfc: fix inlining of lpfc_sli4_cleanup_poll_list() (bsc#1154601).\n- scsi: lpfc: fix spelling error in MAGIC_NUMER_xxx (bsc#1154601).\n- scsi: lpfc: fix: Coverity: lpfc_cmpl_els_rsp(): Null pointer dereferences (bsc#1154601).\n- scsi: lpfc: fix: Coverity: lpfc_get_scsi_buf_s3(): Null pointer dereferences (bsc#1154601).\n- scsi: lpfc: lpfc_attr: Fix Use plain integer as NULL pointer (bsc#1154601).\n- scsi: lpfc: lpfc_nvmet: Fix Use plain integer as NULL pointer (bsc#1154601).\n- scsi: lpfc: remove left-over BUILD_NVME defines (bsc#1154268).\n- scsi: lpfc: remove left-over BUILD_NVME defines (bsc#1154268).\n- scsi: lpfc: revise nvme max queues to be hdwq count (bsc#1154601).\n- scsi: lpfc: use hdwq assigned cpu for allocation (bsc#1157160).\n- scsi: qedf: Add debug information for unsolicited processing (bsc#1149976).\n- scsi: qedf: Add shutdown callback handler (bsc#1149976).\n- scsi: qedf: Add support for 20 Gbps speed (bsc#1149976).\n- scsi: qedf: Check both the FCF and fabric ID before servicing clear virtual link (bsc#1149976).\n- scsi: qedf: Check for link state before processing LL2 packets and send fipvlan retries (bsc#1149976).\n- scsi: qedf: Check for module unloading bit before processing link update AEN (bsc#1149976).\n- scsi: qedf: Decrease the LL2 MTU size to 2500 (bsc#1149976).\n- scsi: qedf: Fix race betwen fipvlan request and response path (bsc#1149976).\n- scsi: qedf: Initiator fails to re-login to switch after link down (bsc#1149976).\n- scsi: qedf: Modify abort and tmf handler to handle edge condition and flush (bsc#1098291).\n- scsi: qedf: Print message during bailout conditions (bsc#1149976).\n- scsi: qedf: Stop sending fipvlan request on unload (bsc#1149976).\n- scsi: qedf: Update module description string (bsc#1149976).\n- scsi: qedf: Update the driver version to 8.37.25.20 (bsc#1149976).\n- scsi: qedf: Update the version to 8.42.3.0 (bsc#1149976).\n- scsi: qedf: Use discovery list to traverse rports (bsc#1149976).\n- scsi: qedf: fc_rport_priv reference counting fixes (bsc#1098291).\n- scsi: qedf: remove set but not used variables (bsc#1149976).\n- scsi: qedi: remove declaration of nvm_image from stack (git-fixes).\n- scsi: qla2xxx: Add 28xx flash primary/secondary status/image mechanism (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Add Device ID for ISP28XX (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Add First Burst support for FC-NVMe devices (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Add Serdes support for ISP28XX (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Add debug dump of LOGO payload and ELS IOCB (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: Add error handling for PLOGI ELS passthrough (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Add error handling for PLOGI ELS passthrough (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Add error handling for PLOGI ELS passthrough (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Add fw_attr and port_no SysFS node (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Add new FW dump template entry types (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Add pci function reset support (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Add protection mask module parameters (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Add support for multiple fwdump templates/segments (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Add support for setting port speed (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Added support for MPI and PEP regions for ISP28XX (bsc#1157424, bsc#1157908, bsc#1157169, bsc#1151548).\n- scsi: qla2xxx: Allow NVMe IO to resume with short cable pull (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Allow PLOGI in target mode (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: Always check the qla2x00_wait_for_hba_online() return value (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Always check the qla2x00_wait_for_hba_online() return value (bsc#1143706).\n- scsi: qla2xxx: Avoid PCI IRQ affinity mapping when multiqueue is not supported (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Avoid that Coverity complains about dereferencing a NULL rport pointer (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Avoid that lockdep complains about unsafe locking in tcm_qla2xxx_close_session() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Avoid that qla2x00_mem_free() crashes if called twice (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Capture FW dump on MPI heartbeat stop event (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Capture FW dump on MPI heartbeat stop event (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Capture FW dump on MPI heartbeat stop event (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Change abort wait_loop from msleep to wait_event_timeout (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Change data_dsd into an array (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Change data_dsd into an array (bsc#1143706).\n- scsi: qla2xxx: Change default ZIO threshold (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Change discovery state before PLOGI (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: Change the return type of qla24xx_read_flash_data() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Change the return type of qla24xx_read_flash_data() (bsc#1143706).\n- scsi: qla2xxx: Change the return type of qla2x00_update_ms_fdmi_iocb() into void (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Change the return type of qla2x00_update_ms_fdmi_iocb() into void (bsc#1143706).\n- scsi: qla2xxx: Check for FW started flag before aborting (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Check for MB timeout while capturing ISP27/28xx FW dump (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Check for MB timeout while capturing ISP27/28xx FW dump (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Check for MB timeout while capturing ISP27/28xx FW dump (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Check secondary image if reading the primary image fails (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Check secondary image if reading the primary image fails (bsc#1143706).\n- scsi: qla2xxx: Check the PCI info string output buffer size (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Check the PCI info string output buffer size (bsc#1143706).\n- scsi: qla2xxx: Check the size of firmware data structures at compile time (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Cleanup fcport memory to prevent leak (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Cleanup redundant qla2x00_abort_all_cmds during unload (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Cleanups for NVRAM/Flash read/write path (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Complain if a command is released that is owned by the firmware (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Complain if a mailbox command times out (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Complain if a mailbox command times out (bsc#1143706).\n- scsi: qla2xxx: Complain if a soft reset fails (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Complain if a soft reset fails (bsc#1143706).\n- scsi: qla2xxx: Complain if parsing the version string fails (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Complain if parsing the version string fails (bsc#1143706).\n- scsi: qla2xxx: Complain if sp-\u003edone() is not called from the completion path (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Complain if sp-\u003edone() is not called from the completion path (bsc#1143706).\n- scsi: qla2xxx: Complain if waiting for pending commands times out (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Complain if waiting for pending commands times out (bsc#1143706).\n- scsi: qla2xxx: Complain loudly about reference count underflow (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Configure local loop for N2N target (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: Correct error handling during initialization failures (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Correction and improvement to fwdt processing (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Correctly report max/min supported speeds (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Correctly retrieve and interpret active flash region (bsc#1157424, bsc#1157908, bsc#1157169, bsc#1151548).\n- scsi: qla2xxx: Declare fourth qla2x00_set_model_info() argument const (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Declare fourth qla2x00_set_model_info() argument const (bsc#1143706).\n- scsi: qla2xxx: Declare local symbols static (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Declare qla24xx_build_scsi_crc_2_iocbs() static (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Declare qla2x00_find_new_loop_id() static (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Declare qla_tgt_cmd.cdb const (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Declare qla_tgt_cmd.cdb const (bsc#1143706).\n- scsi: qla2xxx: Declare the fourth ql_dump_buffer() argument const (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Declare the fourth ql_dump_buffer() argument const (bsc#1143706).\n- scsi: qla2xxx: Disable T10-DIF feature with FC-NVMe during probe (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Do command completion on abort timeout (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: qla2xxx: Do not call qlt_async_event twice (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: Do not corrupt vha-\u003eplogi_ack_list (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Do not corrupt vha-\u003eplogi_ack_list (bsc#1143706).\n- scsi: qla2xxx: Do not defer relogin unconditonally (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: Downgrade driver to 10.01.00.19-k There are upstream bug reports against 10.01.00.19-k which haven\u0027t been resolved. Also the newer version failed to get a proper review. For time being it\u0027s better to got with the older version and do not introduce new bugs.\n- scsi: qla2xxx: Drop superfluous INIT_WORK of del_work (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: Dual FCP-NVMe target port support (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Dual FCP-NVMe target port support (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Dual FCP-NVMe target port support (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Enable type checking for the SRB free and done callback functions (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Enable type checking for the SRB free and done callback functions (bsc#1143706).\n- scsi: qla2xxx: Fix DMA error when the DIF sg buffer crosses 4GB boundary (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix DMA unmap leak (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix LUN discovery if loop id is not assigned yet by firmware (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix N2N link reset (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix N2N link reset (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Fix N2N link reset (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Fix N2N link up fail (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix N2N link up fail (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Fix N2N link up fail (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Fix NULL pointer crash due to stale CPUID (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix NVME cmd and LS cmd timeout race condition (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix NVMe port discovery after a short device port loss (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix Nport ID display value (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix PLOGI payload and ELS IOCB dump length (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: Fix Relogin to prevent modifying scan_state flag (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix SRB allocation flag to avoid sleeping in IRQ context (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix SRB leak on switch command timeout (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: qla2xxx: Fix a NULL pointer dereference (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix a NULL pointer dereference (bsc#1143706).\n- scsi: qla2xxx: Fix a dma_pool_free() call (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: qla2xxx: Fix a qla24xx_enable_msix() error path (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix a race condition between aborting and completing a SCSI command (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix a race condition between aborting and completing a SCSI command (bsc#1143706).\n- scsi: qla2xxx: Fix a recently introduced kernel warning (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix a small typo in qla_bsg.c (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix abort timeout race condition (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix code indentation for qla27xx_fwdt_entry (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix comment alignment in qla_bsg.c (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix comment in MODULE_PARM_DESC in qla2xxx (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix device connect issues in P2P configuration (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: qla2xxx: Fix different size DMA Alloc/Unmap (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix double scsi_done for abort path (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: qla2xxx: Fix driver reload for ISP82xx (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix driver reload for ISP82xx (bsc#1143706).\n- scsi: qla2xxx: Fix driver unload hang (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: qla2xxx: Fix driver unload when FC-NVMe LUNs are connected (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix flash read for Qlogic ISPs (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix flash read for Qlogic ISPs (bsc#1143706).\n- scsi: qla2xxx: Fix formatting of pointer types (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix fw dump corruption (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix fw options handle eh_bus_reset() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix gnl.l memory leak on adapter init failure (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix hang in fcport delete path (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix hardirq-unsafe locking (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix hardlockup in abort command during driver remove (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix incorrect SFUB length used for Secure Flash Update MB Cmd (bsc#1157424, bsc#1157908, bsc#1157169, bsc#1151548).\n- scsi: qla2xxx: Fix kernel crash after disconnecting NVMe devices (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix memory leak when sending I/O fails (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: qla2xxx: Fix message indicating vectors used by driver (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix message indicating vectors used by driver (bsc#1143706).\n- scsi: qla2xxx: Fix panic from use after free in qla2x00_async_tm_cmd (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix partial flash write of MBI (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Fix possible fcport null-pointer dereferences (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix premature timer expiration (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix qla24xx_process_bidir_cmd() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix qla24xx_process_bidir_cmd() (bsc#1143706).\n- scsi: qla2xxx: Fix qla2x00_request_irqs() for MSI (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: Fix race conditions in the code for aborting SCSI commands (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix read offset in qla24xx_load_risc_flash() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix routine qla27xx_dump_{mpi|ram}() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix session cleanup hang (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix session lookup in qlt_abort_work() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix session lookup in qlt_abort_work() (bsc#1143706).\n- scsi: qla2xxx: Fix stale mem access on driver unload (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix stale mem access on driver unload (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Fix stale mem access on driver unload (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Fix stale session (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix stale session (bsc#1143706).\n- scsi: qla2xxx: Fix stuck login session (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix stuck login session (bsc#1143706).\n- scsi: qla2xxx: Fix unbound sleep in fcport delete path (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix unbound sleep in fcport delete path (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Fix unbound sleep in fcport delete path (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Fix unload when NVMe devices are configured (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix use-after-free issues in qla2xxx_qpair_sp_free_dma() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix wait condition in loop (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Further limit FLASH region write access from SysFS (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Ignore NULL pointer in tcm_qla2xxx_free_mcmd (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: Ignore PORT UPDATE after N2N PLOGI (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: Improve Linux kernel coding style conformance (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Improve Linux kernel coding style conformance (bsc#1143706).\n- scsi: qla2xxx: Improve logging for scan thread (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Improve logging for scan thread (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Improve logging for scan thread (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Include the asm/unaligned.h header file from qla_dsd.h (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Include the asm/unaligned.h header file from qla_dsd.h (bsc#1143706).\n- scsi: qla2xxx: Increase the max_sgl_segments to 1024 (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Increase the size of the mailbox arrays from 4 to 8 (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Initialize free_work before flushing it (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: Initialized mailbox to prevent driver load failure (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Inline the qla2x00_fcport_event_handler() function (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Inline the qla2x00_fcport_event_handler() function (bsc#1143706).\n- scsi: qla2xxx: Insert spaces where required (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Introduce qla2x00_els_dcmd2_free() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Introduce qla2x00_els_dcmd2_free() (bsc#1143706).\n- scsi: qla2xxx: Introduce qla2xxx_get_next_handle() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Introduce qla2xxx_get_next_handle() (bsc#1143706).\n- scsi: qla2xxx: Introduce the be_id_t and le_id_t data types for FC src/dst IDs (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Introduce the be_id_t and le_id_t data types for FC src/dst IDs (bsc#1143706).\n- scsi: qla2xxx: Introduce the dsd32 and dsd64 data structures (bsc#1082635 bsc#1141340 bsc#1143706).\n- scsi: qla2xxx: Introduce the dsd32 and dsd64 data structures (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Introduce the function qla2xxx_init_sp() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Introduce the function qla2xxx_init_sp() (bsc#1143706).\n- scsi: qla2xxx: Leave a blank line after declarations (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Let the compiler check the type of the SCSI command context pointer (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Let the compiler check the type of the SCSI command context pointer (bsc#1143706).\n- scsi: qla2xxx: Log the status code if a firmware command fails (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Make it explicit that ELS pass-through IOCBs use little endian (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Make it explicit that ELS pass-through IOCBs use little endian (bsc#1143706).\n- scsi: qla2xxx: Make qla24xx_async_abort_cmd() static (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Make qla2x00_abort_srb() again decrease the sp reference count (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Make qla2x00_abort_srb() again decrease the sp reference count (bsc#1143706).\n- scsi: qla2xxx: Make qla2x00_mem_free() easier to verify (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Make qla2x00_process_response_queue() easier to read (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Make qlt_handle_abts_completion() more robust (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Make qlt_handle_abts_completion() more robust (bsc#1143706).\n- scsi: qla2xxx: Make sure that aborted commands are freed (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Make sure that aborted commands are freed (bsc#1143706).\n- scsi: qla2xxx: Modify NVMe include directives (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Modify NVMe include directives (bsc#1143706).\n- scsi: qla2xxx: Move debug messages before sending srb preventing panic (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Move marker request behind QPair (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Move qla2x00_clear_loop_id() from qla_inline.h into qla_init.c (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Move qla2x00_is_reserved_id() from qla_inline.h into qla_init.c (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Move qla2x00_set_fcport_state() from a .h into a .c file (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Move qla2x00_set_reserved_loop_ids() definition (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Move the linux/io-64-nonatomic-lo-hi.h include directive (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Move the port_state_str definition from a .h to a .c file (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Optimize NPIV tear down process (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Optimize NPIV tear down process (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Optimize NPIV tear down process (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Pass little-endian values to the firmware (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Prevent SysFS access when chip is down (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Prevent memory leak for CT req/rsp allocation (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Prevent multiple ADISC commands per session (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Really fix qla2xxx_eh_abort() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Really fix qla2xxx_eh_abort() (bsc#1143706).\n- scsi: qla2xxx: Reduce the number of casts in GID list code (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Reduce the number of casts in GID list code (bsc#1143706).\n- scsi: qla2xxx: Reduce the number of forward declarations (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Reduce the scope of three local variables in qla2xxx_queuecommand() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Reduce the scope of three local variables in qla2xxx_queuecommand() (bsc#1143706).\n- scsi: qla2xxx: Reject EH_{abort|device_reset|target_request} (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Remove FW default template (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Remove WARN_ON_ONCE in qla2x00_status_cont_entry() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Remove WARN_ON_ONCE in qla2x00_status_cont_entry() (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Remove a comment that refers to the SCSI host lock (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Remove a set-but-not-used variable (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Remove a superfluous forward declaration (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Remove a superfluous forward declaration (bsc#1143706).\n- scsi: qla2xxx: Remove a superfluous pointer check (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Remove a superfluous pointer check (bsc#1143706).\n- scsi: qla2xxx: Remove an include directive (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: qla2xxx: Remove an include directive from qla_mr.c (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Remove an include directive from qla_mr.c (bsc#1143706).\n- scsi: qla2xxx: Remove dead code (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Remove dead code (bsc#1143706).\n- scsi: qla2xxx: Remove qla_tgt_cmd.data_work and qla_tgt_cmd.data_work_free (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Remove qla_tgt_cmd.released (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Remove set but not used variable \u0027ptr_dma\u0027 (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Remove superfluous sts_entry_* casts (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Remove superfluous sts_entry_* casts (bsc#1143706).\n- scsi: qla2xxx: Remove the fcport test from qla_nvme_abort_work() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Remove two superfluous casts (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Remove two superfluous if-tests (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Remove two superfluous if-tests (bsc#1143706).\n- scsi: qla2xxx: Remove two superfluous tests (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Remove two superfluous tests (bsc#1143706).\n- scsi: qla2xxx: Remove unnecessary locking from the target code (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Remove unnecessary null check (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Remove unreachable code from qla83xx_idc_lock() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Remove unreachable code from qla83xx_idc_lock() (bsc#1143706).\n- scsi: qla2xxx: Remove useless set memory to zero use memset() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Replace vmalloc + memset with vzalloc (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Report invalid mailbox status codes (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Report invalid mailbox status codes (bsc#1143706).\n- scsi: qla2xxx: Report the firmware status code if a mailbox command fails (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Report the firmware status code if a mailbox command fails (bsc#1143706).\n- scsi: qla2xxx: Reset the FCF_ASYNC_{SENT|ACTIVE} flags (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Restore FAWWPN of Physical Port only for loop down (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Retry PLOGI on FC-NVMe PRLI failure (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: qla2xxx: Retry fabric Scan on IOCB queue full (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Rework key encoding in qlt_find_host_by_d_id() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Rework key encoding in qlt_find_host_by_d_id() (bsc#1143706).\n- scsi: qla2xxx: Secure flash update support for ISP28XX (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Send Notify ACK after N2N PLOGI (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: Set remote port devloss timeout to 0 (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Set remove flag for all VP (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Set remove flag for all VP (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Set remove flag for all VP (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Set the SCSI command result before calling the command done (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Set the qpair in SRB to NULL when SRB is released (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Set the responder mode if appropriate for ELS pass-through IOCBs (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Set the responder mode if appropriate for ELS pass-through IOCBs (bsc#1143706).\n- scsi: qla2xxx: Silence Successful ELS IOCB message (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Silence fwdump template message (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Silence fwdump template message (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Silence fwdump template message (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Simplification of register address used in qla_tmpl.c (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Simplify a debug statement (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Simplify a debug statement (bsc#1143706).\n- scsi: qla2xxx: Simplify conditional check again (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Simplify qla24xx_abort_sp_done() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Simplify qla24xx_abort_sp_done() (bsc#1143706).\n- scsi: qla2xxx: Simplify qla24xx_async_abort_cmd() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Simplify qla24xx_async_abort_cmd() (bsc#1143706).\n- scsi: qla2xxx: Simplify qlt_lport_dump() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Simplify qlt_lport_dump() (bsc#1143706).\n- scsi: qla2xxx: Simplify qlt_send_term_imm_notif() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Skip FW dump on LOOP initialization error (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Suppress a Coveritiy complaint about integer overflow (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Suppress a Coveritiy complaint about integer overflow (bsc#1143706).\n- scsi: qla2xxx: Suppress multiple Coverity complaint about out-of-bounds accesses (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Suppress multiple Coverity complaint about out-of-bounds accesses (bsc#1143706).\n- scsi: qla2xxx: Uninline qla2x00_init_timer() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Unregister resources in the opposite order of the registration order (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Update driver version to 10.00.00.13-k (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Update driver version to 10.00.00.14-k (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Update driver version to 10.01.00.15-k (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Update driver version to 10.01.00.16-k (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Update driver version to 10.01.00.18-k (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Update driver version to 10.01.00.19-k (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Update driver version to 10.01.00.19-k (bsc#1143706).\n- scsi: qla2xxx: Update driver version to 10.01.00.20-k (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Update driver version to 10.01.00.20-k (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Update driver version to 10.01.00.20-k (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Update driver version to 10.01.00.21-k (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: qla2xxx: Update flash read/write routine (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Use ARRAY_SIZE() in the definition of QLA_LAST_SPEED (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Use Correct index for Q-Pair array (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Use __le64 instead of uint32_t for sending DMA addresses to firmware (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Use __le64 instead of uint32_t[2] for sending DMA addresses to firmware (bsc#1082635 bsc#1141340 bsc#1143706).\n- scsi: qla2xxx: Use an on-stack completion in qla24xx_control_vp() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Use common update-firmware-options routine for ISP27xx+ (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Use complete switch scan for RSCN events (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Use correct number of vectors for online CPUs (bsc#1137223).\n- scsi: qla2xxx: Use dma_pool_zalloc() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Use explicit LOGO in target mode (bsc#1157424, bsc#1157908. bsc#1117169, bsc#1151548).\n- scsi: qla2xxx: Use get/put_unaligned where appropriate (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Use memcpy() and strlcpy() instead of strcpy() and strncpy() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Use memcpy() and strlcpy() instead of strcpy() and strncpy() (bsc#1143706).\n- scsi: qla2xxx: Use mutex protection during qla2x00_sysfs_read_fw_dump() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Use strlcpy() instead of strncpy() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Use strlcpy() instead of strncpy() (bsc#1143706).\n- scsi: qla2xxx: Use tabs instead of spaces for indentation (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Use tabs instead of spaces for indentation (bsc#1143706).\n- scsi: qla2xxx: Use tabs to indent code (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Verify locking assumptions at runtime (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Verify locking assumptions at runtime (bsc#1143706).\n- scsi: qla2xxx: allow session delete to finish before create (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: avoid printf format warning (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: check for kstrtol() failure (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: cleanup trace buffer initialization (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: cleanup trace buffer initialization (bsc#1134476).\n- scsi: qla2xxx: deadlock by configfs_depend_item (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: do not use zero for FC4_PRIORITY_NVME (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: qla2xxx: fix fcport null pointer access (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: fix rports not being mark as lost in sync fabric scan (bsc#1138039).\n- scsi: qla2xxx: fix spelling mistake \u0027alredy\u0027 -\u003e \u0027already\u0027 (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: fix spelling mistake \u0027initializatin\u0027 -\u003e \u0027initialization\u0027 (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: fixup incorrect usage of host_byte (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: flush IO on chip reset or sess delete (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: initialize fc4_type_priority (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: qla2xxx: move IO flush to the front of NVME rport unregistration (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: no need to check return value of debugfs_create functions (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: on session delete, return nvme cmd (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: qla2x00_alloc_fw_dump: set ha-\u003eeft (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: remove double assignment in qla2x00_update_fcport (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: remove redundant assignment to pointer host (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: remove redundant assignment to pointer host (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: remove redundant null check on pointer sess (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: stop timer in shutdown path (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: target: Fix offline port handling and host reset handling (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: unregister ports after GPN_FT failure (bsc#1138039).\n- scsi: scsi_transport_fc: nvme: display FC-NVMe port roles (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: sd: Defer spinning up drive while SANITIZE is in progress (git-fixes).\n- scsi: sd: Fix a race between closing an sd device and sd I/O (git-fixes).\n- scsi: sd: Fix cache_type_store() (git-fixes).\n- scsi: sd: Ignore a failure to sync cache due to lack of authorization (git-fixes).\n- scsi: sd: Optimal I/O size should be a multiple of physical block size (git-fixes).\n- scsi: sd: Quiesce warning if device does not report optimal I/O size (git-fixes).\n- scsi: sd_zbc: Fix potential memory leak (git-fixes).\n- scsi: sr: Avoid that opening a CD-ROM hangs with runtime power management enabled (git-fixes).\n- scsi: storvsc: Add ability to change scsi queue depth (bsc#1155021).\n- scsi: storvsc: setup 1:1 mapping between hardware queue and CPU queue (bsc#1140729).\n- scsi: tcm_qla2xxx: Minimize #include directives (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: ufs: fix wrong command type of UTRD for UFSHCI v2.1 (git-fixes).\n- scsi: use dma_get_cache_alignment() as minimum DMA alignment (git-fixes).\n- scsi: virtio_scsi: do not send sc payload with tmfs (git-fixes).\n- scsi: zfcp: fix reaction on bit error threshold notification (bsc#1154956 LTC#182054).\n- scsi: zfcp: fix request object use-after-free in send path causing wrong traces (bsc#1051510).\n- scsi: zfcp: trace channel log even for FCP command responses (git-fixes).\n- scsi_transport_fc: complete requests from -\u003etimeout (bsc#1142076).\n- sctp: Fix regression (bsc#1158082).\n- sctp: Fix the link time qualifier of \u0027sctp_ctrlsock_exit()\u0027 (networking-stable-19_09_15).\n- sctp: change sctp_prot .no_autobind with true (networking-stable-19_10_24).\n- sctp: fix the transport error_count check (networking-stable-19_08_21).\n- sctp: use transport pf_retrans in sctp_do_8_2_transport_strike (networking-stable-19_09_15).\n- selftests: net: reuseport_dualstack: fix uninitalized parameter (networking-stable-19_11_05).\n- serial: fix kernel-doc warning in comments (bsc#1051510).\n- serial: max310x: Fix tx_empty() callback (bsc#1051510).\n- serial: mctrl_gpio: Check for NULL pointer (bsc#1051510).\n- serial: mxs-auart: Fix potential infinite loop (bsc#1051510).\n- serial: samsung: Enable baud clock for UART reset procedure in resume (bsc#1051510).\n- serial: uartlite: fix exit path null pointer (bsc#1051510).\n- serial: uartps: Fix suspend functionality (bsc#1051510).\n- series.conf: Move iommu patches into sorted section.\n- signal: Properly set TRACE_SIGNAL_LOSE_INFO in __send_signal (bsc#1157463).\n- skge: fix checksum byte order (networking-stable-19_09_30).\n- sky2: Disable MSI on yet another ASUS boards (P6Xxxx) (bsc#1051510).\n- slcan: Fix memory leak in error path (bsc#1051510).\n- slip: Fix memory leak in slip_open error path (bsc#1051510).\n- slip: Fix use-after-free Read in slip_open (bsc#1051510).\n- slip: make slhc_free() silently accept an error pointer (bsc#1051510).\n- slip: sl_alloc(): remove unused parameter \u0027dev_t line\u0027 (bsc#1051510).\n- smb3: Incorrect size for netname negotiate context (bsc#1144333, bsc#1154355).\n- smb3: fix leak in \u0027open on server\u0027 perf counter (bsc#1144333, bsc#1154355).\n- smb3: fix signing verification of large reads (bsc#1144333, bsc#1154355).\n- smb3: fix unmount hang in open_shroot (bsc#1144333, bsc#1154355).\n- smb3: improve handling of share deleted (and share recreated) (bsc#1144333, bsc#1154355).\n- soc: imx: gpc: fix PDN delay (bsc#1051510).\n- soc: qcom: wcnss_ctrl: Avoid string overflow (bsc#1051510).\n- sock_diag: fix autoloading of the raw_diag module (bsc#1152791).\n- sock_diag: request _diag module only when the family or proto has been registered (bsc#1152791).\n- spi: atmel: Fix CS high support (bsc#1051510).\n- spi: atmel: fix handling of cs_change set on non-last xfer (bsc#1051510).\n- spi: bcm2835aux: fix corruptions for longer spi transfers (bsc#1051510).\n- spi: bcm2835aux: remove dangerous uncontrolled read of fifo (bsc#1051510).\n- spi: bcm2835aux: unifying code between polling and interrupt driven code (bsc#1051510).\n- spi: fsl-lpspi: Prevent FIFO under/overrun by default (bsc#1051510).\n- spi: mediatek: Do not modify spi_transfer when transfer (bsc#1051510).\n- spi: mediatek: use correct mata-\u003exfer_len when in fifo transfer (bsc#1051510).\n- spi: omap2-mcspi: Fix DMA and FIFO event trigger size mismatch (bsc#1051510).\n- spi: omap2-mcspi: Set FIFO DMA trigger level to word length (bsc#1051510).\n- spi: pic32: Use proper enum in dmaengine_prep_slave_rg (bsc#1051510).\n- spi: rockchip: initialize dma_slave_config properly (bsc#1051510).\n- spi: spi-fsl-dspi: Exit the ISR with IRQ_NONE when it\u0027s not ours (bsc#1111666).\n- spi: spidev: Fix OF tree warning logic (bsc#1051510).\n- staging: bcm2835-audio: Fix draining behavior regression (bsc#1111666).\n- staging: rtl8188eu: fix null dereference when kzalloc fails (bsc#1051510).\n- staging: rtl8192e: fix potential use after free (bsc#1051510).\n- staging: rtl8723bs: Add 024c:0525 to the list of SDIO device-ids (bsc#1051510).\n- staging: rtl8723bs: Drop ACPI device ids (bsc#1051510).\n- staging: vt6655: Fix memory leak in vt6655_probe (bsc#1051510).\n- staging: wlan-ng: fix exit return when sme-\u003ekey_idx \u003e= NUM_WEPKEYS (bsc#1051510).\n- stm class: Fix a double free of stm_source_device (bsc#1051510).\n- supporte.conf: add efivarfs to kernel-default-base (bsc#1154858).\n- supported.conf:\n- supported.conf: Mark vfio_ccw supported by SUSE, because bugs can be routed to IBM via SUSE support (jsc#SLE-6138, bsc#1151192).\n- synclink_gt(): fix compat_ioctl() (bsc#1051510).\n- tcp: Do not dequeue SYN/FIN-segments from write-queue (git-gixes).\n- tcp: fix tcp_ecn_withdraw_cwr() to clear TCP_ECN_QUEUE_CWR (networking-stable-19_09_15).\n- tcp: inherit timestamp on mtu probe (networking-stable-19_09_05).\n- tcp: make sure EPOLLOUT wont be missed (networking-stable-19_08_28).\n- tcp: remove empty skb from write queue in error cases (networking-stable-19_09_05).\n- tcp_nv: fix potential integer overflow in tcpnv_acked (bsc#1051510).\n- team: Add vlan tx offload to hw_enc_features (bsc#1051510).\n- team: Add vlan tx offload to hw_enc_features (networking-stable-19_08_21).\n- temporarily disable debug_pagealloc (bsc#1159096).\n- thermal: Fix deadlock in thermal thermal_zone_device_check (bsc#1051510).\n- thermal: Fix use-after-free when unregistering thermal zone device (bsc#1051510).\n- thermal_hwmon: Sanitize thermal_zone type (bsc#1051510).\n- thunderbolt: Fix lockdep circular locking depedency warning (git-fixes).\n- tipc: Avoid copying bytes beyond the supplied data (bsc#1051510).\n- tipc: add NULL pointer check before calling kfree_rcu (networking-stable-19_09_15).\n- tipc: check bearer name with right length in tipc_nl_compat_bearer_enable (bsc#1051510).\n- tipc: check link name with right length in tipc_nl_compat_link_set (bsc#1051510).\n- tipc: check msg-\u003ereq data len in tipc_nl_compat_bearer_disable (bsc#1051510).\n- tipc: compat: allow tipc commands without arguments (bsc#1051510).\n- tipc: fix a missing check of genlmsg_put (bsc#1051510).\n- tipc: fix link name length check (bsc#1051510).\n- tipc: fix link name length check (git-fixes).\n- tipc: fix memory leak in tipc_nl_compat_publ_dump (bsc#1051510).\n- tipc: fix skb may be leaky in tipc_link_input (bsc#1051510).\n- tipc: fix tipc_mon_delete() oops in tipc_enable_bearer() error path (bsc#1051510).\n- tipc: fix unlimited bundling of small messages (networking-stable-19_10_05).\n- tipc: fix wrong timeout input for tipc_wait_for_cond() (bsc#1051510).\n- tipc: handle the err returned from cmd header function (bsc#1051510).\n- tipc: pass tunnel dev as NULL to udp_tunnel(6)_xmit_skb (bsc#1051510).\n- tipc: tipc clang warning (bsc#1051510).\n- tools/power/x86/intel-speed-select: Fix a read overflow in isst_set_tdp_level_msr() (bsc#1111666).\n- tools: bpftool: close prog FD before exit on showing a single program (bsc#1109837).\n- tools: bpftool: fix arguments for p_err() in do_event_pipe() (bsc#1109837).\n- tools: bpftool: fix error message (prog -\u003e object) (bsc#1109837).\n- tpm: add check after commands attribs tab allocation (bsc#1051510).\n- tpm_tis_core: Set TPM_CHIP_FLAG_IRQ before probing for interrupts (bsc#1082555).\n- tracing: Get trace_array reference for available_tracers files (bsc#1156429).\n- tracing: Initialize iter-\u003eseq after zeroing in tracing_read_pipe() (bsc#1151508).\n- tty: serial: fsl_lpuart: Use appropriate lpuart32_* I/O funcs (bsc#1111666).\n- tty: serial: fsl_lpuart: use the sg count from dma_map_sg (bsc#1051510).\n- tty: serial: imx: use the sg count from dma_map_sg (bsc#1051510).\n- tty: serial: msm_serial: Fix flow control (bsc#1051510).\n- tty: serial: pch_uart: correct usage of dma_unmap_sg (bsc#1051510).\n- tun: fix data-race in gro_normal_list() (bsc#1111666).\n- tun: fix use-after-free when register netdev failed (bsc#1111666).\n- tun: fix use-after-free when register netdev failed (networking-stable-19_09_15).\n- tuntap: correctly set SOCKWQ_ASYNC_NOSPACE (bsc#1145099).\n- tuntap: correctly set SOCKWQ_ASYNC_NOSPACE (bsc#1145099).\n- uaccess: Add non-pagefault user-space write function (bsc#1083647).\n- ubifs: Correctly initialize c-\u003emin_log_bytes (bsc#1158641).\n- ubifs: Limit the number of pages in shrink_liability (bsc#1158643).\n- udp: use skb_queue_empty_lockless() (networking-stable-19_11_05).\n- usb-serial: cp201x: support Mark-10 digital force gauge (bsc#1051510).\n- usb-storage: Add new JMS567 revision to unusual_devs (bsc#1051510).\n- usb-storage: Revert commit 747668dbc061 (\u0027usb-storage: Set virt_boundary_mask to avoid SG overflows\u0027) (bsc#1051510).\n- usb: chipidea: Fix otg event handler (bsc#1051510).\n- usb: chipidea: imx: enable OTG overcurrent in case USB subsystem is already started (bsc#1051510).\n- usb: chipidea: udc: do not do hardware access if gadget has stopped (bsc#1051510).\n- usb: dwc3: gadget: Check ENBLSLPM before sending ep command (bsc#1051510).\n- usb: gadget: composite: Clear \u0027suspended\u0027 on reset/disconnect (bsc#1051510).\n- usb: gadget: udc: atmel: Fix interrupt storm in FIFO mode (bsc#1051510).\n- usb: gadget: udc: fotg210-udc: Fix a sleep-in-atomic-context bug in fotg210_get_status() (bsc#1051510).\n- usb: gadget: uvc: Factor out video USB request queueing (bsc#1051510).\n- usb: gadget: uvc: Only halt video streaming endpoint in bulk mode (bsc#1051510).\n- usb: gadget: uvc: configfs: Drop leaked references to config items (bsc#1051510).\n- usb: gadget: uvc: configfs: Prevent format changes after linking header (bsc#1051510).\n- usb: handle warm-reset port requests on hub resume (bsc#1051510).\n- usb: host: fotg2: restart hcd after port reset (bsc#1051510).\n- usb: host: ohci: fix a race condition between shutdown and irq (bsc#1051510).\n- usb: udc: lpc32xx: fix bad bit shift operation (bsc#1051510).\n- usb: xhci-mtk: fix ISOC error when interval is zero (bsc#1051510).\n- usb: xhci: wait for CNR controller not ready bit in xhci resume (bsc#1051510).\n- usbip: Fix free of unallocated memory in vhci tx (git-fixes).\n- usbip: Fix receive error in vhci-hcd when using scatter-gather (bsc#1051510).\n- usbip: Fix vhci_urb_enqueue() URB null transfer buffer error path (git-fixes).\n- usbip: Implement SG support to vhci-hcd and stub driver (git-fixes).\n- usbip: tools: fix fd leakage in the function of read_attr_usbip_status (git-fixes).\n- usbnet: ignore endpoints with invalid wMaxPacketSize (bsc#1051510).\n- usbnet: sanity checking of packet sizes and device mtu (bsc#1051510).\n- vfio-ccw: Fix misleading comment when setting orb.cmd.c64 (bsc#1051510).\n- vfio-ccw: Set pa_nr to 0 if memory allocation fails for pa_iova_pfn (bsc#1051510).\n- vfio: ccw: fix bad ptr math for TIC cda translation (bsc#1154244).\n- vfio: ccw: push down unsupported IDA check (bsc#1156471 LTC#182362).\n- vfio_pci: Restore original state on release (bsc#1051510).\n- vfs: fix preadv64v2 and pwritev64v2 compat syscalls with offset == -1 (bsc#1051510).\n- vhost/test: fix build for vhost test (bsc#1111666).\n- vhost_net: conditionally enable tx polling (bsc#1145099).\n- vhost_net: conditionally enable tx polling (bsc#1145099).\n- video/hdmi: Fix AVI bar unpack (git-fixes).\n- video: backlight: Add devres versions of of_find_backlight (bsc#1090888) Taken for 6010831dde5.\n- video: backlight: Add of_find_backlight helper in backlight.c (bsc#1090888) Taken for 6010831dde5.\n- video: of: display_timing: Add of_node_put() in of_get_display_timing() (bsc#1051510).\n- video: ssd1307fb: Start page range at page_offset (bsc#1113722)\n- video: ssd1307fb: Start page range at page_offset (bsc#1152446)\n- virtio/s390: fix race on airq_areas (bsc#1051510).\n- virtio_console: allocate inbufs in add_port() only if it is needed (git-fixes).\n- virtio_ring: fix return code on DMA mapping fails (git-fixes).\n- vmxnet3: turn off lro when rxcsum is disabled (bsc#1157499).\n- vsock/virtio: fix sock refcnt holding during the shutdown (git-fixes).\n- vsock: Fix a lockdep warning in __vsock_release() (networking-stable-19_10_05).\n- watchdog: bcm2835_wdt: Fix module autoload (bsc#1051510).\n- watchdog: fix compile time error of pretimeout governors (bsc#1051510).\n- watchdog: imx2_wdt: fix min() calculation in imx2_wdt_set_timeout (bsc#1051510).\n- watchdog: meson: Fix the wrong value of left time (bsc#1051510).\n- watchdog: sama5d4: fix WDD value to be always set to max (bsc#1051510).\n- wcn36xx: use dynamic allocation for large variables (bsc#1111666).\n- wil6210: drop Rx multicast packets that are looped-back to STA (bsc#1111666).\n- wil6210: fix L2 RX status handling (bsc#1111666).\n- wil6210: fix RGF_CAF_ICR address for Talyn-MB (bsc#1111666).\n- wil6210: fix debugfs memory access alignment (bsc#1111666).\n- wil6210: fix freeing of rx buffers in EDMA mode (bsc#1111666).\n- wil6210: fix invalid memory access for rx_buff_mgmt debugfs (bsc#1111666).\n- wil6210: fix locking in wmi_call (bsc#1111666).\n- wil6210: prevent usage of tx ring 0 for eDMA (bsc#1111666).\n- wil6210: set edma variables only for Talyn-MB devices (bsc#1111666).\n- wimax/i2400m: fix a memory leak bug (bsc#1051510).\n- x86/CPU/AMD: Clear RDRAND CPUID bit on AMD family 15h/16h (bsc#1114279).\n- x86/alternatives: Add int3_emulate_call() selftest (bsc#1153811).\n- x86/alternatives: Fix int3_emulate_call() selftest stack corruption (bsc#1153811).\n- x86/asm: Fix MWAITX C-state hint value (bsc#1114279).\n- x86/boot/64: Make level2_kernel_pgt pages invalid outside kernel area (bnc#1153969).\n- x86/boot/64: Round memory hole size up to next PMD page (bnc#1153969).\n- x86/entry/64/compat: Fix stack switching for XEN PV (bsc#1108382).\n- x86/fpu: Add FPU state copying quirk to handle XRSTOR failure on Intel Skylake CPUs (bsc#1151955).\n- x86/mm/pkeys: Fix typo in Documentation/x86/protection-keys.txt (bsc#1078248).\n- x86/mm: Use WRITE_ONCE() when setting PTEs (bsc#1114279).\n- x86/pkeys: Update documentation about availability (bsc#1078248).\n- x86/resctrl: Fix potential lockdep warning (bsc#1114279).\n- x86/resctrl: Prevent NULL pointer dereference when reading mondata (bsc#1114279).\n- x86/speculation/taa: Fix printing of TAA_MSG_SMT on IBRS_ALL CPUs (bsc#1158068).\n- x86/speculation: Fix incorrect MDS/TAA mitigation status (bsc#1114279).\n- x86/speculation: Fix redundant MDS mitigation message (bsc#1114279).\n- x86/tls: Fix possible spectre-v1 in do_get_thread_area() (bsc#1114279).\n- xdp: unpin xdp umem pages in error path (bsc#1109837).\n- xen-netfront: do not assume sk_buff_head list is empty in error handling (bsc#1065600).\n- xen-netfront: do not use ~0U as error return value for xennet_fill_frags() (bsc#1065600).\n- xen/blkback: Avoid unmapping unmapped grant pages (bsc#1065600).\n- xen/netback: Reset nr_frags before freeing skb (networking-stable-19_08_21).\n- xen/netback: fix error path of xenvif_connect_data() (bsc#1065600).\n- xen/pv: Fix Xen PV guest int3 handling (bsc#1153811).\n- xen/xenbus: fix self-deadlock after killing user process (bsc#1065600).\n- xfrm: Fix xfrm sel prefix length validation (git-fixes).\n- xfrm: fix sa selector validation (bsc#1156609).\n- xfs: Sanity check flags of Q_XQUOTARM call (bsc#1158652).\n- xhci: Check all endpoints for LPM timeout (bsc#1051510).\n- xhci: Fix false warning message about wrong bounce buffer write length (bsc#1051510).\n- xhci: Increase STS_HALT timeout in xhci_suspend() (bsc#1051510).\n- xhci: Increase STS_SAVE timeout in xhci_suspend() (bsc#1051510).\n- xhci: Prevent device initiated U1/U2 link pm if exit latency is too long (bsc#1051510).\n- xhci: handle some XHCI_TRUST_TX_LENGTH quirks cases as default behaviour (bsc#1051510).\n- xsk: Fix registration of Rx-only sockets (bsc#1109837).\n- xsk: avoid store-tearing when assigning queues (bsc#1111666).\n- xsk: avoid store-tearing when assigning umem (bsc#1111666).\n- xsk: relax UMEM headroom alignment (bsc#1109837).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2020-93,SUSE-SLE-SERVER-12-SP5-2020-93",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_0093-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2020:0093-1",
"url": "https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2020:0093-1",
"url": "https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html"
},
{
"category": "self",
"summary": "SUSE Bug 1046299",
"url": "https://bugzilla.suse.com/1046299"
},
{
"category": "self",
"summary": "SUSE Bug 1046303",
"url": "https://bugzilla.suse.com/1046303"
},
{
"category": "self",
"summary": "SUSE Bug 1046305",
"url": "https://bugzilla.suse.com/1046305"
},
{
"category": "self",
"summary": "SUSE Bug 1048942",
"url": "https://bugzilla.suse.com/1048942"
},
{
"category": "self",
"summary": "SUSE Bug 1050244",
"url": "https://bugzilla.suse.com/1050244"
},
{
"category": "self",
"summary": "SUSE Bug 1050536",
"url": "https://bugzilla.suse.com/1050536"
},
{
"category": "self",
"summary": "SUSE Bug 1050545",
"url": "https://bugzilla.suse.com/1050545"
},
{
"category": "self",
"summary": "SUSE Bug 1051510",
"url": "https://bugzilla.suse.com/1051510"
},
{
"category": "self",
"summary": "SUSE Bug 1055117",
"url": "https://bugzilla.suse.com/1055117"
},
{
"category": "self",
"summary": "SUSE Bug 1055186",
"url": "https://bugzilla.suse.com/1055186"
},
{
"category": "self",
"summary": "SUSE Bug 1061840",
"url": "https://bugzilla.suse.com/1061840"
},
{
"category": "self",
"summary": "SUSE Bug 1064802",
"url": "https://bugzilla.suse.com/1064802"
},
{
"category": "self",
"summary": "SUSE Bug 1065600",
"url": "https://bugzilla.suse.com/1065600"
},
{
"category": "self",
"summary": "SUSE Bug 1065729",
"url": "https://bugzilla.suse.com/1065729"
},
{
"category": "self",
"summary": "SUSE Bug 1066129",
"url": "https://bugzilla.suse.com/1066129"
},
{
"category": "self",
"summary": "SUSE Bug 1071995",
"url": "https://bugzilla.suse.com/1071995"
},
{
"category": "self",
"summary": "SUSE Bug 1073513",
"url": "https://bugzilla.suse.com/1073513"
},
{
"category": "self",
"summary": "SUSE Bug 1078248",
"url": "https://bugzilla.suse.com/1078248"
},
{
"category": "self",
"summary": "SUSE Bug 1082555",
"url": "https://bugzilla.suse.com/1082555"
},
{
"category": "self",
"summary": "SUSE Bug 1082635",
"url": "https://bugzilla.suse.com/1082635"
},
{
"category": "self",
"summary": "SUSE Bug 1083647",
"url": "https://bugzilla.suse.com/1083647"
},
{
"category": "self",
"summary": "SUSE Bug 1086323",
"url": "https://bugzilla.suse.com/1086323"
},
{
"category": "self",
"summary": "SUSE Bug 1087092",
"url": "https://bugzilla.suse.com/1087092"
},
{
"category": "self",
"summary": "SUSE Bug 1089644",
"url": "https://bugzilla.suse.com/1089644"
},
{
"category": "self",
"summary": "SUSE Bug 1090631",
"url": "https://bugzilla.suse.com/1090631"
},
{
"category": "self",
"summary": "SUSE Bug 1090888",
"url": "https://bugzilla.suse.com/1090888"
},
{
"category": "self",
"summary": "SUSE Bug 1091041",
"url": "https://bugzilla.suse.com/1091041"
},
{
"category": "self",
"summary": "SUSE Bug 1093205",
"url": "https://bugzilla.suse.com/1093205"
},
{
"category": "self",
"summary": "SUSE Bug 1096254",
"url": "https://bugzilla.suse.com/1096254"
},
{
"category": "self",
"summary": "SUSE Bug 1097583",
"url": "https://bugzilla.suse.com/1097583"
},
{
"category": "self",
"summary": "SUSE Bug 1097584",
"url": "https://bugzilla.suse.com/1097584"
},
{
"category": "self",
"summary": "SUSE Bug 1097585",
"url": "https://bugzilla.suse.com/1097585"
},
{
"category": "self",
"summary": "SUSE Bug 1097586",
"url": "https://bugzilla.suse.com/1097586"
},
{
"category": "self",
"summary": "SUSE Bug 1097587",
"url": "https://bugzilla.suse.com/1097587"
},
{
"category": "self",
"summary": "SUSE Bug 1097588",
"url": "https://bugzilla.suse.com/1097588"
},
{
"category": "self",
"summary": "SUSE Bug 1098291",
"url": "https://bugzilla.suse.com/1098291"
},
{
"category": "self",
"summary": "SUSE Bug 1101674",
"url": "https://bugzilla.suse.com/1101674"
},
{
"category": "self",
"summary": "SUSE Bug 1103989",
"url": "https://bugzilla.suse.com/1103989"
},
{
"category": "self",
"summary": "SUSE Bug 1103990",
"url": "https://bugzilla.suse.com/1103990"
},
{
"category": "self",
"summary": "SUSE Bug 1103991",
"url": "https://bugzilla.suse.com/1103991"
},
{
"category": "self",
"summary": "SUSE Bug 1104353",
"url": "https://bugzilla.suse.com/1104353"
},
{
"category": "self",
"summary": "SUSE Bug 1104427",
"url": "https://bugzilla.suse.com/1104427"
},
{
"category": "self",
"summary": "SUSE Bug 1104745",
"url": "https://bugzilla.suse.com/1104745"
},
{
"category": "self",
"summary": "SUSE Bug 1104967",
"url": "https://bugzilla.suse.com/1104967"
},
{
"category": "self",
"summary": "SUSE Bug 1106434",
"url": "https://bugzilla.suse.com/1106434"
},
{
"category": "self",
"summary": "SUSE Bug 1108043",
"url": "https://bugzilla.suse.com/1108043"
},
{
"category": "self",
"summary": "SUSE Bug 1108382",
"url": "https://bugzilla.suse.com/1108382"
},
{
"category": "self",
"summary": "SUSE Bug 1109158",
"url": "https://bugzilla.suse.com/1109158"
},
{
"category": "self",
"summary": "SUSE Bug 1109837",
"url": "https://bugzilla.suse.com/1109837"
},
{
"category": "self",
"summary": "SUSE Bug 1111666",
"url": "https://bugzilla.suse.com/1111666"
},
{
"category": "self",
"summary": "SUSE Bug 1112178",
"url": "https://bugzilla.suse.com/1112178"
},
{
"category": "self",
"summary": "SUSE Bug 1112374",
"url": "https://bugzilla.suse.com/1112374"
},
{
"category": "self",
"summary": "SUSE Bug 1113722",
"url": "https://bugzilla.suse.com/1113722"
},
{
"category": "self",
"summary": "SUSE Bug 1113956",
"url": "https://bugzilla.suse.com/1113956"
},
{
"category": "self",
"summary": "SUSE Bug 1113994",
"url": "https://bugzilla.suse.com/1113994"
},
{
"category": "self",
"summary": "SUSE Bug 1114279",
"url": "https://bugzilla.suse.com/1114279"
},
{
"category": "self",
"summary": "SUSE Bug 1115026",
"url": "https://bugzilla.suse.com/1115026"
},
{
"category": "self",
"summary": "SUSE Bug 1117169",
"url": "https://bugzilla.suse.com/1117169"
},
{
"category": "self",
"summary": "SUSE Bug 1117665",
"url": "https://bugzilla.suse.com/1117665"
},
{
"category": "self",
"summary": "SUSE Bug 1118661",
"url": "https://bugzilla.suse.com/1118661"
},
{
"category": "self",
"summary": "SUSE Bug 1119086",
"url": "https://bugzilla.suse.com/1119086"
},
{
"category": "self",
"summary": "SUSE Bug 1119113",
"url": "https://bugzilla.suse.com/1119113"
},
{
"category": "self",
"summary": "SUSE Bug 1119461",
"url": "https://bugzilla.suse.com/1119461"
},
{
"category": "self",
"summary": "SUSE Bug 1119465",
"url": "https://bugzilla.suse.com/1119465"
},
{
"category": "self",
"summary": "SUSE Bug 1120853",
"url": "https://bugzilla.suse.com/1120853"
},
{
"category": "self",
"summary": "SUSE Bug 1120902",
"url": "https://bugzilla.suse.com/1120902"
},
{
"category": "self",
"summary": "SUSE Bug 1122363",
"url": "https://bugzilla.suse.com/1122363"
},
{
"category": "self",
"summary": "SUSE Bug 1123034",
"url": "https://bugzilla.suse.com/1123034"
},
{
"category": "self",
"summary": "SUSE Bug 1123080",
"url": "https://bugzilla.suse.com/1123080"
},
{
"category": "self",
"summary": "SUSE Bug 1123105",
"url": "https://bugzilla.suse.com/1123105"
},
{
"category": "self",
"summary": "SUSE Bug 1126206",
"url": "https://bugzilla.suse.com/1126206"
},
{
"category": "self",
"summary": "SUSE Bug 1126390",
"url": "https://bugzilla.suse.com/1126390"
},
{
"category": "self",
"summary": "SUSE Bug 1127155",
"url": "https://bugzilla.suse.com/1127155"
},
{
"category": "self",
"summary": "SUSE Bug 1127354",
"url": "https://bugzilla.suse.com/1127354"
},
{
"category": "self",
"summary": "SUSE Bug 1127371",
"url": "https://bugzilla.suse.com/1127371"
},
{
"category": "self",
"summary": "SUSE Bug 1127611",
"url": "https://bugzilla.suse.com/1127611"
},
{
"category": "self",
"summary": "SUSE Bug 1127988",
"url": "https://bugzilla.suse.com/1127988"
},
{
"category": "self",
"summary": "SUSE Bug 1129770",
"url": "https://bugzilla.suse.com/1129770"
},
{
"category": "self",
"summary": "SUSE Bug 1131107",
"url": "https://bugzilla.suse.com/1131107"
},
{
"category": "self",
"summary": "SUSE Bug 1131304",
"url": "https://bugzilla.suse.com/1131304"
},
{
"category": "self",
"summary": "SUSE Bug 1131489",
"url": "https://bugzilla.suse.com/1131489"
},
{
"category": "self",
"summary": "SUSE Bug 1133140",
"url": "https://bugzilla.suse.com/1133140"
},
{
"category": "self",
"summary": "SUSE Bug 1134476",
"url": "https://bugzilla.suse.com/1134476"
},
{
"category": "self",
"summary": "SUSE Bug 1134973",
"url": "https://bugzilla.suse.com/1134973"
},
{
"category": "self",
"summary": "SUSE Bug 1134983",
"url": "https://bugzilla.suse.com/1134983"
},
{
"category": "self",
"summary": "SUSE Bug 1135642",
"url": "https://bugzilla.suse.com/1135642"
},
{
"category": "self",
"summary": "SUSE Bug 1135854",
"url": "https://bugzilla.suse.com/1135854"
},
{
"category": "self",
"summary": "SUSE Bug 1135873",
"url": "https://bugzilla.suse.com/1135873"
},
{
"category": "self",
"summary": "SUSE Bug 1135966",
"url": "https://bugzilla.suse.com/1135966"
},
{
"category": "self",
"summary": "SUSE Bug 1135967",
"url": "https://bugzilla.suse.com/1135967"
},
{
"category": "self",
"summary": "SUSE Bug 1136261",
"url": "https://bugzilla.suse.com/1136261"
},
{
"category": "self",
"summary": "SUSE Bug 1137040",
"url": "https://bugzilla.suse.com/1137040"
},
{
"category": "self",
"summary": "SUSE Bug 1137069",
"url": "https://bugzilla.suse.com/1137069"
},
{
"category": "self",
"summary": "SUSE Bug 1137223",
"url": "https://bugzilla.suse.com/1137223"
},
{
"category": "self",
"summary": "SUSE Bug 1137236",
"url": "https://bugzilla.suse.com/1137236"
},
{
"category": "self",
"summary": "SUSE Bug 1137799",
"url": "https://bugzilla.suse.com/1137799"
},
{
"category": "self",
"summary": "SUSE Bug 1137861",
"url": "https://bugzilla.suse.com/1137861"
},
{
"category": "self",
"summary": "SUSE Bug 1137865",
"url": "https://bugzilla.suse.com/1137865"
},
{
"category": "self",
"summary": "SUSE Bug 1137959",
"url": "https://bugzilla.suse.com/1137959"
},
{
"category": "self",
"summary": "SUSE Bug 1137982",
"url": "https://bugzilla.suse.com/1137982"
},
{
"category": "self",
"summary": "SUSE Bug 1138039",
"url": "https://bugzilla.suse.com/1138039"
},
{
"category": "self",
"summary": "SUSE Bug 1138190",
"url": "https://bugzilla.suse.com/1138190"
},
{
"category": "self",
"summary": "SUSE Bug 1139073",
"url": "https://bugzilla.suse.com/1139073"
},
{
"category": "self",
"summary": "SUSE Bug 1140090",
"url": "https://bugzilla.suse.com/1140090"
},
{
"category": "self",
"summary": "SUSE Bug 1140155",
"url": "https://bugzilla.suse.com/1140155"
},
{
"category": "self",
"summary": "SUSE Bug 1140729",
"url": "https://bugzilla.suse.com/1140729"
},
{
"category": "self",
"summary": "SUSE Bug 1140845",
"url": "https://bugzilla.suse.com/1140845"
},
{
"category": "self",
"summary": "SUSE Bug 1140883",
"url": "https://bugzilla.suse.com/1140883"
},
{
"category": "self",
"summary": "SUSE Bug 1140948",
"url": "https://bugzilla.suse.com/1140948"
},
{
"category": "self",
"summary": "SUSE Bug 1141013",
"url": "https://bugzilla.suse.com/1141013"
},
{
"category": "self",
"summary": "SUSE Bug 1141340",
"url": "https://bugzilla.suse.com/1141340"
},
{
"category": "self",
"summary": "SUSE Bug 1141543",
"url": "https://bugzilla.suse.com/1141543"
},
{
"category": "self",
"summary": "SUSE Bug 1142076",
"url": "https://bugzilla.suse.com/1142076"
},
{
"category": "self",
"summary": "SUSE Bug 1142095",
"url": "https://bugzilla.suse.com/1142095"
},
{
"category": "self",
"summary": "SUSE Bug 1142635",
"url": "https://bugzilla.suse.com/1142635"
},
{
"category": "self",
"summary": "SUSE Bug 1142667",
"url": "https://bugzilla.suse.com/1142667"
},
{
"category": "self",
"summary": "SUSE Bug 1142924",
"url": "https://bugzilla.suse.com/1142924"
},
{
"category": "self",
"summary": "SUSE Bug 1143706",
"url": "https://bugzilla.suse.com/1143706"
},
{
"category": "self",
"summary": "SUSE Bug 1143959",
"url": "https://bugzilla.suse.com/1143959"
},
{
"category": "self",
"summary": "SUSE Bug 1144333",
"url": "https://bugzilla.suse.com/1144333"
},
{
"category": "self",
"summary": "SUSE Bug 1144338",
"url": "https://bugzilla.suse.com/1144338"
},
{
"category": "self",
"summary": "SUSE Bug 1144375",
"url": "https://bugzilla.suse.com/1144375"
},
{
"category": "self",
"summary": "SUSE Bug 1144449",
"url": "https://bugzilla.suse.com/1144449"
},
{
"category": "self",
"summary": "SUSE Bug 1144653",
"url": "https://bugzilla.suse.com/1144653"
},
{
"category": "self",
"summary": "SUSE Bug 1144903",
"url": "https://bugzilla.suse.com/1144903"
},
{
"category": "self",
"summary": "SUSE Bug 1145099",
"url": "https://bugzilla.suse.com/1145099"
},
{
"category": "self",
"summary": "SUSE Bug 1145661",
"url": "https://bugzilla.suse.com/1145661"
},
{
"category": "self",
"summary": "SUSE Bug 1146042",
"url": "https://bugzilla.suse.com/1146042"
},
{
"category": "self",
"summary": "SUSE Bug 1146519",
"url": "https://bugzilla.suse.com/1146519"
},
{
"category": "self",
"summary": "SUSE Bug 1146544",
"url": "https://bugzilla.suse.com/1146544"
},
{
"category": "self",
"summary": "SUSE Bug 1146612",
"url": "https://bugzilla.suse.com/1146612"
},
{
"category": "self",
"summary": "SUSE Bug 1146664",
"url": "https://bugzilla.suse.com/1146664"
},
{
"category": "self",
"summary": "SUSE Bug 1148133",
"url": "https://bugzilla.suse.com/1148133"
},
{
"category": "self",
"summary": "SUSE Bug 1148410",
"url": "https://bugzilla.suse.com/1148410"
},
{
"category": "self",
"summary": "SUSE Bug 1148712",
"url": "https://bugzilla.suse.com/1148712"
},
{
"category": "self",
"summary": "SUSE Bug 1148859",
"url": "https://bugzilla.suse.com/1148859"
},
{
"category": "self",
"summary": "SUSE Bug 1148868",
"url": "https://bugzilla.suse.com/1148868"
},
{
"category": "self",
"summary": "SUSE Bug 1149083",
"url": "https://bugzilla.suse.com/1149083"
},
{
"category": "self",
"summary": "SUSE Bug 1149119",
"url": "https://bugzilla.suse.com/1149119"
},
{
"category": "self",
"summary": "SUSE Bug 1149224",
"url": "https://bugzilla.suse.com/1149224"
},
{
"category": "self",
"summary": "SUSE Bug 1149446",
"url": "https://bugzilla.suse.com/1149446"
},
{
"category": "self",
"summary": "SUSE Bug 1149448",
"url": "https://bugzilla.suse.com/1149448"
},
{
"category": "self",
"summary": "SUSE Bug 1149555",
"url": "https://bugzilla.suse.com/1149555"
},
{
"category": "self",
"summary": "SUSE Bug 1149652",
"url": "https://bugzilla.suse.com/1149652"
},
{
"category": "self",
"summary": "SUSE Bug 1149713",
"url": "https://bugzilla.suse.com/1149713"
},
{
"category": "self",
"summary": "SUSE Bug 1149853",
"url": "https://bugzilla.suse.com/1149853"
},
{
"category": "self",
"summary": "SUSE Bug 1149940",
"url": "https://bugzilla.suse.com/1149940"
},
{
"category": "self",
"summary": "SUSE Bug 1149959",
"url": "https://bugzilla.suse.com/1149959"
},
{
"category": "self",
"summary": "SUSE Bug 1149963",
"url": "https://bugzilla.suse.com/1149963"
},
{
"category": "self",
"summary": "SUSE Bug 1149976",
"url": "https://bugzilla.suse.com/1149976"
},
{
"category": "self",
"summary": "SUSE Bug 1150025",
"url": "https://bugzilla.suse.com/1150025"
},
{
"category": "self",
"summary": "SUSE Bug 1150033",
"url": "https://bugzilla.suse.com/1150033"
},
{
"category": "self",
"summary": "SUSE Bug 1150112",
"url": "https://bugzilla.suse.com/1150112"
},
{
"category": "self",
"summary": "SUSE Bug 1150305",
"url": "https://bugzilla.suse.com/1150305"
},
{
"category": "self",
"summary": "SUSE Bug 1150381",
"url": "https://bugzilla.suse.com/1150381"
},
{
"category": "self",
"summary": "SUSE Bug 1150423",
"url": "https://bugzilla.suse.com/1150423"
},
{
"category": "self",
"summary": "SUSE Bug 1150452",
"url": "https://bugzilla.suse.com/1150452"
},
{
"category": "self",
"summary": "SUSE Bug 1150457",
"url": "https://bugzilla.suse.com/1150457"
},
{
"category": "self",
"summary": "SUSE Bug 1150465",
"url": "https://bugzilla.suse.com/1150465"
},
{
"category": "self",
"summary": "SUSE Bug 1150466",
"url": "https://bugzilla.suse.com/1150466"
},
{
"category": "self",
"summary": "SUSE Bug 1150562",
"url": "https://bugzilla.suse.com/1150562"
},
{
"category": "self",
"summary": "SUSE Bug 1150727",
"url": "https://bugzilla.suse.com/1150727"
},
{
"category": "self",
"summary": "SUSE Bug 1150846",
"url": "https://bugzilla.suse.com/1150846"
},
{
"category": "self",
"summary": "SUSE Bug 1150860",
"url": "https://bugzilla.suse.com/1150860"
},
{
"category": "self",
"summary": "SUSE Bug 1150861",
"url": "https://bugzilla.suse.com/1150861"
},
{
"category": "self",
"summary": "SUSE Bug 1150875",
"url": "https://bugzilla.suse.com/1150875"
},
{
"category": "self",
"summary": "SUSE Bug 1150933",
"url": "https://bugzilla.suse.com/1150933"
},
{
"category": "self",
"summary": "SUSE Bug 1151021",
"url": "https://bugzilla.suse.com/1151021"
},
{
"category": "self",
"summary": "SUSE Bug 1151067",
"url": "https://bugzilla.suse.com/1151067"
},
{
"category": "self",
"summary": "SUSE Bug 1151192",
"url": "https://bugzilla.suse.com/1151192"
},
{
"category": "self",
"summary": "SUSE Bug 1151225",
"url": "https://bugzilla.suse.com/1151225"
},
{
"category": "self",
"summary": "SUSE Bug 1151350",
"url": "https://bugzilla.suse.com/1151350"
},
{
"category": "self",
"summary": "SUSE Bug 1151508",
"url": "https://bugzilla.suse.com/1151508"
},
{
"category": "self",
"summary": "SUSE Bug 1151548",
"url": "https://bugzilla.suse.com/1151548"
},
{
"category": "self",
"summary": "SUSE Bug 1151610",
"url": "https://bugzilla.suse.com/1151610"
},
{
"category": "self",
"summary": "SUSE Bug 1151661",
"url": "https://bugzilla.suse.com/1151661"
},
{
"category": "self",
"summary": "SUSE Bug 1151662",
"url": "https://bugzilla.suse.com/1151662"
},
{
"category": "self",
"summary": "SUSE Bug 1151667",
"url": "https://bugzilla.suse.com/1151667"
},
{
"category": "self",
"summary": "SUSE Bug 1151671",
"url": "https://bugzilla.suse.com/1151671"
},
{
"category": "self",
"summary": "SUSE Bug 1151680",
"url": "https://bugzilla.suse.com/1151680"
},
{
"category": "self",
"summary": "SUSE Bug 1151807",
"url": "https://bugzilla.suse.com/1151807"
},
{
"category": "self",
"summary": "SUSE Bug 1151891",
"url": "https://bugzilla.suse.com/1151891"
},
{
"category": "self",
"summary": "SUSE Bug 1151900",
"url": "https://bugzilla.suse.com/1151900"
},
{
"category": "self",
"summary": "SUSE Bug 1151910",
"url": "https://bugzilla.suse.com/1151910"
},
{
"category": "self",
"summary": "SUSE Bug 1151955",
"url": "https://bugzilla.suse.com/1151955"
},
{
"category": "self",
"summary": "SUSE Bug 1152024",
"url": "https://bugzilla.suse.com/1152024"
},
{
"category": "self",
"summary": "SUSE Bug 1152025",
"url": "https://bugzilla.suse.com/1152025"
},
{
"category": "self",
"summary": "SUSE Bug 1152026",
"url": "https://bugzilla.suse.com/1152026"
},
{
"category": "self",
"summary": "SUSE Bug 1152033",
"url": "https://bugzilla.suse.com/1152033"
},
{
"category": "self",
"summary": "SUSE Bug 1152107",
"url": "https://bugzilla.suse.com/1152107"
},
{
"category": "self",
"summary": "SUSE Bug 1152161",
"url": "https://bugzilla.suse.com/1152161"
},
{
"category": "self",
"summary": "SUSE Bug 1152187",
"url": "https://bugzilla.suse.com/1152187"
},
{
"category": "self",
"summary": "SUSE Bug 1152325",
"url": "https://bugzilla.suse.com/1152325"
},
{
"category": "self",
"summary": "SUSE Bug 1152446",
"url": "https://bugzilla.suse.com/1152446"
},
{
"category": "self",
"summary": "SUSE Bug 1152457",
"url": "https://bugzilla.suse.com/1152457"
},
{
"category": "self",
"summary": "SUSE Bug 1152460",
"url": "https://bugzilla.suse.com/1152460"
},
{
"category": "self",
"summary": "SUSE Bug 1152466",
"url": "https://bugzilla.suse.com/1152466"
},
{
"category": "self",
"summary": "SUSE Bug 1152497",
"url": "https://bugzilla.suse.com/1152497"
},
{
"category": "self",
"summary": "SUSE Bug 1152505",
"url": "https://bugzilla.suse.com/1152505"
},
{
"category": "self",
"summary": "SUSE Bug 1152506",
"url": "https://bugzilla.suse.com/1152506"
},
{
"category": "self",
"summary": "SUSE Bug 1152525",
"url": "https://bugzilla.suse.com/1152525"
},
{
"category": "self",
"summary": "SUSE Bug 1152624",
"url": "https://bugzilla.suse.com/1152624"
},
{
"category": "self",
"summary": "SUSE Bug 1152631",
"url": "https://bugzilla.suse.com/1152631"
},
{
"category": "self",
"summary": "SUSE Bug 1152665",
"url": "https://bugzilla.suse.com/1152665"
},
{
"category": "self",
"summary": "SUSE Bug 1152685",
"url": "https://bugzilla.suse.com/1152685"
},
{
"category": "self",
"summary": "SUSE Bug 1152696",
"url": "https://bugzilla.suse.com/1152696"
},
{
"category": "self",
"summary": "SUSE Bug 1152697",
"url": "https://bugzilla.suse.com/1152697"
},
{
"category": "self",
"summary": "SUSE Bug 1152782",
"url": "https://bugzilla.suse.com/1152782"
},
{
"category": "self",
"summary": "SUSE Bug 1152788",
"url": "https://bugzilla.suse.com/1152788"
},
{
"category": "self",
"summary": "SUSE Bug 1152790",
"url": "https://bugzilla.suse.com/1152790"
},
{
"category": "self",
"summary": "SUSE Bug 1152791",
"url": "https://bugzilla.suse.com/1152791"
},
{
"category": "self",
"summary": "SUSE Bug 1152885",
"url": "https://bugzilla.suse.com/1152885"
},
{
"category": "self",
"summary": "SUSE Bug 1152972",
"url": "https://bugzilla.suse.com/1152972"
},
{
"category": "self",
"summary": "SUSE Bug 1152974",
"url": "https://bugzilla.suse.com/1152974"
},
{
"category": "self",
"summary": "SUSE Bug 1152975",
"url": "https://bugzilla.suse.com/1152975"
},
{
"category": "self",
"summary": "SUSE Bug 1153108",
"url": "https://bugzilla.suse.com/1153108"
},
{
"category": "self",
"summary": "SUSE Bug 1153112",
"url": "https://bugzilla.suse.com/1153112"
},
{
"category": "self",
"summary": "SUSE Bug 1153158",
"url": "https://bugzilla.suse.com/1153158"
},
{
"category": "self",
"summary": "SUSE Bug 1153236",
"url": "https://bugzilla.suse.com/1153236"
},
{
"category": "self",
"summary": "SUSE Bug 1153263",
"url": "https://bugzilla.suse.com/1153263"
},
{
"category": "self",
"summary": "SUSE Bug 1153476",
"url": "https://bugzilla.suse.com/1153476"
},
{
"category": "self",
"summary": "SUSE Bug 1153509",
"url": "https://bugzilla.suse.com/1153509"
},
{
"category": "self",
"summary": "SUSE Bug 1153607",
"url": "https://bugzilla.suse.com/1153607"
},
{
"category": "self",
"summary": "SUSE Bug 1153628",
"url": "https://bugzilla.suse.com/1153628"
},
{
"category": "self",
"summary": "SUSE Bug 1153646",
"url": "https://bugzilla.suse.com/1153646"
},
{
"category": "self",
"summary": "SUSE Bug 1153681",
"url": "https://bugzilla.suse.com/1153681"
},
{
"category": "self",
"summary": "SUSE Bug 1153713",
"url": "https://bugzilla.suse.com/1153713"
},
{
"category": "self",
"summary": "SUSE Bug 1153717",
"url": "https://bugzilla.suse.com/1153717"
},
{
"category": "self",
"summary": "SUSE Bug 1153718",
"url": "https://bugzilla.suse.com/1153718"
},
{
"category": "self",
"summary": "SUSE Bug 1153719",
"url": "https://bugzilla.suse.com/1153719"
},
{
"category": "self",
"summary": "SUSE Bug 1153811",
"url": "https://bugzilla.suse.com/1153811"
},
{
"category": "self",
"summary": "SUSE Bug 1153969",
"url": "https://bugzilla.suse.com/1153969"
},
{
"category": "self",
"summary": "SUSE Bug 1154043",
"url": "https://bugzilla.suse.com/1154043"
},
{
"category": "self",
"summary": "SUSE Bug 1154048",
"url": "https://bugzilla.suse.com/1154048"
},
{
"category": "self",
"summary": "SUSE Bug 1154058",
"url": "https://bugzilla.suse.com/1154058"
},
{
"category": "self",
"summary": "SUSE Bug 1154108",
"url": "https://bugzilla.suse.com/1154108"
},
{
"category": "self",
"summary": "SUSE Bug 1154124",
"url": "https://bugzilla.suse.com/1154124"
},
{
"category": "self",
"summary": "SUSE Bug 1154189",
"url": "https://bugzilla.suse.com/1154189"
},
{
"category": "self",
"summary": "SUSE Bug 1154242",
"url": "https://bugzilla.suse.com/1154242"
},
{
"category": "self",
"summary": "SUSE Bug 1154244",
"url": "https://bugzilla.suse.com/1154244"
},
{
"category": "self",
"summary": "SUSE Bug 1154268",
"url": "https://bugzilla.suse.com/1154268"
},
{
"category": "self",
"summary": "SUSE Bug 1154354",
"url": "https://bugzilla.suse.com/1154354"
},
{
"category": "self",
"summary": "SUSE Bug 1154355",
"url": "https://bugzilla.suse.com/1154355"
},
{
"category": "self",
"summary": "SUSE Bug 1154372",
"url": "https://bugzilla.suse.com/1154372"
},
{
"category": "self",
"summary": "SUSE Bug 1154521",
"url": "https://bugzilla.suse.com/1154521"
},
{
"category": "self",
"summary": "SUSE Bug 1154526",
"url": "https://bugzilla.suse.com/1154526"
},
{
"category": "self",
"summary": "SUSE Bug 1154578",
"url": "https://bugzilla.suse.com/1154578"
},
{
"category": "self",
"summary": "SUSE Bug 1154601",
"url": "https://bugzilla.suse.com/1154601"
},
{
"category": "self",
"summary": "SUSE Bug 1154607",
"url": "https://bugzilla.suse.com/1154607"
},
{
"category": "self",
"summary": "SUSE Bug 1154608",
"url": "https://bugzilla.suse.com/1154608"
},
{
"category": "self",
"summary": "SUSE Bug 1154610",
"url": "https://bugzilla.suse.com/1154610"
},
{
"category": "self",
"summary": "SUSE Bug 1154611",
"url": "https://bugzilla.suse.com/1154611"
},
{
"category": "self",
"summary": "SUSE Bug 1154651",
"url": "https://bugzilla.suse.com/1154651"
},
{
"category": "self",
"summary": "SUSE Bug 1154737",
"url": "https://bugzilla.suse.com/1154737"
},
{
"category": "self",
"summary": "SUSE Bug 1154768",
"url": "https://bugzilla.suse.com/1154768"
},
{
"category": "self",
"summary": "SUSE Bug 1154848",
"url": "https://bugzilla.suse.com/1154848"
},
{
"category": "self",
"summary": "SUSE Bug 1154858",
"url": "https://bugzilla.suse.com/1154858"
},
{
"category": "self",
"summary": "SUSE Bug 1154905",
"url": "https://bugzilla.suse.com/1154905"
},
{
"category": "self",
"summary": "SUSE Bug 1154916",
"url": "https://bugzilla.suse.com/1154916"
},
{
"category": "self",
"summary": "SUSE Bug 1154956",
"url": "https://bugzilla.suse.com/1154956"
},
{
"category": "self",
"summary": "SUSE Bug 1154959",
"url": "https://bugzilla.suse.com/1154959"
},
{
"category": "self",
"summary": "SUSE Bug 1155021",
"url": "https://bugzilla.suse.com/1155021"
},
{
"category": "self",
"summary": "SUSE Bug 1155061",
"url": "https://bugzilla.suse.com/1155061"
},
{
"category": "self",
"summary": "SUSE Bug 1155178",
"url": "https://bugzilla.suse.com/1155178"
},
{
"category": "self",
"summary": "SUSE Bug 1155179",
"url": "https://bugzilla.suse.com/1155179"
},
{
"category": "self",
"summary": "SUSE Bug 1155184",
"url": "https://bugzilla.suse.com/1155184"
},
{
"category": "self",
"summary": "SUSE Bug 1155186",
"url": "https://bugzilla.suse.com/1155186"
},
{
"category": "self",
"summary": "SUSE Bug 1155331",
"url": "https://bugzilla.suse.com/1155331"
},
{
"category": "self",
"summary": "SUSE Bug 1155334",
"url": "https://bugzilla.suse.com/1155334"
},
{
"category": "self",
"summary": "SUSE Bug 1155671",
"url": "https://bugzilla.suse.com/1155671"
},
{
"category": "self",
"summary": "SUSE Bug 1155689",
"url": "https://bugzilla.suse.com/1155689"
},
{
"category": "self",
"summary": "SUSE Bug 1155692",
"url": "https://bugzilla.suse.com/1155692"
},
{
"category": "self",
"summary": "SUSE Bug 1155812",
"url": "https://bugzilla.suse.com/1155812"
},
{
"category": "self",
"summary": "SUSE Bug 1155817",
"url": "https://bugzilla.suse.com/1155817"
},
{
"category": "self",
"summary": "SUSE Bug 1155836",
"url": "https://bugzilla.suse.com/1155836"
},
{
"category": "self",
"summary": "SUSE Bug 1155897",
"url": "https://bugzilla.suse.com/1155897"
},
{
"category": "self",
"summary": "SUSE Bug 1155921",
"url": "https://bugzilla.suse.com/1155921"
},
{
"category": "self",
"summary": "SUSE Bug 1155945",
"url": "https://bugzilla.suse.com/1155945"
},
{
"category": "self",
"summary": "SUSE Bug 1156187",
"url": "https://bugzilla.suse.com/1156187"
},
{
"category": "self",
"summary": "SUSE Bug 1156258",
"url": "https://bugzilla.suse.com/1156258"
},
{
"category": "self",
"summary": "SUSE Bug 1156259",
"url": "https://bugzilla.suse.com/1156259"
},
{
"category": "self",
"summary": "SUSE Bug 1156286",
"url": "https://bugzilla.suse.com/1156286"
},
{
"category": "self",
"summary": "SUSE Bug 1156429",
"url": "https://bugzilla.suse.com/1156429"
},
{
"category": "self",
"summary": "SUSE Bug 1156462",
"url": "https://bugzilla.suse.com/1156462"
},
{
"category": "self",
"summary": "SUSE Bug 1156466",
"url": "https://bugzilla.suse.com/1156466"
},
{
"category": "self",
"summary": "SUSE Bug 1156471",
"url": "https://bugzilla.suse.com/1156471"
},
{
"category": "self",
"summary": "SUSE Bug 1156494",
"url": "https://bugzilla.suse.com/1156494"
},
{
"category": "self",
"summary": "SUSE Bug 1156609",
"url": "https://bugzilla.suse.com/1156609"
},
{
"category": "self",
"summary": "SUSE Bug 1156700",
"url": "https://bugzilla.suse.com/1156700"
},
{
"category": "self",
"summary": "SUSE Bug 1156729",
"url": "https://bugzilla.suse.com/1156729"
},
{
"category": "self",
"summary": "SUSE Bug 1156882",
"url": "https://bugzilla.suse.com/1156882"
},
{
"category": "self",
"summary": "SUSE Bug 1156928",
"url": "https://bugzilla.suse.com/1156928"
},
{
"category": "self",
"summary": "SUSE Bug 1157032",
"url": "https://bugzilla.suse.com/1157032"
},
{
"category": "self",
"summary": "SUSE Bug 1157038",
"url": "https://bugzilla.suse.com/1157038"
},
{
"category": "self",
"summary": "SUSE Bug 1157042",
"url": "https://bugzilla.suse.com/1157042"
},
{
"category": "self",
"summary": "SUSE Bug 1157044",
"url": "https://bugzilla.suse.com/1157044"
},
{
"category": "self",
"summary": "SUSE Bug 1157045",
"url": "https://bugzilla.suse.com/1157045"
},
{
"category": "self",
"summary": "SUSE Bug 1157046",
"url": "https://bugzilla.suse.com/1157046"
},
{
"category": "self",
"summary": "SUSE Bug 1157049",
"url": "https://bugzilla.suse.com/1157049"
},
{
"category": "self",
"summary": "SUSE Bug 1157070",
"url": "https://bugzilla.suse.com/1157070"
},
{
"category": "self",
"summary": "SUSE Bug 1157115",
"url": "https://bugzilla.suse.com/1157115"
},
{
"category": "self",
"summary": "SUSE Bug 1157143",
"url": "https://bugzilla.suse.com/1157143"
},
{
"category": "self",
"summary": "SUSE Bug 1157145",
"url": "https://bugzilla.suse.com/1157145"
},
{
"category": "self",
"summary": "SUSE Bug 1157158",
"url": "https://bugzilla.suse.com/1157158"
},
{
"category": "self",
"summary": "SUSE Bug 1157160",
"url": "https://bugzilla.suse.com/1157160"
},
{
"category": "self",
"summary": "SUSE Bug 1157162",
"url": "https://bugzilla.suse.com/1157162"
},
{
"category": "self",
"summary": "SUSE Bug 1157169",
"url": "https://bugzilla.suse.com/1157169"
},
{
"category": "self",
"summary": "SUSE Bug 1157171",
"url": "https://bugzilla.suse.com/1157171"
},
{
"category": "self",
"summary": "SUSE Bug 1157173",
"url": "https://bugzilla.suse.com/1157173"
},
{
"category": "self",
"summary": "SUSE Bug 1157178",
"url": "https://bugzilla.suse.com/1157178"
},
{
"category": "self",
"summary": "SUSE Bug 1157180",
"url": "https://bugzilla.suse.com/1157180"
},
{
"category": "self",
"summary": "SUSE Bug 1157182",
"url": "https://bugzilla.suse.com/1157182"
},
{
"category": "self",
"summary": "SUSE Bug 1157183",
"url": "https://bugzilla.suse.com/1157183"
},
{
"category": "self",
"summary": "SUSE Bug 1157184",
"url": "https://bugzilla.suse.com/1157184"
},
{
"category": "self",
"summary": "SUSE Bug 1157191",
"url": "https://bugzilla.suse.com/1157191"
},
{
"category": "self",
"summary": "SUSE Bug 1157193",
"url": "https://bugzilla.suse.com/1157193"
},
{
"category": "self",
"summary": "SUSE Bug 1157197",
"url": "https://bugzilla.suse.com/1157197"
},
{
"category": "self",
"summary": "SUSE Bug 1157298",
"url": "https://bugzilla.suse.com/1157298"
},
{
"category": "self",
"summary": "SUSE Bug 1157303",
"url": "https://bugzilla.suse.com/1157303"
},
{
"category": "self",
"summary": "SUSE Bug 1157304",
"url": "https://bugzilla.suse.com/1157304"
},
{
"category": "self",
"summary": "SUSE Bug 1157307",
"url": "https://bugzilla.suse.com/1157307"
},
{
"category": "self",
"summary": "SUSE Bug 1157324",
"url": "https://bugzilla.suse.com/1157324"
},
{
"category": "self",
"summary": "SUSE Bug 1157333",
"url": "https://bugzilla.suse.com/1157333"
},
{
"category": "self",
"summary": "SUSE Bug 1157386",
"url": "https://bugzilla.suse.com/1157386"
},
{
"category": "self",
"summary": "SUSE Bug 1157424",
"url": "https://bugzilla.suse.com/1157424"
},
{
"category": "self",
"summary": "SUSE Bug 1157463",
"url": "https://bugzilla.suse.com/1157463"
},
{
"category": "self",
"summary": "SUSE Bug 1157499",
"url": "https://bugzilla.suse.com/1157499"
},
{
"category": "self",
"summary": "SUSE Bug 1157678",
"url": "https://bugzilla.suse.com/1157678"
},
{
"category": "self",
"summary": "SUSE Bug 1157698",
"url": "https://bugzilla.suse.com/1157698"
},
{
"category": "self",
"summary": "SUSE Bug 1157778",
"url": "https://bugzilla.suse.com/1157778"
},
{
"category": "self",
"summary": "SUSE Bug 1157853",
"url": "https://bugzilla.suse.com/1157853"
},
{
"category": "self",
"summary": "SUSE Bug 1157895",
"url": "https://bugzilla.suse.com/1157895"
},
{
"category": "self",
"summary": "SUSE Bug 1157908",
"url": "https://bugzilla.suse.com/1157908"
},
{
"category": "self",
"summary": "SUSE Bug 1158021",
"url": "https://bugzilla.suse.com/1158021"
},
{
"category": "self",
"summary": "SUSE Bug 1158049",
"url": "https://bugzilla.suse.com/1158049"
},
{
"category": "self",
"summary": "SUSE Bug 1158063",
"url": "https://bugzilla.suse.com/1158063"
},
{
"category": "self",
"summary": "SUSE Bug 1158064",
"url": "https://bugzilla.suse.com/1158064"
},
{
"category": "self",
"summary": "SUSE Bug 1158065",
"url": "https://bugzilla.suse.com/1158065"
},
{
"category": "self",
"summary": "SUSE Bug 1158066",
"url": "https://bugzilla.suse.com/1158066"
},
{
"category": "self",
"summary": "SUSE Bug 1158067",
"url": "https://bugzilla.suse.com/1158067"
},
{
"category": "self",
"summary": "SUSE Bug 1158068",
"url": "https://bugzilla.suse.com/1158068"
},
{
"category": "self",
"summary": "SUSE Bug 1158071",
"url": "https://bugzilla.suse.com/1158071"
},
{
"category": "self",
"summary": "SUSE Bug 1158082",
"url": "https://bugzilla.suse.com/1158082"
},
{
"category": "self",
"summary": "SUSE Bug 1158094",
"url": "https://bugzilla.suse.com/1158094"
},
{
"category": "self",
"summary": "SUSE Bug 1158132",
"url": "https://bugzilla.suse.com/1158132"
},
{
"category": "self",
"summary": "SUSE Bug 1158381",
"url": "https://bugzilla.suse.com/1158381"
},
{
"category": "self",
"summary": "SUSE Bug 1158394",
"url": "https://bugzilla.suse.com/1158394"
},
{
"category": "self",
"summary": "SUSE Bug 1158398",
"url": "https://bugzilla.suse.com/1158398"
},
{
"category": "self",
"summary": "SUSE Bug 1158407",
"url": "https://bugzilla.suse.com/1158407"
},
{
"category": "self",
"summary": "SUSE Bug 1158410",
"url": "https://bugzilla.suse.com/1158410"
},
{
"category": "self",
"summary": "SUSE Bug 1158413",
"url": "https://bugzilla.suse.com/1158413"
},
{
"category": "self",
"summary": "SUSE Bug 1158417",
"url": "https://bugzilla.suse.com/1158417"
},
{
"category": "self",
"summary": "SUSE Bug 1158427",
"url": "https://bugzilla.suse.com/1158427"
},
{
"category": "self",
"summary": "SUSE Bug 1158445",
"url": "https://bugzilla.suse.com/1158445"
},
{
"category": "self",
"summary": "SUSE Bug 1158533",
"url": "https://bugzilla.suse.com/1158533"
},
{
"category": "self",
"summary": "SUSE Bug 1158637",
"url": "https://bugzilla.suse.com/1158637"
},
{
"category": "self",
"summary": "SUSE Bug 1158638",
"url": "https://bugzilla.suse.com/1158638"
},
{
"category": "self",
"summary": "SUSE Bug 1158639",
"url": "https://bugzilla.suse.com/1158639"
},
{
"category": "self",
"summary": "SUSE Bug 1158640",
"url": "https://bugzilla.suse.com/1158640"
},
{
"category": "self",
"summary": "SUSE Bug 1158641",
"url": "https://bugzilla.suse.com/1158641"
},
{
"category": "self",
"summary": "SUSE Bug 1158643",
"url": "https://bugzilla.suse.com/1158643"
},
{
"category": "self",
"summary": "SUSE Bug 1158644",
"url": "https://bugzilla.suse.com/1158644"
},
{
"category": "self",
"summary": "SUSE Bug 1158645",
"url": "https://bugzilla.suse.com/1158645"
},
{
"category": "self",
"summary": "SUSE Bug 1158646",
"url": "https://bugzilla.suse.com/1158646"
},
{
"category": "self",
"summary": "SUSE Bug 1158647",
"url": "https://bugzilla.suse.com/1158647"
},
{
"category": "self",
"summary": "SUSE Bug 1158649",
"url": "https://bugzilla.suse.com/1158649"
},
{
"category": "self",
"summary": "SUSE Bug 1158651",
"url": "https://bugzilla.suse.com/1158651"
},
{
"category": "self",
"summary": "SUSE Bug 1158652",
"url": "https://bugzilla.suse.com/1158652"
},
{
"category": "self",
"summary": "SUSE Bug 1158819",
"url": "https://bugzilla.suse.com/1158819"
},
{
"category": "self",
"summary": "SUSE Bug 1158823",
"url": "https://bugzilla.suse.com/1158823"
},
{
"category": "self",
"summary": "SUSE Bug 1158824",
"url": "https://bugzilla.suse.com/1158824"
},
{
"category": "self",
"summary": "SUSE Bug 1158827",
"url": "https://bugzilla.suse.com/1158827"
},
{
"category": "self",
"summary": "SUSE Bug 1158834",
"url": "https://bugzilla.suse.com/1158834"
},
{
"category": "self",
"summary": "SUSE Bug 1158893",
"url": "https://bugzilla.suse.com/1158893"
},
{
"category": "self",
"summary": "SUSE Bug 1158900",
"url": "https://bugzilla.suse.com/1158900"
},
{
"category": "self",
"summary": "SUSE Bug 1158903",
"url": "https://bugzilla.suse.com/1158903"
},
{
"category": "self",
"summary": "SUSE Bug 1158904",
"url": "https://bugzilla.suse.com/1158904"
},
{
"category": "self",
"summary": "SUSE Bug 1158954",
"url": "https://bugzilla.suse.com/1158954"
},
{
"category": "self",
"summary": "SUSE Bug 1159024",
"url": "https://bugzilla.suse.com/1159024"
},
{
"category": "self",
"summary": "SUSE Bug 1159096",
"url": "https://bugzilla.suse.com/1159096"
},
{
"category": "self",
"summary": "SUSE Bug 1159297",
"url": "https://bugzilla.suse.com/1159297"
},
{
"category": "self",
"summary": "SUSE Bug 1159483",
"url": "https://bugzilla.suse.com/1159483"
},
{
"category": "self",
"summary": "SUSE Bug 1159484",
"url": "https://bugzilla.suse.com/1159484"
},
{
"category": "self",
"summary": "SUSE Bug 1159500",
"url": "https://bugzilla.suse.com/1159500"
},
{
"category": "self",
"summary": "SUSE Bug 1159569",
"url": "https://bugzilla.suse.com/1159569"
},
{
"category": "self",
"summary": "SUSE Bug 1159841",
"url": "https://bugzilla.suse.com/1159841"
},
{
"category": "self",
"summary": "SUSE Bug 1159908",
"url": "https://bugzilla.suse.com/1159908"
},
{
"category": "self",
"summary": "SUSE Bug 1159909",
"url": "https://bugzilla.suse.com/1159909"
},
{
"category": "self",
"summary": "SUSE Bug 1159910",
"url": "https://bugzilla.suse.com/1159910"
},
{
"category": "self",
"summary": "SUSE Bug 972655",
"url": "https://bugzilla.suse.com/972655"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-18595 page",
"url": "https://www.suse.com/security/cve/CVE-2017-18595/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-12207 page",
"url": "https://www.suse.com/security/cve/CVE-2018-12207/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-0154 page",
"url": "https://www.suse.com/security/cve/CVE-2019-0154/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-0155 page",
"url": "https://www.suse.com/security/cve/CVE-2019-0155/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-10220 page",
"url": "https://www.suse.com/security/cve/CVE-2019-10220/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11135 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11135/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-14821 page",
"url": "https://www.suse.com/security/cve/CVE-2019-14821/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-14835 page",
"url": "https://www.suse.com/security/cve/CVE-2019-14835/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-14895 page",
"url": "https://www.suse.com/security/cve/CVE-2019-14895/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-14901 page",
"url": "https://www.suse.com/security/cve/CVE-2019-14901/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15030 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15030/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15031 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15031/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15213 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15213/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15916 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15916/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-16231 page",
"url": "https://www.suse.com/security/cve/CVE-2019-16231/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-16232 page",
"url": "https://www.suse.com/security/cve/CVE-2019-16232/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-16233 page",
"url": "https://www.suse.com/security/cve/CVE-2019-16233/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-16234 page",
"url": "https://www.suse.com/security/cve/CVE-2019-16234/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-16746 page",
"url": "https://www.suse.com/security/cve/CVE-2019-16746/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-16995 page",
"url": "https://www.suse.com/security/cve/CVE-2019-16995/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-17055 page",
"url": "https://www.suse.com/security/cve/CVE-2019-17055/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-17056 page",
"url": "https://www.suse.com/security/cve/CVE-2019-17056/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-17133 page",
"url": "https://www.suse.com/security/cve/CVE-2019-17133/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-17666 page",
"url": "https://www.suse.com/security/cve/CVE-2019-17666/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-18660 page",
"url": "https://www.suse.com/security/cve/CVE-2019-18660/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-18683 page",
"url": "https://www.suse.com/security/cve/CVE-2019-18683/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-18805 page",
"url": "https://www.suse.com/security/cve/CVE-2019-18805/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-18808 page",
"url": "https://www.suse.com/security/cve/CVE-2019-18808/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-18809 page",
"url": "https://www.suse.com/security/cve/CVE-2019-18809/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-19046 page",
"url": "https://www.suse.com/security/cve/CVE-2019-19046/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-19049 page",
"url": "https://www.suse.com/security/cve/CVE-2019-19049/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-19051 page",
"url": "https://www.suse.com/security/cve/CVE-2019-19051/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-19052 page",
"url": "https://www.suse.com/security/cve/CVE-2019-19052/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-19056 page",
"url": "https://www.suse.com/security/cve/CVE-2019-19056/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-19057 page",
"url": "https://www.suse.com/security/cve/CVE-2019-19057/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-19058 page",
"url": "https://www.suse.com/security/cve/CVE-2019-19058/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-19060 page",
"url": "https://www.suse.com/security/cve/CVE-2019-19060/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-19062 page",
"url": "https://www.suse.com/security/cve/CVE-2019-19062/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-19063 page",
"url": "https://www.suse.com/security/cve/CVE-2019-19063/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-19065 page",
"url": "https://www.suse.com/security/cve/CVE-2019-19065/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-19066 page",
"url": "https://www.suse.com/security/cve/CVE-2019-19066/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-19067 page",
"url": "https://www.suse.com/security/cve/CVE-2019-19067/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-19068 page",
"url": "https://www.suse.com/security/cve/CVE-2019-19068/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-19073 page",
"url": "https://www.suse.com/security/cve/CVE-2019-19073/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-19074 page",
"url": "https://www.suse.com/security/cve/CVE-2019-19074/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-19075 page",
"url": "https://www.suse.com/security/cve/CVE-2019-19075/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-19077 page",
"url": "https://www.suse.com/security/cve/CVE-2019-19077/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-19078 page",
"url": "https://www.suse.com/security/cve/CVE-2019-19078/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-19080 page",
"url": "https://www.suse.com/security/cve/CVE-2019-19080/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-19081 page",
"url": "https://www.suse.com/security/cve/CVE-2019-19081/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-19082 page",
"url": "https://www.suse.com/security/cve/CVE-2019-19082/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-19083 page",
"url": "https://www.suse.com/security/cve/CVE-2019-19083/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-19227 page",
"url": "https://www.suse.com/security/cve/CVE-2019-19227/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-19319 page",
"url": "https://www.suse.com/security/cve/CVE-2019-19319/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-19332 page",
"url": "https://www.suse.com/security/cve/CVE-2019-19332/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-19338 page",
"url": "https://www.suse.com/security/cve/CVE-2019-19338/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-19447 page",
"url": "https://www.suse.com/security/cve/CVE-2019-19447/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-19523 page",
"url": "https://www.suse.com/security/cve/CVE-2019-19523/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-19524 page",
"url": "https://www.suse.com/security/cve/CVE-2019-19524/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-19525 page",
"url": "https://www.suse.com/security/cve/CVE-2019-19525/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-19526 page",
"url": "https://www.suse.com/security/cve/CVE-2019-19526/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-19527 page",
"url": "https://www.suse.com/security/cve/CVE-2019-19527/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-19528 page",
"url": "https://www.suse.com/security/cve/CVE-2019-19528/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-19529 page",
"url": "https://www.suse.com/security/cve/CVE-2019-19529/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-19530 page",
"url": "https://www.suse.com/security/cve/CVE-2019-19530/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-19531 page",
"url": "https://www.suse.com/security/cve/CVE-2019-19531/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-19532 page",
"url": "https://www.suse.com/security/cve/CVE-2019-19532/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-19533 page",
"url": "https://www.suse.com/security/cve/CVE-2019-19533/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-19534 page",
"url": "https://www.suse.com/security/cve/CVE-2019-19534/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-19535 page",
"url": "https://www.suse.com/security/cve/CVE-2019-19535/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-19536 page",
"url": "https://www.suse.com/security/cve/CVE-2019-19536/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-19537 page",
"url": "https://www.suse.com/security/cve/CVE-2019-19537/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-19543 page",
"url": "https://www.suse.com/security/cve/CVE-2019-19543/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-19767 page",
"url": "https://www.suse.com/security/cve/CVE-2019-19767/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-19966 page",
"url": "https://www.suse.com/security/cve/CVE-2019-19966/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-20054 page",
"url": "https://www.suse.com/security/cve/CVE-2019-20054/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-20095 page",
"url": "https://www.suse.com/security/cve/CVE-2019-20095/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-20096 page",
"url": "https://www.suse.com/security/cve/CVE-2019-20096/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-9456 page",
"url": "https://www.suse.com/security/cve/CVE-2019-9456/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-9506 page",
"url": "https://www.suse.com/security/cve/CVE-2019-9506/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2020-01-14T10:06:03Z",
"generator": {
"date": "2020-01-14T10:06:03Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2020:0093-1",
"initial_release_date": "2020-01-14T10:06:03Z",
"revision_history": [
{
"date": "2020-01-14T10:06:03Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-azure-4.12.14-16.7.1.noarch",
"product": {
"name": "kernel-devel-azure-4.12.14-16.7.1.noarch",
"product_id": "kernel-devel-azure-4.12.14-16.7.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-azure-4.12.14-16.7.1.noarch",
"product": {
"name": "kernel-source-azure-4.12.14-16.7.1.noarch",
"product_id": "kernel-source-azure-4.12.14-16.7.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-azure-4.12.14-16.7.1.x86_64",
"product": {
"name": "cluster-md-kmp-azure-4.12.14-16.7.1.x86_64",
"product_id": "cluster-md-kmp-azure-4.12.14-16.7.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-azure-4.12.14-16.7.1.x86_64",
"product": {
"name": "dlm-kmp-azure-4.12.14-16.7.1.x86_64",
"product_id": "dlm-kmp-azure-4.12.14-16.7.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-azure-4.12.14-16.7.1.x86_64",
"product": {
"name": "gfs2-kmp-azure-4.12.14-16.7.1.x86_64",
"product_id": "gfs2-kmp-azure-4.12.14-16.7.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-4.12.14-16.7.1.x86_64",
"product": {
"name": "kernel-azure-4.12.14-16.7.1.x86_64",
"product_id": "kernel-azure-4.12.14-16.7.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-base-4.12.14-16.7.1.x86_64",
"product": {
"name": "kernel-azure-base-4.12.14-16.7.1.x86_64",
"product_id": "kernel-azure-base-4.12.14-16.7.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-devel-4.12.14-16.7.1.x86_64",
"product": {
"name": "kernel-azure-devel-4.12.14-16.7.1.x86_64",
"product_id": "kernel-azure-devel-4.12.14-16.7.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-extra-4.12.14-16.7.1.x86_64",
"product": {
"name": "kernel-azure-extra-4.12.14-16.7.1.x86_64",
"product_id": "kernel-azure-extra-4.12.14-16.7.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-kgraft-devel-4.12.14-16.7.1.x86_64",
"product": {
"name": "kernel-azure-kgraft-devel-4.12.14-16.7.1.x86_64",
"product_id": "kernel-azure-kgraft-devel-4.12.14-16.7.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-azure-4.12.14-16.7.1.x86_64",
"product": {
"name": "kernel-syms-azure-4.12.14-16.7.1.x86_64",
"product_id": "kernel-syms-azure-4.12.14-16.7.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-azure-4.12.14-16.7.1.x86_64",
"product": {
"name": "kselftests-kmp-azure-4.12.14-16.7.1.x86_64",
"product_id": "kselftests-kmp-azure-4.12.14-16.7.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-azure-4.12.14-16.7.1.x86_64",
"product": {
"name": "ocfs2-kmp-azure-4.12.14-16.7.1.x86_64",
"product_id": "ocfs2-kmp-azure-4.12.14-16.7.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-4.12.14-16.7.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64"
},
"product_reference": "kernel-azure-4.12.14-16.7.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-base-4.12.14-16.7.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64"
},
"product_reference": "kernel-azure-base-4.12.14-16.7.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-devel-4.12.14-16.7.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64"
},
"product_reference": "kernel-azure-devel-4.12.14-16.7.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-azure-4.12.14-16.7.1.noarch as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch"
},
"product_reference": "kernel-devel-azure-4.12.14-16.7.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-azure-4.12.14-16.7.1.noarch as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch"
},
"product_reference": "kernel-source-azure-4.12.14-16.7.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-azure-4.12.14-16.7.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
},
"product_reference": "kernel-syms-azure-4.12.14-16.7.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-4.12.14-16.7.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64"
},
"product_reference": "kernel-azure-4.12.14-16.7.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-base-4.12.14-16.7.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64"
},
"product_reference": "kernel-azure-base-4.12.14-16.7.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-devel-4.12.14-16.7.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64"
},
"product_reference": "kernel-azure-devel-4.12.14-16.7.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-azure-4.12.14-16.7.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch"
},
"product_reference": "kernel-devel-azure-4.12.14-16.7.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-azure-4.12.14-16.7.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch"
},
"product_reference": "kernel-source-azure-4.12.14-16.7.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-azure-4.12.14-16.7.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
},
"product_reference": "kernel-syms-azure-4.12.14-16.7.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-18595",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-18595"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 4.14.11. A double free may be caused by the function allocate_trace_buffer in the file kernel/trace/trace.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-18595",
"url": "https://www.suse.com/security/cve/CVE-2017-18595"
},
{
"category": "external",
"summary": "SUSE Bug 1149555 for CVE-2017-18595",
"url": "https://bugzilla.suse.com/1149555"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-14T10:06:03Z",
"details": "moderate"
}
],
"title": "CVE-2017-18595"
},
{
"cve": "CVE-2018-12207",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-12207"
}
],
"notes": [
{
"category": "general",
"text": "Improper invalidation for page table updates by a virtual guest operating system for multiple Intel(R) Processors may allow an authenticated user to potentially enable denial of service of the host system via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-12207",
"url": "https://www.suse.com/security/cve/CVE-2018-12207"
},
{
"category": "external",
"summary": "SUSE Bug 1117665 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1117665"
},
{
"category": "external",
"summary": "SUSE Bug 1139073 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1139073"
},
{
"category": "external",
"summary": "SUSE Bug 1152505 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1152505"
},
{
"category": "external",
"summary": "SUSE Bug 1155812 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1155812"
},
{
"category": "external",
"summary": "SUSE Bug 1155817 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1155817"
},
{
"category": "external",
"summary": "SUSE Bug 1155945 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1155945"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1201877"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-14T10:06:03Z",
"details": "moderate"
}
],
"title": "CVE-2018-12207"
},
{
"cve": "CVE-2019-0154",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-0154"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient access control in subsystem for Intel (R) processor graphics in 6th, 7th, 8th and 9th Generation Intel(R) Core(TM) Processor Families; Intel(R) Pentium(R) Processor J, N, Silver and Gold Series; Intel(R) Celeron(R) Processor J, N, G3900 and G4900 Series; Intel(R) Atom(R) Processor A and E3900 Series; Intel(R) Xeon(R) Processor E3-1500 v5 and v6 and E-2100 Processor Families may allow an authenticated user to potentially enable denial of service via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-0154",
"url": "https://www.suse.com/security/cve/CVE-2019-0154"
},
{
"category": "external",
"summary": "SUSE Bug 1135966 for CVE-2019-0154",
"url": "https://bugzilla.suse.com/1135966"
},
{
"category": "external",
"summary": "SUSE Bug 1181720 for CVE-2019-0154",
"url": "https://bugzilla.suse.com/1181720"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-14T10:06:03Z",
"details": "important"
}
],
"title": "CVE-2019-0154"
},
{
"cve": "CVE-2019-0155",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-0155"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient access control in a subsystem for Intel (R) processor graphics in 6th, 7th, 8th and 9th Generation Intel(R) Core(TM) Processor Families; Intel(R) Pentium(R) Processor J, N, Silver and Gold Series; Intel(R) Celeron(R) Processor J, N, G3900 and G4900 Series; Intel(R) Atom(R) Processor A and E3900 Series; Intel(R) Xeon(R) Processor E3-1500 v5 and v6, E-2100 and E-2200 Processor Families; Intel(R) Graphics Driver for Windows before 26.20.100.6813 (DCH) or 26.20.100.6812 and before 21.20.x.5077 (aka15.45.5077), i915 Linux Driver for Intel(R) Processor Graphics before versions 5.4-rc7, 5.3.11, 4.19.84, 4.14.154, 4.9.201, 4.4.201 may allow an authenticated user to potentially enable escalation of privilege via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-0155",
"url": "https://www.suse.com/security/cve/CVE-2019-0155"
},
{
"category": "external",
"summary": "SUSE Bug 1135966 for CVE-2019-0155",
"url": "https://bugzilla.suse.com/1135966"
},
{
"category": "external",
"summary": "SUSE Bug 1135967 for CVE-2019-0155",
"url": "https://bugzilla.suse.com/1135967"
},
{
"category": "external",
"summary": "SUSE Bug 1173663 for CVE-2019-0155",
"url": "https://bugzilla.suse.com/1173663"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-14T10:06:03Z",
"details": "important"
}
],
"title": "CVE-2019-0155"
},
{
"cve": "CVE-2019-10220",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-10220"
}
],
"notes": [
{
"category": "general",
"text": "Linux kernel CIFS implementation, version 4.9.0 is vulnerable to a relative paths injection in directory entry lists.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-10220",
"url": "https://www.suse.com/security/cve/CVE-2019-10220"
},
{
"category": "external",
"summary": "SUSE Bug 1144903 for CVE-2019-10220",
"url": "https://bugzilla.suse.com/1144903"
},
{
"category": "external",
"summary": "SUSE Bug 1153108 for CVE-2019-10220",
"url": "https://bugzilla.suse.com/1153108"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-14T10:06:03Z",
"details": "important"
}
],
"title": "CVE-2019-10220"
},
{
"cve": "CVE-2019-11135",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11135"
}
],
"notes": [
{
"category": "general",
"text": "TSX Asynchronous Abort condition on some CPUs utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11135",
"url": "https://www.suse.com/security/cve/CVE-2019-11135"
},
{
"category": "external",
"summary": "SUSE Bug 1139073 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1139073"
},
{
"category": "external",
"summary": "SUSE Bug 1152497 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1152497"
},
{
"category": "external",
"summary": "SUSE Bug 1152505 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1152505"
},
{
"category": "external",
"summary": "SUSE Bug 1152506 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1152506"
},
{
"category": "external",
"summary": "SUSE Bug 1160120 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1160120"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1201877"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-14T10:06:03Z",
"details": "moderate"
}
],
"title": "CVE-2019-11135"
},
{
"cve": "CVE-2019-14821",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-14821"
}
],
"notes": [
{
"category": "general",
"text": "An out-of-bounds access issue was found in the Linux kernel, all versions through 5.3, in the way Linux kernel\u0027s KVM hypervisor implements the Coalesced MMIO write operation. It operates on an MMIO ring buffer \u0027struct kvm_coalesced_mmio\u0027 object, wherein write indices \u0027ring-\u003efirst\u0027 and \u0027ring-\u003elast\u0027 value could be supplied by a host user-space process. An unprivileged host user or process with access to \u0027/dev/kvm\u0027 device could use this flaw to crash the host kernel, resulting in a denial of service or potentially escalating privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-14821",
"url": "https://www.suse.com/security/cve/CVE-2019-14821"
},
{
"category": "external",
"summary": "SUSE Bug 1151350 for CVE-2019-14821",
"url": "https://bugzilla.suse.com/1151350"
},
{
"category": "external",
"summary": "SUSE Bug 1218966 for CVE-2019-14821",
"url": "https://bugzilla.suse.com/1218966"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-14T10:06:03Z",
"details": "moderate"
}
],
"title": "CVE-2019-14821"
},
{
"cve": "CVE-2019-14835",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-14835"
}
],
"notes": [
{
"category": "general",
"text": "A buffer overflow flaw was found, in versions from 2.6.34 to 5.2.x, in the way Linux kernel\u0027s vhost functionality that translates virtqueue buffers to IOVs, logged the buffer descriptors during migration. A privileged guest user able to pass descriptors with invalid length to the host when migration is underway, could use this flaw to increase their privileges on the host.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-14835",
"url": "https://www.suse.com/security/cve/CVE-2019-14835"
},
{
"category": "external",
"summary": "SUSE Bug 1150112 for CVE-2019-14835",
"url": "https://bugzilla.suse.com/1150112"
},
{
"category": "external",
"summary": "SUSE Bug 1151021 for CVE-2019-14835",
"url": "https://bugzilla.suse.com/1151021"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-14T10:06:03Z",
"details": "important"
}
],
"title": "CVE-2019-14835"
},
{
"cve": "CVE-2019-14895",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-14895"
}
],
"notes": [
{
"category": "general",
"text": "A heap-based buffer overflow was discovered in the Linux kernel, all versions 3.x.x and 4.x.x before 4.18.0, in Marvell WiFi chip driver. The flaw could occur when the station attempts a connection negotiation during the handling of the remote devices country settings. This could allow the remote device to cause a denial of service (system crash) or possibly execute arbitrary code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-14895",
"url": "https://www.suse.com/security/cve/CVE-2019-14895"
},
{
"category": "external",
"summary": "SUSE Bug 1157042 for CVE-2019-14895",
"url": "https://bugzilla.suse.com/1157042"
},
{
"category": "external",
"summary": "SUSE Bug 1157158 for CVE-2019-14895",
"url": "https://bugzilla.suse.com/1157158"
},
{
"category": "external",
"summary": "SUSE Bug 1173100 for CVE-2019-14895",
"url": "https://bugzilla.suse.com/1173100"
},
{
"category": "external",
"summary": "SUSE Bug 1173660 for CVE-2019-14895",
"url": "https://bugzilla.suse.com/1173660"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-14T10:06:03Z",
"details": "important"
}
],
"title": "CVE-2019-14895"
},
{
"cve": "CVE-2019-14901",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-14901"
}
],
"notes": [
{
"category": "general",
"text": "A heap overflow flaw was found in the Linux kernel, all versions 3.x.x and 4.x.x before 4.18.0, in Marvell WiFi chip driver. The vulnerability allows a remote attacker to cause a system crash, resulting in a denial of service, or execute arbitrary code. The highest threat with this vulnerability is with the availability of the system. If code execution occurs, the code will run with the permissions of root. This will affect both confidentiality and integrity of files on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-14901",
"url": "https://www.suse.com/security/cve/CVE-2019-14901"
},
{
"category": "external",
"summary": "SUSE Bug 1157042 for CVE-2019-14901",
"url": "https://bugzilla.suse.com/1157042"
},
{
"category": "external",
"summary": "SUSE Bug 1173661 for CVE-2019-14901",
"url": "https://bugzilla.suse.com/1173661"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-14T10:06:03Z",
"details": "important"
}
],
"title": "CVE-2019-14901"
},
{
"cve": "CVE-2019-15030",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15030"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel through 5.2.14 on the powerpc platform, a local user can read vector registers of other users\u0027 processes via a Facility Unavailable exception. To exploit the venerability, a local user starts a transaction (via the hardware transactional memory instruction tbegin) and then accesses vector registers. At some point, the vector registers will be corrupted with the values from a different local Linux process because of a missing arch/powerpc/kernel/process.c check.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15030",
"url": "https://www.suse.com/security/cve/CVE-2019-15030"
},
{
"category": "external",
"summary": "SUSE Bug 1149713 for CVE-2019-15030",
"url": "https://bugzilla.suse.com/1149713"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-14T10:06:03Z",
"details": "moderate"
}
],
"title": "CVE-2019-15030"
},
{
"cve": "CVE-2019-15031",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15031"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel through 5.2.14 on the powerpc platform, a local user can read vector registers of other users\u0027 processes via an interrupt. To exploit the venerability, a local user starts a transaction (via the hardware transactional memory instruction tbegin) and then accesses vector registers. At some point, the vector registers will be corrupted with the values from a different local Linux process, because MSR_TM_ACTIVE is misused in arch/powerpc/kernel/process.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15031",
"url": "https://www.suse.com/security/cve/CVE-2019-15031"
},
{
"category": "external",
"summary": "SUSE Bug 1149713 for CVE-2019-15031",
"url": "https://bugzilla.suse.com/1149713"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-14T10:06:03Z",
"details": "moderate"
}
],
"title": "CVE-2019-15031"
},
{
"cve": "CVE-2019-15213",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15213"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.2.3. There is a use-after-free caused by a malicious USB device in the drivers/media/usb/dvb-usb/dvb-usb-init.c driver.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15213",
"url": "https://www.suse.com/security/cve/CVE-2019-15213"
},
{
"category": "external",
"summary": "SUSE Bug 1146519 for CVE-2019-15213",
"url": "https://bugzilla.suse.com/1146519"
},
{
"category": "external",
"summary": "SUSE Bug 1146544 for CVE-2019-15213",
"url": "https://bugzilla.suse.com/1146544"
},
{
"category": "external",
"summary": "SUSE Bug 1158381 for CVE-2019-15213",
"url": "https://bugzilla.suse.com/1158381"
},
{
"category": "external",
"summary": "SUSE Bug 1158834 for CVE-2019-15213",
"url": "https://bugzilla.suse.com/1158834"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-14T10:06:03Z",
"details": "moderate"
}
],
"title": "CVE-2019-15213"
},
{
"cve": "CVE-2019-15916",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15916"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.0.1. There is a memory leak in register_queue_kobjects() in net/core/net-sysfs.c, which will cause denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15916",
"url": "https://www.suse.com/security/cve/CVE-2019-15916"
},
{
"category": "external",
"summary": "SUSE Bug 1149448 for CVE-2019-15916",
"url": "https://bugzilla.suse.com/1149448"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-14T10:06:03Z",
"details": "low"
}
],
"title": "CVE-2019-15916"
},
{
"cve": "CVE-2019-16231",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-16231"
}
],
"notes": [
{
"category": "general",
"text": "drivers/net/fjes/fjes_main.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-16231",
"url": "https://www.suse.com/security/cve/CVE-2019-16231"
},
{
"category": "external",
"summary": "SUSE Bug 1150466 for CVE-2019-16231",
"url": "https://bugzilla.suse.com/1150466"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-14T10:06:03Z",
"details": "low"
}
],
"title": "CVE-2019-16231"
},
{
"cve": "CVE-2019-16232",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-16232"
}
],
"notes": [
{
"category": "general",
"text": "drivers/net/wireless/marvell/libertas/if_sdio.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-16232",
"url": "https://www.suse.com/security/cve/CVE-2019-16232"
},
{
"category": "external",
"summary": "SUSE Bug 1150465 for CVE-2019-16232",
"url": "https://bugzilla.suse.com/1150465"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-14T10:06:03Z",
"details": "low"
}
],
"title": "CVE-2019-16232"
},
{
"cve": "CVE-2019-16233",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-16233"
}
],
"notes": [
{
"category": "general",
"text": "drivers/scsi/qla2xxx/qla_os.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-16233",
"url": "https://www.suse.com/security/cve/CVE-2019-16233"
},
{
"category": "external",
"summary": "SUSE Bug 1150457 for CVE-2019-16233",
"url": "https://bugzilla.suse.com/1150457"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-14T10:06:03Z",
"details": "low"
}
],
"title": "CVE-2019-16233"
},
{
"cve": "CVE-2019-16234",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-16234"
}
],
"notes": [
{
"category": "general",
"text": "drivers/net/wireless/intel/iwlwifi/pcie/trans.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-16234",
"url": "https://www.suse.com/security/cve/CVE-2019-16234"
},
{
"category": "external",
"summary": "SUSE Bug 1150452 for CVE-2019-16234",
"url": "https://bugzilla.suse.com/1150452"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-14T10:06:03Z",
"details": "low"
}
],
"title": "CVE-2019-16234"
},
{
"cve": "CVE-2019-16746",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-16746"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in net/wireless/nl80211.c in the Linux kernel through 5.2.17. It does not check the length of variable elements in a beacon head, leading to a buffer overflow.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-16746",
"url": "https://www.suse.com/security/cve/CVE-2019-16746"
},
{
"category": "external",
"summary": "SUSE Bug 1152107 for CVE-2019-16746",
"url": "https://bugzilla.suse.com/1152107"
},
{
"category": "external",
"summary": "SUSE Bug 1173659 for CVE-2019-16746",
"url": "https://bugzilla.suse.com/1173659"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-14T10:06:03Z",
"details": "important"
}
],
"title": "CVE-2019-16746"
},
{
"cve": "CVE-2019-16995",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-16995"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel before 5.0.3, a memory leak exits in hsr_dev_finalize() in net/hsr/hsr_device.c if hsr_add_port fails to add a port, which may cause denial of service, aka CID-6caabe7f197d.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-16995",
"url": "https://www.suse.com/security/cve/CVE-2019-16995"
},
{
"category": "external",
"summary": "SUSE Bug 1152685 for CVE-2019-16995",
"url": "https://bugzilla.suse.com/1152685"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-14T10:06:03Z",
"details": "moderate"
}
],
"title": "CVE-2019-16995"
},
{
"cve": "CVE-2019-17055",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-17055"
}
],
"notes": [
{
"category": "general",
"text": "base_sock_create in drivers/isdn/mISDN/socket.c in the AF_ISDN network module in the Linux kernel through 5.3.2 does not enforce CAP_NET_RAW, which means that unprivileged users can create a raw socket, aka CID-b91ee4aa2a21.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-17055",
"url": "https://www.suse.com/security/cve/CVE-2019-17055"
},
{
"category": "external",
"summary": "SUSE Bug 1152782 for CVE-2019-17055",
"url": "https://bugzilla.suse.com/1152782"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-14T10:06:03Z",
"details": "low"
}
],
"title": "CVE-2019-17055"
},
{
"cve": "CVE-2019-17056",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-17056"
}
],
"notes": [
{
"category": "general",
"text": "llcp_sock_create in net/nfc/llcp_sock.c in the AF_NFC network module in the Linux kernel through 5.3.2 does not enforce CAP_NET_RAW, which means that unprivileged users can create a raw socket, aka CID-3a359798b176.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-17056",
"url": "https://www.suse.com/security/cve/CVE-2019-17056"
},
{
"category": "external",
"summary": "SUSE Bug 1152788 for CVE-2019-17056",
"url": "https://bugzilla.suse.com/1152788"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-14T10:06:03Z",
"details": "moderate"
}
],
"title": "CVE-2019-17056"
},
{
"cve": "CVE-2019-17133",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-17133"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel through 5.3.2, cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c does not reject a long SSID IE, leading to a Buffer Overflow.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-17133",
"url": "https://www.suse.com/security/cve/CVE-2019-17133"
},
{
"category": "external",
"summary": "SUSE Bug 1153158 for CVE-2019-17133",
"url": "https://bugzilla.suse.com/1153158"
},
{
"category": "external",
"summary": "SUSE Bug 1153161 for CVE-2019-17133",
"url": "https://bugzilla.suse.com/1153161"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-14T10:06:03Z",
"details": "important"
}
],
"title": "CVE-2019-17133"
},
{
"cve": "CVE-2019-17666",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-17666"
}
],
"notes": [
{
"category": "general",
"text": "rtl_p2p_noa_ie in drivers/net/wireless/realtek/rtlwifi/ps.c in the Linux kernel through 5.3.6 lacks a certain upper-bound check, leading to a buffer overflow.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-17666",
"url": "https://www.suse.com/security/cve/CVE-2019-17666"
},
{
"category": "external",
"summary": "SUSE Bug 1154372 for CVE-2019-17666",
"url": "https://bugzilla.suse.com/1154372"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-14T10:06:03Z",
"details": "moderate"
}
],
"title": "CVE-2019-17666"
},
{
"cve": "CVE-2019-18660",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-18660"
}
],
"notes": [
{
"category": "general",
"text": "The Linux kernel before 5.4.1 on powerpc allows Information Exposure because the Spectre-RSB mitigation is not in place for all applicable CPUs, aka CID-39e72bf96f58. This is related to arch/powerpc/kernel/entry_64.S and arch/powerpc/kernel/security.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-18660",
"url": "https://www.suse.com/security/cve/CVE-2019-18660"
},
{
"category": "external",
"summary": "SUSE Bug 1157038 for CVE-2019-18660",
"url": "https://bugzilla.suse.com/1157038"
},
{
"category": "external",
"summary": "SUSE Bug 1157923 for CVE-2019-18660",
"url": "https://bugzilla.suse.com/1157923"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-14T10:06:03Z",
"details": "moderate"
}
],
"title": "CVE-2019-18660"
},
{
"cve": "CVE-2019-18683",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-18683"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in drivers/media/platform/vivid in the Linux kernel through 5.3.8. It is exploitable for privilege escalation on some Linux distributions where local users have /dev/video0 access, but only if the driver happens to be loaded. There are multiple race conditions during streaming stopping in this driver (part of the V4L2 subsystem). These issues are caused by wrong mutex locking in vivid_stop_generating_vid_cap(), vivid_stop_generating_vid_out(), sdr_cap_stop_streaming(), and the corresponding kthreads. At least one of these race conditions leads to a use-after-free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-18683",
"url": "https://www.suse.com/security/cve/CVE-2019-18683"
},
{
"category": "external",
"summary": "SUSE Bug 1155897 for CVE-2019-18683",
"url": "https://bugzilla.suse.com/1155897"
},
{
"category": "external",
"summary": "SUSE Bug 1173868 for CVE-2019-18683",
"url": "https://bugzilla.suse.com/1173868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-14T10:06:03Z",
"details": "moderate"
}
],
"title": "CVE-2019-18683"
},
{
"cve": "CVE-2019-18805",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-18805"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in net/ipv4/sysctl_net_ipv4.c in the Linux kernel before 5.0.11. There is a net/ipv4/tcp_input.c signed integer overflow in tcp_ack_update_rtt() when userspace writes a very large integer to /proc/sys/net/ipv4/tcp_min_rtt_wlen, leading to a denial of service or possibly unspecified other impact, aka CID-19fad20d15a6.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-18805",
"url": "https://www.suse.com/security/cve/CVE-2019-18805"
},
{
"category": "external",
"summary": "SUSE Bug 1156187 for CVE-2019-18805",
"url": "https://bugzilla.suse.com/1156187"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-14T10:06:03Z",
"details": "low"
}
],
"title": "CVE-2019-18805"
},
{
"cve": "CVE-2019-18808",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-18808"
}
],
"notes": [
{
"category": "general",
"text": "A memory leak in the ccp_run_sha_cmd() function in drivers/crypto/ccp/ccp-ops.c in the Linux kernel through 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-128c66429247.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-18808",
"url": "https://www.suse.com/security/cve/CVE-2019-18808"
},
{
"category": "external",
"summary": "SUSE Bug 1156259 for CVE-2019-18808",
"url": "https://bugzilla.suse.com/1156259"
},
{
"category": "external",
"summary": "SUSE Bug 1189884 for CVE-2019-18808",
"url": "https://bugzilla.suse.com/1189884"
},
{
"category": "external",
"summary": "SUSE Bug 1190534 for CVE-2019-18808",
"url": "https://bugzilla.suse.com/1190534"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-14T10:06:03Z",
"details": "moderate"
}
],
"title": "CVE-2019-18808"
},
{
"cve": "CVE-2019-18809",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-18809"
}
],
"notes": [
{
"category": "general",
"text": "A memory leak in the af9005_identify_state() function in drivers/media/usb/dvb-usb/af9005.c in the Linux kernel through 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-2289adbfa559.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-18809",
"url": "https://www.suse.com/security/cve/CVE-2019-18809"
},
{
"category": "external",
"summary": "SUSE Bug 1156258 for CVE-2019-18809",
"url": "https://bugzilla.suse.com/1156258"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-14T10:06:03Z",
"details": "moderate"
}
],
"title": "CVE-2019-18809"
},
{
"cve": "CVE-2019-19046",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-19046"
}
],
"notes": [
{
"category": "general",
"text": "** DISPUTED ** A memory leak in the __ipmi_bmc_register() function in drivers/char/ipmi/ipmi_msghandler.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering ida_simple_get() failure, aka CID-4aa7afb0ee20. NOTE: third parties dispute the relevance of this because an attacker cannot realistically control this failure at probe time.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-19046",
"url": "https://www.suse.com/security/cve/CVE-2019-19046"
},
{
"category": "external",
"summary": "SUSE Bug 1157304 for CVE-2019-19046",
"url": "https://bugzilla.suse.com/1157304"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-14T10:06:03Z",
"details": "moderate"
}
],
"title": "CVE-2019-19046"
},
{
"cve": "CVE-2019-19049",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-19049"
}
],
"notes": [
{
"category": "general",
"text": "** DISPUTED ** A memory leak in the unittest_data_add() function in drivers/of/unittest.c in the Linux kernel before 5.3.10 allows attackers to cause a denial of service (memory consumption) by triggering of_fdt_unflatten_tree() failures, aka CID-e13de8fe0d6a. NOTE: third parties dispute the relevance of this because unittest.c can only be reached during boot.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-19049",
"url": "https://www.suse.com/security/cve/CVE-2019-19049"
},
{
"category": "external",
"summary": "SUSE Bug 1157173 for CVE-2019-19049",
"url": "https://bugzilla.suse.com/1157173"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 1.6,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-14T10:06:03Z",
"details": "moderate"
}
],
"title": "CVE-2019-19049"
},
{
"cve": "CVE-2019-19051",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-19051"
}
],
"notes": [
{
"category": "general",
"text": "A memory leak in the i2400m_op_rfkill_sw_toggle() function in drivers/net/wimax/i2400m/op-rfkill.c in the Linux kernel before 5.3.11 allows attackers to cause a denial of service (memory consumption), aka CID-6f3ef5c25cc7.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-19051",
"url": "https://www.suse.com/security/cve/CVE-2019-19051"
},
{
"category": "external",
"summary": "SUSE Bug 1159024 for CVE-2019-19051",
"url": "https://bugzilla.suse.com/1159024"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-14T10:06:03Z",
"details": "moderate"
}
],
"title": "CVE-2019-19051"
},
{
"cve": "CVE-2019-19052",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-19052"
}
],
"notes": [
{
"category": "general",
"text": "A memory leak in the gs_can_open() function in drivers/net/can/usb/gs_usb.c in the Linux kernel before 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering usb_submit_urb() failures, aka CID-fb5be6a7b486.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-19052",
"url": "https://www.suse.com/security/cve/CVE-2019-19052"
},
{
"category": "external",
"summary": "SUSE Bug 1157324 for CVE-2019-19052",
"url": "https://bugzilla.suse.com/1157324"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-14T10:06:03Z",
"details": "moderate"
}
],
"title": "CVE-2019-19052"
},
{
"cve": "CVE-2019-19056",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-19056"
}
],
"notes": [
{
"category": "general",
"text": "A memory leak in the mwifiex_pcie_alloc_cmdrsp_buf() function in drivers/net/wireless/marvell/mwifiex/pcie.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering mwifiex_map_pci_memory() failures, aka CID-db8fd2cde932.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-19056",
"url": "https://www.suse.com/security/cve/CVE-2019-19056"
},
{
"category": "external",
"summary": "SUSE Bug 1157197 for CVE-2019-19056",
"url": "https://bugzilla.suse.com/1157197"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-14T10:06:03Z",
"details": "moderate"
}
],
"title": "CVE-2019-19056"
},
{
"cve": "CVE-2019-19057",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-19057"
}
],
"notes": [
{
"category": "general",
"text": "Two memory leaks in the mwifiex_pcie_init_evt_ring() function in drivers/net/wireless/marvell/mwifiex/pcie.c in the Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption) by triggering mwifiex_map_pci_memory() failures, aka CID-d10dcb615c8e.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-19057",
"url": "https://www.suse.com/security/cve/CVE-2019-19057"
},
{
"category": "external",
"summary": "SUSE Bug 1157193 for CVE-2019-19057",
"url": "https://bugzilla.suse.com/1157193"
},
{
"category": "external",
"summary": "SUSE Bug 1157197 for CVE-2019-19057",
"url": "https://bugzilla.suse.com/1157197"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-14T10:06:03Z",
"details": "low"
}
],
"title": "CVE-2019-19057"
},
{
"cve": "CVE-2019-19058",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-19058"
}
],
"notes": [
{
"category": "general",
"text": "A memory leak in the alloc_sgtable() function in drivers/net/wireless/intel/iwlwifi/fw/dbg.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering alloc_page() failures, aka CID-b4b814fec1a5.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-19058",
"url": "https://www.suse.com/security/cve/CVE-2019-19058"
},
{
"category": "external",
"summary": "SUSE Bug 1157145 for CVE-2019-19058",
"url": "https://bugzilla.suse.com/1157145"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-14T10:06:03Z",
"details": "moderate"
}
],
"title": "CVE-2019-19058"
},
{
"cve": "CVE-2019-19060",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-19060"
}
],
"notes": [
{
"category": "general",
"text": "A memory leak in the adis_update_scan_mode() function in drivers/iio/imu/adis_buffer.c in the Linux kernel before 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-ab612b1daf41.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-19060",
"url": "https://www.suse.com/security/cve/CVE-2019-19060"
},
{
"category": "external",
"summary": "SUSE Bug 1157178 for CVE-2019-19060",
"url": "https://bugzilla.suse.com/1157178"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-14T10:06:03Z",
"details": "moderate"
}
],
"title": "CVE-2019-19060"
},
{
"cve": "CVE-2019-19062",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-19062"
}
],
"notes": [
{
"category": "general",
"text": "A memory leak in the crypto_report() function in crypto/crypto_user_base.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering crypto_report_alg() failures, aka CID-ffdde5932042.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-19062",
"url": "https://www.suse.com/security/cve/CVE-2019-19062"
},
{
"category": "external",
"summary": "SUSE Bug 1157333 for CVE-2019-19062",
"url": "https://bugzilla.suse.com/1157333"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-14T10:06:03Z",
"details": "moderate"
}
],
"title": "CVE-2019-19062"
},
{
"cve": "CVE-2019-19063",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-19063"
}
],
"notes": [
{
"category": "general",
"text": "Two memory leaks in the rtl_usb_probe() function in drivers/net/wireless/realtek/rtlwifi/usb.c in the Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption), aka CID-3f9361695113.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-19063",
"url": "https://www.suse.com/security/cve/CVE-2019-19063"
},
{
"category": "external",
"summary": "SUSE Bug 1157298 for CVE-2019-19063",
"url": "https://bugzilla.suse.com/1157298"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-14T10:06:03Z",
"details": "moderate"
}
],
"title": "CVE-2019-19063"
},
{
"cve": "CVE-2019-19065",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-19065"
}
],
"notes": [
{
"category": "general",
"text": "** DISPUTED ** A memory leak in the sdma_init() function in drivers/infiniband/hw/hfi1/sdma.c in the Linux kernel before 5.3.9 allows attackers to cause a denial of service (memory consumption) by triggering rhashtable_init() failures, aka CID-34b3be18a04e. NOTE: This has been disputed as not a vulnerability because \"rhashtable_init() can only fail if it is passed invalid values in the second parameter\u0027s struct, but when invoked from sdma_init() that is a pointer to a static const struct, so an attacker could only trigger failure if they could corrupt kernel memory (in which case a small memory leak is not a significant problem).\"",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-19065",
"url": "https://www.suse.com/security/cve/CVE-2019-19065"
},
{
"category": "external",
"summary": "SUSE Bug 1157191 for CVE-2019-19065",
"url": "https://bugzilla.suse.com/1157191"
},
{
"category": "external",
"summary": "SUSE Bug 1173961 for CVE-2019-19065",
"url": "https://bugzilla.suse.com/1173961"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-14T10:06:03Z",
"details": "important"
}
],
"title": "CVE-2019-19065"
},
{
"cve": "CVE-2019-19066",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-19066"
}
],
"notes": [
{
"category": "general",
"text": "A memory leak in the bfad_im_get_stats() function in drivers/scsi/bfa/bfad_attr.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering bfa_port_get_stats() failures, aka CID-0e62395da2bd.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-19066",
"url": "https://www.suse.com/security/cve/CVE-2019-19066"
},
{
"category": "external",
"summary": "SUSE Bug 1157303 for CVE-2019-19066",
"url": "https://bugzilla.suse.com/1157303"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-14T10:06:03Z",
"details": "moderate"
}
],
"title": "CVE-2019-19066"
},
{
"cve": "CVE-2019-19067",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-19067"
}
],
"notes": [
{
"category": "general",
"text": "** DISPUTED ** Four memory leaks in the acp_hw_init() function in drivers/gpu/drm/amd/amdgpu/amdgpu_acp.c in the Linux kernel before 5.3.8 allow attackers to cause a denial of service (memory consumption) by triggering mfd_add_hotplug_devices() or pm_genpd_add_device() failures, aka CID-57be09c6e874. NOTE: third parties dispute the relevance of this because the attacker must already have privileges for module loading.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-19067",
"url": "https://www.suse.com/security/cve/CVE-2019-19067"
},
{
"category": "external",
"summary": "SUSE Bug 1157180 for CVE-2019-19067",
"url": "https://bugzilla.suse.com/1157180"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-14T10:06:03Z",
"details": "moderate"
}
],
"title": "CVE-2019-19067"
},
{
"cve": "CVE-2019-19068",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-19068"
}
],
"notes": [
{
"category": "general",
"text": "A memory leak in the rtl8xxxu_submit_int_urb() function in drivers/net/wireless/realtek/rtl8xxxu/rtl8xxxu_core.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering usb_submit_urb() failures, aka CID-a2cdd07488e6.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-19068",
"url": "https://www.suse.com/security/cve/CVE-2019-19068"
},
{
"category": "external",
"summary": "SUSE Bug 1157307 for CVE-2019-19068",
"url": "https://bugzilla.suse.com/1157307"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-14T10:06:03Z",
"details": "moderate"
}
],
"title": "CVE-2019-19068"
},
{
"cve": "CVE-2019-19073",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-19073"
}
],
"notes": [
{
"category": "general",
"text": "Memory leaks in drivers/net/wireless/ath/ath9k/htc_hst.c in the Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption) by triggering wait_for_completion_timeout() failures. This affects the htc_config_pipe_credits() function, the htc_setup_complete() function, and the htc_connect_service() function, aka CID-853acf7caf10.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-19073",
"url": "https://www.suse.com/security/cve/CVE-2019-19073"
},
{
"category": "external",
"summary": "SUSE Bug 1157070 for CVE-2019-19073",
"url": "https://bugzilla.suse.com/1157070"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-14T10:06:03Z",
"details": "moderate"
}
],
"title": "CVE-2019-19073"
},
{
"cve": "CVE-2019-19074",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-19074"
}
],
"notes": [
{
"category": "general",
"text": "A memory leak in the ath9k_wmi_cmd() function in drivers/net/wireless/ath/ath9k/wmi.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption), aka CID-728c1e2a05e4.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-19074",
"url": "https://www.suse.com/security/cve/CVE-2019-19074"
},
{
"category": "external",
"summary": "SUSE Bug 1157143 for CVE-2019-19074",
"url": "https://bugzilla.suse.com/1157143"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-14T10:06:03Z",
"details": "moderate"
}
],
"title": "CVE-2019-19074"
},
{
"cve": "CVE-2019-19075",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-19075"
}
],
"notes": [
{
"category": "general",
"text": "A memory leak in the ca8210_probe() function in drivers/net/ieee802154/ca8210.c in the Linux kernel before 5.3.8 allows attackers to cause a denial of service (memory consumption) by triggering ca8210_get_platform_data() failures, aka CID-6402939ec86e.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-19075",
"url": "https://www.suse.com/security/cve/CVE-2019-19075"
},
{
"category": "external",
"summary": "SUSE Bug 1157162 for CVE-2019-19075",
"url": "https://bugzilla.suse.com/1157162"
},
{
"category": "external",
"summary": "SUSE Bug 1173958 for CVE-2019-19075",
"url": "https://bugzilla.suse.com/1173958"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-14T10:06:03Z",
"details": "low"
}
],
"title": "CVE-2019-19075"
},
{
"cve": "CVE-2019-19077",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-19077"
}
],
"notes": [
{
"category": "general",
"text": "A memory leak in the bnxt_re_create_srq() function in drivers/infiniband/hw/bnxt_re/ib_verbs.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering copy to udata failures, aka CID-4a9d46a9fe14.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-19077",
"url": "https://www.suse.com/security/cve/CVE-2019-19077"
},
{
"category": "external",
"summary": "SUSE Bug 1157171 for CVE-2019-19077",
"url": "https://bugzilla.suse.com/1157171"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-14T10:06:03Z",
"details": "moderate"
}
],
"title": "CVE-2019-19077"
},
{
"cve": "CVE-2019-19078",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-19078"
}
],
"notes": [
{
"category": "general",
"text": "A memory leak in the ath10k_usb_hif_tx_sg() function in drivers/net/wireless/ath/ath10k/usb.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering usb_submit_urb() failures, aka CID-b8d17e7d93d2.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-19078",
"url": "https://www.suse.com/security/cve/CVE-2019-19078"
},
{
"category": "external",
"summary": "SUSE Bug 1157032 for CVE-2019-19078",
"url": "https://bugzilla.suse.com/1157032"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-14T10:06:03Z",
"details": "moderate"
}
],
"title": "CVE-2019-19078"
},
{
"cve": "CVE-2019-19080",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-19080"
}
],
"notes": [
{
"category": "general",
"text": "Four memory leaks in the nfp_flower_spawn_phy_reprs() function in drivers/net/ethernet/netronome/nfp/flower/main.c in the Linux kernel before 5.3.4 allow attackers to cause a denial of service (memory consumption), aka CID-8572cea1461a.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-19080",
"url": "https://www.suse.com/security/cve/CVE-2019-19080"
},
{
"category": "external",
"summary": "SUSE Bug 1157044 for CVE-2019-19080",
"url": "https://bugzilla.suse.com/1157044"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-14T10:06:03Z",
"details": "moderate"
}
],
"title": "CVE-2019-19080"
},
{
"cve": "CVE-2019-19081",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-19081"
}
],
"notes": [
{
"category": "general",
"text": "A memory leak in the nfp_flower_spawn_vnic_reprs() function in drivers/net/ethernet/netronome/nfp/flower/main.c in the Linux kernel before 5.3.4 allows attackers to cause a denial of service (memory consumption), aka CID-8ce39eb5a67a.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-19081",
"url": "https://www.suse.com/security/cve/CVE-2019-19081"
},
{
"category": "external",
"summary": "SUSE Bug 1157045 for CVE-2019-19081",
"url": "https://bugzilla.suse.com/1157045"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-14T10:06:03Z",
"details": "moderate"
}
],
"title": "CVE-2019-19081"
},
{
"cve": "CVE-2019-19082",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-19082"
}
],
"notes": [
{
"category": "general",
"text": "Memory leaks in *create_resource_pool() functions under drivers/gpu/drm/amd/display/dc in the Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption). This affects the dce120_create_resource_pool() function in drivers/gpu/drm/amd/display/dc/dce120/dce120_resource.c, the dce110_create_resource_pool() function in drivers/gpu/drm/amd/display/dc/dce110/dce110_resource.c, the dce100_create_resource_pool() function in drivers/gpu/drm/amd/display/dc/dce100/dce100_resource.c, the dcn10_create_resource_pool() function in drivers/gpu/drm/amd/display/dc/dcn10/dcn10_resource.c, and the dce112_create_resource_pool() function in drivers/gpu/drm/amd/display/dc/dce112/dce112_resource.c, aka CID-104c307147ad.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-19082",
"url": "https://www.suse.com/security/cve/CVE-2019-19082"
},
{
"category": "external",
"summary": "SUSE Bug 1157046 for CVE-2019-19082",
"url": "https://bugzilla.suse.com/1157046"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-14T10:06:03Z",
"details": "moderate"
}
],
"title": "CVE-2019-19082"
},
{
"cve": "CVE-2019-19083",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-19083"
}
],
"notes": [
{
"category": "general",
"text": "Memory leaks in *clock_source_create() functions under drivers/gpu/drm/amd/display/dc in the Linux kernel before 5.3.8 allow attackers to cause a denial of service (memory consumption). This affects the dce112_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dce112/dce112_resource.c, the dce100_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dce100/dce100_resource.c, the dcn10_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dcn10/dcn10_resource.c, the dcn20_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dcn20/dcn20_resource.c, the dce120_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dce120/dce120_resource.c, the dce110_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dce110/dce110_resource.c, and the dce80_clock_source_create() function in drivers/gpu/drm/amd/display/dc/dce80/dce80_resource.c, aka CID-055e547478a1.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-19083",
"url": "https://www.suse.com/security/cve/CVE-2019-19083"
},
{
"category": "external",
"summary": "SUSE Bug 1157049 for CVE-2019-19083",
"url": "https://bugzilla.suse.com/1157049"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-14T10:06:03Z",
"details": "moderate"
}
],
"title": "CVE-2019-19083"
},
{
"cve": "CVE-2019-19227",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-19227"
}
],
"notes": [
{
"category": "general",
"text": "In the AppleTalk subsystem in the Linux kernel before 5.1, there is a potential NULL pointer dereference because register_snap_client may return NULL. This will lead to denial of service in net/appletalk/aarp.c and net/appletalk/ddp.c, as demonstrated by unregister_snap_client, aka CID-9804501fa122.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-19227",
"url": "https://www.suse.com/security/cve/CVE-2019-19227"
},
{
"category": "external",
"summary": "SUSE Bug 1157678 for CVE-2019-19227",
"url": "https://bugzilla.suse.com/1157678"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-14T10:06:03Z",
"details": "moderate"
}
],
"title": "CVE-2019-19227"
},
{
"cve": "CVE-2019-19319",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-19319"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel before 5.2, a setxattr operation, after a mount of a crafted ext4 image, can cause a slab-out-of-bounds write access because of an ext4_xattr_set_entry use-after-free in fs/ext4/xattr.c when a large old_size value is used in a memset call, aka CID-345c0dbf3a30.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-19319",
"url": "https://www.suse.com/security/cve/CVE-2019-19319"
},
{
"category": "external",
"summary": "SUSE Bug 1158021 for CVE-2019-19319",
"url": "https://bugzilla.suse.com/1158021"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-14T10:06:03Z",
"details": "moderate"
}
],
"title": "CVE-2019-19319"
},
{
"cve": "CVE-2019-19332",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-19332"
}
],
"notes": [
{
"category": "general",
"text": "An out-of-bounds memory write issue was found in the Linux Kernel, version 3.13 through 5.4, in the way the Linux kernel\u0027s KVM hypervisor handled the \u0027KVM_GET_EMULATED_CPUID\u0027 ioctl(2) request to get CPUID features emulated by the KVM hypervisor. A user or process able to access the \u0027/dev/kvm\u0027 device could use this flaw to crash the system, resulting in a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-19332",
"url": "https://www.suse.com/security/cve/CVE-2019-19332"
},
{
"category": "external",
"summary": "SUSE Bug 1158827 for CVE-2019-19332",
"url": "https://bugzilla.suse.com/1158827"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-14T10:06:03Z",
"details": "moderate"
}
],
"title": "CVE-2019-19332"
},
{
"cve": "CVE-2019-19338",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-19338"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the fix for CVE-2019-11135, in the Linux upstream kernel versions before 5.5 where, the way Intel CPUs handle speculative execution of instructions when a TSX Asynchronous Abort (TAA) error occurs. When a guest is running on a host CPU affected by the TAA flaw (TAA_NO=0), but is not affected by the MDS issue (MDS_NO=1), the guest was to clear the affected buffers by using a VERW instruction mechanism. But when the MDS_NO=1 bit was exported to the guests, the guests did not use the VERW mechanism to clear the affected buffers. This issue affects guests running on Cascade Lake CPUs and requires that host has \u0027TSX\u0027 enabled. Confidentiality of data is the highest threat associated with this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-19338",
"url": "https://www.suse.com/security/cve/CVE-2019-19338"
},
{
"category": "external",
"summary": "SUSE Bug 1158954 for CVE-2019-19338",
"url": "https://bugzilla.suse.com/1158954"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-14T10:06:03Z",
"details": "moderate"
}
],
"title": "CVE-2019-19338"
},
{
"cve": "CVE-2019-19447",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-19447"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel 5.0.21, mounting a crafted ext4 filesystem image, performing some operations, and unmounting can lead to a use-after-free in ext4_put_super in fs/ext4/super.c, related to dump_orphan_list in fs/ext4/super.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-19447",
"url": "https://www.suse.com/security/cve/CVE-2019-19447"
},
{
"category": "external",
"summary": "SUSE Bug 1158819 for CVE-2019-19447",
"url": "https://bugzilla.suse.com/1158819"
},
{
"category": "external",
"summary": "SUSE Bug 1173869 for CVE-2019-19447",
"url": "https://bugzilla.suse.com/1173869"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-14T10:06:03Z",
"details": "important"
}
],
"title": "CVE-2019-19447"
},
{
"cve": "CVE-2019-19523",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-19523"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel before 5.3.7, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/misc/adutux.c driver, aka CID-44efc269db79.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-19523",
"url": "https://www.suse.com/security/cve/CVE-2019-19523"
},
{
"category": "external",
"summary": "SUSE Bug 1158381 for CVE-2019-19523",
"url": "https://bugzilla.suse.com/1158381"
},
{
"category": "external",
"summary": "SUSE Bug 1158823 for CVE-2019-19523",
"url": "https://bugzilla.suse.com/1158823"
},
{
"category": "external",
"summary": "SUSE Bug 1158834 for CVE-2019-19523",
"url": "https://bugzilla.suse.com/1158834"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-14T10:06:03Z",
"details": "moderate"
}
],
"title": "CVE-2019-19523"
},
{
"cve": "CVE-2019-19524",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-19524"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel before 5.3.12, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/input/ff-memless.c driver, aka CID-fa3a5a1880c9.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-19524",
"url": "https://www.suse.com/security/cve/CVE-2019-19524"
},
{
"category": "external",
"summary": "SUSE Bug 1158381 for CVE-2019-19524",
"url": "https://bugzilla.suse.com/1158381"
},
{
"category": "external",
"summary": "SUSE Bug 1158413 for CVE-2019-19524",
"url": "https://bugzilla.suse.com/1158413"
},
{
"category": "external",
"summary": "SUSE Bug 1158834 for CVE-2019-19524",
"url": "https://bugzilla.suse.com/1158834"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.4,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-14T10:06:03Z",
"details": "low"
}
],
"title": "CVE-2019-19524"
},
{
"cve": "CVE-2019-19525",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-19525"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel before 5.3.6, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/net/ieee802154/atusb.c driver, aka CID-7fd25e6fc035.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-19525",
"url": "https://www.suse.com/security/cve/CVE-2019-19525"
},
{
"category": "external",
"summary": "SUSE Bug 1158381 for CVE-2019-19525",
"url": "https://bugzilla.suse.com/1158381"
},
{
"category": "external",
"summary": "SUSE Bug 1158417 for CVE-2019-19525",
"url": "https://bugzilla.suse.com/1158417"
},
{
"category": "external",
"summary": "SUSE Bug 1158834 for CVE-2019-19525",
"url": "https://bugzilla.suse.com/1158834"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-14T10:06:03Z",
"details": "moderate"
}
],
"title": "CVE-2019-19525"
},
{
"cve": "CVE-2019-19526",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-19526"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel before 5.3.9, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/nfc/pn533/usb.c driver, aka CID-6af3aa57a098.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-19526",
"url": "https://www.suse.com/security/cve/CVE-2019-19526"
},
{
"category": "external",
"summary": "SUSE Bug 1158381 for CVE-2019-19526",
"url": "https://bugzilla.suse.com/1158381"
},
{
"category": "external",
"summary": "SUSE Bug 1158834 for CVE-2019-19526",
"url": "https://bugzilla.suse.com/1158834"
},
{
"category": "external",
"summary": "SUSE Bug 1158893 for CVE-2019-19526",
"url": "https://bugzilla.suse.com/1158893"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-14T10:06:03Z",
"details": "moderate"
}
],
"title": "CVE-2019-19526"
},
{
"cve": "CVE-2019-19527",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-19527"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel before 5.2.10, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/hid/usbhid/hiddev.c driver, aka CID-9c09b214f30e.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-19527",
"url": "https://www.suse.com/security/cve/CVE-2019-19527"
},
{
"category": "external",
"summary": "SUSE Bug 1158381 for CVE-2019-19527",
"url": "https://bugzilla.suse.com/1158381"
},
{
"category": "external",
"summary": "SUSE Bug 1158834 for CVE-2019-19527",
"url": "https://bugzilla.suse.com/1158834"
},
{
"category": "external",
"summary": "SUSE Bug 1158900 for CVE-2019-19527",
"url": "https://bugzilla.suse.com/1158900"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-14T10:06:03Z",
"details": "moderate"
}
],
"title": "CVE-2019-19527"
},
{
"cve": "CVE-2019-19528",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-19528"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel before 5.3.7, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/misc/iowarrior.c driver, aka CID-edc4746f253d.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-19528",
"url": "https://www.suse.com/security/cve/CVE-2019-19528"
},
{
"category": "external",
"summary": "SUSE Bug 1158381 for CVE-2019-19528",
"url": "https://bugzilla.suse.com/1158381"
},
{
"category": "external",
"summary": "SUSE Bug 1158407 for CVE-2019-19528",
"url": "https://bugzilla.suse.com/1158407"
},
{
"category": "external",
"summary": "SUSE Bug 1158834 for CVE-2019-19528",
"url": "https://bugzilla.suse.com/1158834"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-14T10:06:03Z",
"details": "moderate"
}
],
"title": "CVE-2019-19528"
},
{
"cve": "CVE-2019-19529",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-19529"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel before 5.3.11, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/net/can/usb/mcba_usb.c driver, aka CID-4d6636498c41.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-19529",
"url": "https://www.suse.com/security/cve/CVE-2019-19529"
},
{
"category": "external",
"summary": "SUSE Bug 1158381 for CVE-2019-19529",
"url": "https://bugzilla.suse.com/1158381"
},
{
"category": "external",
"summary": "SUSE Bug 1158834 for CVE-2019-19529",
"url": "https://bugzilla.suse.com/1158834"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-14T10:06:03Z",
"details": "moderate"
}
],
"title": "CVE-2019-19529"
},
{
"cve": "CVE-2019-19530",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-19530"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel before 5.2.10, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/class/cdc-acm.c driver, aka CID-c52873e5a1ef.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-19530",
"url": "https://www.suse.com/security/cve/CVE-2019-19530"
},
{
"category": "external",
"summary": "SUSE Bug 1158381 for CVE-2019-19530",
"url": "https://bugzilla.suse.com/1158381"
},
{
"category": "external",
"summary": "SUSE Bug 1158410 for CVE-2019-19530",
"url": "https://bugzilla.suse.com/1158410"
},
{
"category": "external",
"summary": "SUSE Bug 1158834 for CVE-2019-19530",
"url": "https://bugzilla.suse.com/1158834"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-14T10:06:03Z",
"details": "moderate"
}
],
"title": "CVE-2019-19530"
},
{
"cve": "CVE-2019-19531",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-19531"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel before 5.2.9, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/misc/yurex.c driver, aka CID-fc05481b2fca.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-19531",
"url": "https://www.suse.com/security/cve/CVE-2019-19531"
},
{
"category": "external",
"summary": "SUSE Bug 1158381 for CVE-2019-19531",
"url": "https://bugzilla.suse.com/1158381"
},
{
"category": "external",
"summary": "SUSE Bug 1158427 for CVE-2019-19531",
"url": "https://bugzilla.suse.com/1158427"
},
{
"category": "external",
"summary": "SUSE Bug 1158445 for CVE-2019-19531",
"url": "https://bugzilla.suse.com/1158445"
},
{
"category": "external",
"summary": "SUSE Bug 1158834 for CVE-2019-19531",
"url": "https://bugzilla.suse.com/1158834"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.1,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-14T10:06:03Z",
"details": "low"
}
],
"title": "CVE-2019-19531"
},
{
"cve": "CVE-2019-19532",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-19532"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel before 5.3.9, there are multiple out-of-bounds write bugs that can be caused by a malicious USB device in the Linux kernel HID drivers, aka CID-d9d4b1e46d95. This affects drivers/hid/hid-axff.c, drivers/hid/hid-dr.c, drivers/hid/hid-emsff.c, drivers/hid/hid-gaff.c, drivers/hid/hid-holtekff.c, drivers/hid/hid-lg2ff.c, drivers/hid/hid-lg3ff.c, drivers/hid/hid-lg4ff.c, drivers/hid/hid-lgff.c, drivers/hid/hid-logitech-hidpp.c, drivers/hid/hid-microsoft.c, drivers/hid/hid-sony.c, drivers/hid/hid-tmff.c, and drivers/hid/hid-zpff.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-19532",
"url": "https://www.suse.com/security/cve/CVE-2019-19532"
},
{
"category": "external",
"summary": "SUSE Bug 1158381 for CVE-2019-19532",
"url": "https://bugzilla.suse.com/1158381"
},
{
"category": "external",
"summary": "SUSE Bug 1158823 for CVE-2019-19532",
"url": "https://bugzilla.suse.com/1158823"
},
{
"category": "external",
"summary": "SUSE Bug 1158824 for CVE-2019-19532",
"url": "https://bugzilla.suse.com/1158824"
},
{
"category": "external",
"summary": "SUSE Bug 1158834 for CVE-2019-19532",
"url": "https://bugzilla.suse.com/1158834"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-14T10:06:03Z",
"details": "moderate"
}
],
"title": "CVE-2019-19532"
},
{
"cve": "CVE-2019-19533",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-19533"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel before 5.3.4, there is an info-leak bug that can be caused by a malicious USB device in the drivers/media/usb/ttusb-dec/ttusb_dec.c driver, aka CID-a10feaf8c464.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-19533",
"url": "https://www.suse.com/security/cve/CVE-2019-19533"
},
{
"category": "external",
"summary": "SUSE Bug 1158381 for CVE-2019-19533",
"url": "https://bugzilla.suse.com/1158381"
},
{
"category": "external",
"summary": "SUSE Bug 1158834 for CVE-2019-19533",
"url": "https://bugzilla.suse.com/1158834"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.4,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-14T10:06:03Z",
"details": "low"
}
],
"title": "CVE-2019-19533"
},
{
"cve": "CVE-2019-19534",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-19534"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel before 5.3.11, there is an info-leak bug that can be caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_core.c driver, aka CID-f7a1337f0d29.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-19534",
"url": "https://www.suse.com/security/cve/CVE-2019-19534"
},
{
"category": "external",
"summary": "SUSE Bug 1158381 for CVE-2019-19534",
"url": "https://bugzilla.suse.com/1158381"
},
{
"category": "external",
"summary": "SUSE Bug 1158398 for CVE-2019-19534",
"url": "https://bugzilla.suse.com/1158398"
},
{
"category": "external",
"summary": "SUSE Bug 1158834 for CVE-2019-19534",
"url": "https://bugzilla.suse.com/1158834"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.4,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-14T10:06:03Z",
"details": "low"
}
],
"title": "CVE-2019-19534"
},
{
"cve": "CVE-2019-19535",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-19535"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel before 5.2.9, there is an info-leak bug that can be caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_fd.c driver, aka CID-30a8beeb3042.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-19535",
"url": "https://www.suse.com/security/cve/CVE-2019-19535"
},
{
"category": "external",
"summary": "SUSE Bug 1158381 for CVE-2019-19535",
"url": "https://bugzilla.suse.com/1158381"
},
{
"category": "external",
"summary": "SUSE Bug 1158834 for CVE-2019-19535",
"url": "https://bugzilla.suse.com/1158834"
},
{
"category": "external",
"summary": "SUSE Bug 1158903 for CVE-2019-19535",
"url": "https://bugzilla.suse.com/1158903"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-14T10:06:03Z",
"details": "moderate"
}
],
"title": "CVE-2019-19535"
},
{
"cve": "CVE-2019-19536",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-19536"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel before 5.2.9, there is an info-leak bug that can be caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_pro.c driver, aka CID-ead16e53c2f0.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-19536",
"url": "https://www.suse.com/security/cve/CVE-2019-19536"
},
{
"category": "external",
"summary": "SUSE Bug 1158381 for CVE-2019-19536",
"url": "https://bugzilla.suse.com/1158381"
},
{
"category": "external",
"summary": "SUSE Bug 1158394 for CVE-2019-19536",
"url": "https://bugzilla.suse.com/1158394"
},
{
"category": "external",
"summary": "SUSE Bug 1158834 for CVE-2019-19536",
"url": "https://bugzilla.suse.com/1158834"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.4,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-14T10:06:03Z",
"details": "low"
}
],
"title": "CVE-2019-19536"
},
{
"cve": "CVE-2019-19537",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-19537"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel before 5.2.10, there is a race condition bug that can be caused by a malicious USB device in the USB character device driver layer, aka CID-303911cfc5b9. This affects drivers/usb/core/file.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-19537",
"url": "https://www.suse.com/security/cve/CVE-2019-19537"
},
{
"category": "external",
"summary": "SUSE Bug 1158381 for CVE-2019-19537",
"url": "https://bugzilla.suse.com/1158381"
},
{
"category": "external",
"summary": "SUSE Bug 1158834 for CVE-2019-19537",
"url": "https://bugzilla.suse.com/1158834"
},
{
"category": "external",
"summary": "SUSE Bug 1158904 for CVE-2019-19537",
"url": "https://bugzilla.suse.com/1158904"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-14T10:06:03Z",
"details": "moderate"
}
],
"title": "CVE-2019-19537"
},
{
"cve": "CVE-2019-19543",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-19543"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel before 5.1.6, there is a use-after-free in serial_ir_init_module() in drivers/media/rc/serial_ir.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-19543",
"url": "https://www.suse.com/security/cve/CVE-2019-19543"
},
{
"category": "external",
"summary": "SUSE Bug 1158427 for CVE-2019-19543",
"url": "https://bugzilla.suse.com/1158427"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-14T10:06:03Z",
"details": "low"
}
],
"title": "CVE-2019-19543"
},
{
"cve": "CVE-2019-19767",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-19767"
}
],
"notes": [
{
"category": "general",
"text": "The Linux kernel before 5.4.2 mishandles ext4_expand_extra_isize, as demonstrated by use-after-free errors in __ext4_expand_extra_isize and ext4_xattr_set_entry, related to fs/ext4/inode.c and fs/ext4/super.c, aka CID-4ea99936a163.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-19767",
"url": "https://www.suse.com/security/cve/CVE-2019-19767"
},
{
"category": "external",
"summary": "SUSE Bug 1159297 for CVE-2019-19767",
"url": "https://bugzilla.suse.com/1159297"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-14T10:06:03Z",
"details": "moderate"
}
],
"title": "CVE-2019-19767"
},
{
"cve": "CVE-2019-19966",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-19966"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel before 5.1.6, there is a use-after-free in cpia2_exit() in drivers/media/usb/cpia2/cpia2_v4l.c that will cause denial of service, aka CID-dea37a972655.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-19966",
"url": "https://www.suse.com/security/cve/CVE-2019-19966"
},
{
"category": "external",
"summary": "SUSE Bug 1159841 for CVE-2019-19966",
"url": "https://bugzilla.suse.com/1159841"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-14T10:06:03Z",
"details": "low"
}
],
"title": "CVE-2019-19966"
},
{
"cve": "CVE-2019-20054",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-20054"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel before 5.0.6, there is a NULL pointer dereference in drop_sysctl_table() in fs/proc/proc_sysctl.c, related to put_links, aka CID-23da9588037e.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-20054",
"url": "https://www.suse.com/security/cve/CVE-2019-20054"
},
{
"category": "external",
"summary": "SUSE Bug 1159910 for CVE-2019-20054",
"url": "https://bugzilla.suse.com/1159910"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-14T10:06:03Z",
"details": "moderate"
}
],
"title": "CVE-2019-20054"
},
{
"cve": "CVE-2019-20095",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-20095"
}
],
"notes": [
{
"category": "general",
"text": "mwifiex_tm_cmd in drivers/net/wireless/marvell/mwifiex/cfg80211.c in the Linux kernel before 5.1.6 has some error-handling cases that did not free allocated hostcmd memory, aka CID-003b686ace82. This will cause a memory leak and denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-20095",
"url": "https://www.suse.com/security/cve/CVE-2019-20095"
},
{
"category": "external",
"summary": "SUSE Bug 1159909 for CVE-2019-20095",
"url": "https://bugzilla.suse.com/1159909"
},
{
"category": "external",
"summary": "SUSE Bug 1159914 for CVE-2019-20095",
"url": "https://bugzilla.suse.com/1159914"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-14T10:06:03Z",
"details": "important"
}
],
"title": "CVE-2019-20095"
},
{
"cve": "CVE-2019-20096",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-20096"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel before 5.1, there is a memory leak in __feat_register_sp() in net/dccp/feat.c, which may cause denial of service, aka CID-1d3ff0950e2b.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-20096",
"url": "https://www.suse.com/security/cve/CVE-2019-20096"
},
{
"category": "external",
"summary": "SUSE Bug 1159908 for CVE-2019-20096",
"url": "https://bugzilla.suse.com/1159908"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-14T10:06:03Z",
"details": "moderate"
}
],
"title": "CVE-2019-20096"
},
{
"cve": "CVE-2019-9456",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-9456"
}
],
"notes": [
{
"category": "general",
"text": "In the Android kernel in Pixel C USB monitor driver there is a possible OOB write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-9456",
"url": "https://www.suse.com/security/cve/CVE-2019-9456"
},
{
"category": "external",
"summary": "SUSE Bug 1150025 for CVE-2019-9456",
"url": "https://bugzilla.suse.com/1150025"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-14T10:06:03Z",
"details": "moderate"
}
],
"title": "CVE-2019-9456"
},
{
"cve": "CVE-2019-9506",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-9506"
}
],
"notes": [
{
"category": "general",
"text": "The Bluetooth BR/EDR specification up to and including version 5.1 permits sufficiently low encryption key length and does not prevent an attacker from influencing the key length negotiation. This allows practical brute-force attacks (aka \"KNOB\") that can decrypt traffic and inject arbitrary ciphertext without the victim noticing.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-9506",
"url": "https://www.suse.com/security/cve/CVE-2019-9506"
},
{
"category": "external",
"summary": "SUSE Bug 1137865 for CVE-2019-9506",
"url": "https://bugzilla.suse.com/1137865"
},
{
"category": "external",
"summary": "SUSE Bug 1146042 for CVE-2019-9506",
"url": "https://bugzilla.suse.com/1146042"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.7.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.7.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-01-14T10:06:03Z",
"details": "moderate"
}
],
"title": "CVE-2019-9506"
}
]
}
suse-su-2019:2962-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for xen",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for xen fixes the following issues:\n\n- CVE-2018-12207: Untrusted virtual machines on Intel CPUs could exploit a race\n condition in the Instruction Fetch Unit of the Intel CPU to cause a Machine\n Exception during Page Size Change, causing the CPU core to be non-functional.\n (bsc#1155945)\n- CVE-2019-11135: Aborting an asynchronous TSX operation on Intel CPUs with\n Transactional Memory support could be used to facilitate sidechannel\n information leaks out of microarchitectural buffers, similar to the\n previously described \u0027Microarchitectural Data Sampling\u0027 attack. (bsc#1152497).\n- CVE-2019-18424: An untrusted domain with access to a physical device can DMA \n into host memory, leading to privilege escalation. (bsc#1154461).\n- CVE-2019-18421: A malicious PV guest administrator may have been able to\n escalate their privilege to that of the host. (bsc#1154458).\n- CVE-2019-18425: 32-bit PV guest user mode could elevate its privileges to that \n of the guest kernel. (bsc#1154456).\n- CVE-2019-18420: Malicious x86 PV guests may have caused a hypervisor crash, \n resulting in a Denial of Service (Dos). (bsc#1154448)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2019-2962,SUSE-SLE-DESKTOP-12-SP4-2019-2962,SUSE-SLE-SDK-12-SP4-2019-2962,SUSE-SLE-SERVER-12-SP4-2019-2962",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_2962-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2019:2962-1",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192962-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2019:2962-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2019-November/006127.html"
},
{
"category": "self",
"summary": "SUSE Bug 1152497",
"url": "https://bugzilla.suse.com/1152497"
},
{
"category": "self",
"summary": "SUSE Bug 1154448",
"url": "https://bugzilla.suse.com/1154448"
},
{
"category": "self",
"summary": "SUSE Bug 1154456",
"url": "https://bugzilla.suse.com/1154456"
},
{
"category": "self",
"summary": "SUSE Bug 1154458",
"url": "https://bugzilla.suse.com/1154458"
},
{
"category": "self",
"summary": "SUSE Bug 1154461",
"url": "https://bugzilla.suse.com/1154461"
},
{
"category": "self",
"summary": "SUSE Bug 1155945",
"url": "https://bugzilla.suse.com/1155945"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-12207 page",
"url": "https://www.suse.com/security/cve/CVE-2018-12207/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11135 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11135/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-18420 page",
"url": "https://www.suse.com/security/cve/CVE-2019-18420/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-18421 page",
"url": "https://www.suse.com/security/cve/CVE-2019-18421/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-18424 page",
"url": "https://www.suse.com/security/cve/CVE-2019-18424/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-18425 page",
"url": "https://www.suse.com/security/cve/CVE-2019-18425/"
}
],
"title": "Security update for xen",
"tracking": {
"current_release_date": "2019-11-12T18:17:59Z",
"generator": {
"date": "2019-11-12T18:17:59Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2019:2962-1",
"initial_release_date": "2019-11-12T18:17:59Z",
"revision_history": [
{
"date": "2019-11-12T18:17:59Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "xen-4.11.2_04-2.17.1.aarch64",
"product": {
"name": "xen-4.11.2_04-2.17.1.aarch64",
"product_id": "xen-4.11.2_04-2.17.1.aarch64"
}
},
{
"category": "product_version",
"name": "xen-devel-4.11.2_04-2.17.1.aarch64",
"product": {
"name": "xen-devel-4.11.2_04-2.17.1.aarch64",
"product_id": "xen-devel-4.11.2_04-2.17.1.aarch64"
}
},
{
"category": "product_version",
"name": "xen-doc-html-4.11.2_04-2.17.1.aarch64",
"product": {
"name": "xen-doc-html-4.11.2_04-2.17.1.aarch64",
"product_id": "xen-doc-html-4.11.2_04-2.17.1.aarch64"
}
},
{
"category": "product_version",
"name": "xen-libs-4.11.2_04-2.17.1.aarch64",
"product": {
"name": "xen-libs-4.11.2_04-2.17.1.aarch64",
"product_id": "xen-libs-4.11.2_04-2.17.1.aarch64"
}
},
{
"category": "product_version",
"name": "xen-tools-4.11.2_04-2.17.1.aarch64",
"product": {
"name": "xen-tools-4.11.2_04-2.17.1.aarch64",
"product_id": "xen-tools-4.11.2_04-2.17.1.aarch64"
}
},
{
"category": "product_version",
"name": "xen-tools-domU-4.11.2_04-2.17.1.aarch64",
"product": {
"name": "xen-tools-domU-4.11.2_04-2.17.1.aarch64",
"product_id": "xen-tools-domU-4.11.2_04-2.17.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "xen-libs-64bit-4.11.2_04-2.17.1.aarch64_ilp32",
"product": {
"name": "xen-libs-64bit-4.11.2_04-2.17.1.aarch64_ilp32",
"product_id": "xen-libs-64bit-4.11.2_04-2.17.1.aarch64_ilp32"
}
}
],
"category": "architecture",
"name": "aarch64_ilp32"
},
{
"branches": [
{
"category": "product_version",
"name": "xen-devel-4.11.2_04-2.17.1.i586",
"product": {
"name": "xen-devel-4.11.2_04-2.17.1.i586",
"product_id": "xen-devel-4.11.2_04-2.17.1.i586"
}
},
{
"category": "product_version",
"name": "xen-libs-4.11.2_04-2.17.1.i586",
"product": {
"name": "xen-libs-4.11.2_04-2.17.1.i586",
"product_id": "xen-libs-4.11.2_04-2.17.1.i586"
}
},
{
"category": "product_version",
"name": "xen-tools-domU-4.11.2_04-2.17.1.i586",
"product": {
"name": "xen-tools-domU-4.11.2_04-2.17.1.i586",
"product_id": "xen-tools-domU-4.11.2_04-2.17.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "xen-4.11.2_04-2.17.1.x86_64",
"product": {
"name": "xen-4.11.2_04-2.17.1.x86_64",
"product_id": "xen-4.11.2_04-2.17.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-devel-4.11.2_04-2.17.1.x86_64",
"product": {
"name": "xen-devel-4.11.2_04-2.17.1.x86_64",
"product_id": "xen-devel-4.11.2_04-2.17.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-doc-html-4.11.2_04-2.17.1.x86_64",
"product": {
"name": "xen-doc-html-4.11.2_04-2.17.1.x86_64",
"product_id": "xen-doc-html-4.11.2_04-2.17.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-libs-4.11.2_04-2.17.1.x86_64",
"product": {
"name": "xen-libs-4.11.2_04-2.17.1.x86_64",
"product_id": "xen-libs-4.11.2_04-2.17.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-libs-32bit-4.11.2_04-2.17.1.x86_64",
"product": {
"name": "xen-libs-32bit-4.11.2_04-2.17.1.x86_64",
"product_id": "xen-libs-32bit-4.11.2_04-2.17.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-tools-4.11.2_04-2.17.1.x86_64",
"product": {
"name": "xen-tools-4.11.2_04-2.17.1.x86_64",
"product_id": "xen-tools-4.11.2_04-2.17.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-tools-domU-4.11.2_04-2.17.1.x86_64",
"product": {
"name": "xen-tools-domU-4.11.2_04-2.17.1.x86_64",
"product_id": "xen-tools-domU-4.11.2_04-2.17.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Desktop 12 SP4",
"product": {
"name": "SUSE Linux Enterprise Desktop 12 SP4",
"product_id": "SUSE Linux Enterprise Desktop 12 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sled:12:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Software Development Kit 12 SP4",
"product": {
"name": "SUSE Linux Enterprise Software Development Kit 12 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-sdk:12:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP4",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:12:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp4"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-4.11.2_04-2.17.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP4",
"product_id": "SUSE Linux Enterprise Desktop 12 SP4:xen-4.11.2_04-2.17.1.x86_64"
},
"product_reference": "xen-4.11.2_04-2.17.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.11.2_04-2.17.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP4",
"product_id": "SUSE Linux Enterprise Desktop 12 SP4:xen-libs-4.11.2_04-2.17.1.x86_64"
},
"product_reference": "xen-libs-4.11.2_04-2.17.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-32bit-4.11.2_04-2.17.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP4",
"product_id": "SUSE Linux Enterprise Desktop 12 SP4:xen-libs-32bit-4.11.2_04-2.17.1.x86_64"
},
"product_reference": "xen-libs-32bit-4.11.2_04-2.17.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-devel-4.11.2_04-2.17.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP4:xen-devel-4.11.2_04-2.17.1.aarch64"
},
"product_reference": "xen-devel-4.11.2_04-2.17.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-devel-4.11.2_04-2.17.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP4:xen-devel-4.11.2_04-2.17.1.x86_64"
},
"product_reference": "xen-devel-4.11.2_04-2.17.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-4.11.2_04-2.17.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:xen-4.11.2_04-2.17.1.x86_64"
},
"product_reference": "xen-4.11.2_04-2.17.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-doc-html-4.11.2_04-2.17.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:xen-doc-html-4.11.2_04-2.17.1.x86_64"
},
"product_reference": "xen-doc-html-4.11.2_04-2.17.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.11.2_04-2.17.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:xen-libs-4.11.2_04-2.17.1.x86_64"
},
"product_reference": "xen-libs-4.11.2_04-2.17.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-32bit-4.11.2_04-2.17.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:xen-libs-32bit-4.11.2_04-2.17.1.x86_64"
},
"product_reference": "xen-libs-32bit-4.11.2_04-2.17.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-4.11.2_04-2.17.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:xen-tools-4.11.2_04-2.17.1.x86_64"
},
"product_reference": "xen-tools-4.11.2_04-2.17.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-domU-4.11.2_04-2.17.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:xen-tools-domU-4.11.2_04-2.17.1.x86_64"
},
"product_reference": "xen-tools-domU-4.11.2_04-2.17.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-4.11.2_04-2.17.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-4.11.2_04-2.17.1.x86_64"
},
"product_reference": "xen-4.11.2_04-2.17.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-doc-html-4.11.2_04-2.17.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-doc-html-4.11.2_04-2.17.1.x86_64"
},
"product_reference": "xen-doc-html-4.11.2_04-2.17.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.11.2_04-2.17.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-libs-4.11.2_04-2.17.1.x86_64"
},
"product_reference": "xen-libs-4.11.2_04-2.17.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-32bit-4.11.2_04-2.17.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-libs-32bit-4.11.2_04-2.17.1.x86_64"
},
"product_reference": "xen-libs-32bit-4.11.2_04-2.17.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-4.11.2_04-2.17.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-tools-4.11.2_04-2.17.1.x86_64"
},
"product_reference": "xen-tools-4.11.2_04-2.17.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-domU-4.11.2_04-2.17.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-tools-domU-4.11.2_04-2.17.1.x86_64"
},
"product_reference": "xen-tools-domU-4.11.2_04-2.17.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-12207",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-12207"
}
],
"notes": [
{
"category": "general",
"text": "Improper invalidation for page table updates by a virtual guest operating system for multiple Intel(R) Processors may allow an authenticated user to potentially enable denial of service of the host system via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP4:xen-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:xen-libs-32bit-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:xen-libs-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:xen-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:xen-doc-html-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:xen-libs-32bit-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:xen-libs-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:xen-tools-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:xen-tools-domU-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-doc-html-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-libs-32bit-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-libs-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-tools-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-tools-domU-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:xen-devel-4.11.2_04-2.17.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:xen-devel-4.11.2_04-2.17.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-12207",
"url": "https://www.suse.com/security/cve/CVE-2018-12207"
},
{
"category": "external",
"summary": "SUSE Bug 1117665 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1117665"
},
{
"category": "external",
"summary": "SUSE Bug 1139073 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1139073"
},
{
"category": "external",
"summary": "SUSE Bug 1152505 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1152505"
},
{
"category": "external",
"summary": "SUSE Bug 1155812 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1155812"
},
{
"category": "external",
"summary": "SUSE Bug 1155817 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1155817"
},
{
"category": "external",
"summary": "SUSE Bug 1155945 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1155945"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1201877"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP4:xen-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:xen-libs-32bit-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:xen-libs-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:xen-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:xen-doc-html-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:xen-libs-32bit-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:xen-libs-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:xen-tools-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:xen-tools-domU-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-doc-html-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-libs-32bit-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-libs-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-tools-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-tools-domU-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:xen-devel-4.11.2_04-2.17.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:xen-devel-4.11.2_04-2.17.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP4:xen-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:xen-libs-32bit-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:xen-libs-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:xen-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:xen-doc-html-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:xen-libs-32bit-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:xen-libs-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:xen-tools-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:xen-tools-domU-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-doc-html-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-libs-32bit-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-libs-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-tools-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-tools-domU-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:xen-devel-4.11.2_04-2.17.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:xen-devel-4.11.2_04-2.17.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:17:59Z",
"details": "moderate"
}
],
"title": "CVE-2018-12207"
},
{
"cve": "CVE-2019-11135",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11135"
}
],
"notes": [
{
"category": "general",
"text": "TSX Asynchronous Abort condition on some CPUs utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP4:xen-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:xen-libs-32bit-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:xen-libs-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:xen-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:xen-doc-html-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:xen-libs-32bit-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:xen-libs-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:xen-tools-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:xen-tools-domU-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-doc-html-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-libs-32bit-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-libs-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-tools-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-tools-domU-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:xen-devel-4.11.2_04-2.17.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:xen-devel-4.11.2_04-2.17.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11135",
"url": "https://www.suse.com/security/cve/CVE-2019-11135"
},
{
"category": "external",
"summary": "SUSE Bug 1139073 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1139073"
},
{
"category": "external",
"summary": "SUSE Bug 1152497 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1152497"
},
{
"category": "external",
"summary": "SUSE Bug 1152505 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1152505"
},
{
"category": "external",
"summary": "SUSE Bug 1152506 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1152506"
},
{
"category": "external",
"summary": "SUSE Bug 1160120 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1160120"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1201877"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP4:xen-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:xen-libs-32bit-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:xen-libs-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:xen-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:xen-doc-html-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:xen-libs-32bit-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:xen-libs-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:xen-tools-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:xen-tools-domU-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-doc-html-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-libs-32bit-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-libs-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-tools-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-tools-domU-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:xen-devel-4.11.2_04-2.17.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:xen-devel-4.11.2_04-2.17.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP4:xen-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:xen-libs-32bit-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:xen-libs-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:xen-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:xen-doc-html-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:xen-libs-32bit-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:xen-libs-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:xen-tools-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:xen-tools-domU-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-doc-html-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-libs-32bit-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-libs-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-tools-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-tools-domU-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:xen-devel-4.11.2_04-2.17.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:xen-devel-4.11.2_04-2.17.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:17:59Z",
"details": "moderate"
}
],
"title": "CVE-2019-11135"
},
{
"cve": "CVE-2019-18420",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-18420"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Xen through 4.12.x allowing x86 PV guest OS users to cause a denial of service via a VCPUOP_initialise hypercall. hypercall_create_continuation() is a variadic function which uses a printf-like format string to interpret its parameters. Error handling for a bad format character was done using BUG(), which crashes Xen. One path, via the VCPUOP_initialise hypercall, has a bad format character. The BUG() can be hit if VCPUOP_initialise executes for a sufficiently long period of time for a continuation to be created. Malicious guests may cause a hypervisor crash, resulting in a Denial of Service (DoS). Xen versions 4.6 and newer are vulnerable. Xen versions 4.5 and earlier are not vulnerable. Only x86 PV guests can exploit the vulnerability. HVM and PVH guests, and guests on ARM systems, cannot exploit the vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP4:xen-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:xen-libs-32bit-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:xen-libs-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:xen-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:xen-doc-html-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:xen-libs-32bit-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:xen-libs-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:xen-tools-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:xen-tools-domU-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-doc-html-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-libs-32bit-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-libs-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-tools-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-tools-domU-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:xen-devel-4.11.2_04-2.17.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:xen-devel-4.11.2_04-2.17.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-18420",
"url": "https://www.suse.com/security/cve/CVE-2019-18420"
},
{
"category": "external",
"summary": "SUSE Bug 1154448 for CVE-2019-18420",
"url": "https://bugzilla.suse.com/1154448"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP4:xen-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:xen-libs-32bit-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:xen-libs-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:xen-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:xen-doc-html-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:xen-libs-32bit-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:xen-libs-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:xen-tools-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:xen-tools-domU-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-doc-html-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-libs-32bit-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-libs-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-tools-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-tools-domU-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:xen-devel-4.11.2_04-2.17.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:xen-devel-4.11.2_04-2.17.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP4:xen-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:xen-libs-32bit-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:xen-libs-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:xen-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:xen-doc-html-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:xen-libs-32bit-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:xen-libs-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:xen-tools-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:xen-tools-domU-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-doc-html-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-libs-32bit-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-libs-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-tools-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-tools-domU-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:xen-devel-4.11.2_04-2.17.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:xen-devel-4.11.2_04-2.17.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:17:59Z",
"details": "important"
}
],
"title": "CVE-2019-18420"
},
{
"cve": "CVE-2019-18421",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-18421"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Xen through 4.12.x allowing x86 PV guest OS users to gain host OS privileges by leveraging race conditions in pagetable promotion and demotion operations. There are issues with restartable PV type change operations. To avoid using shadow pagetables for PV guests, Xen exposes the actual hardware pagetables to the guest. In order to prevent the guest from modifying these page tables directly, Xen keeps track of how pages are used using a type system; pages must be \"promoted\" before being used as a pagetable, and \"demoted\" before being used for any other type. Xen also allows for \"recursive\" promotions: i.e., an operating system promoting a page to an L4 pagetable may end up causing pages to be promoted to L3s, which may in turn cause pages to be promoted to L2s, and so on. These operations may take an arbitrarily large amount of time, and so must be re-startable. Unfortunately, making recursive pagetable promotion and demotion operations restartable is incredibly complicated, and the code contains several races which, if triggered, can cause Xen to drop or retain extra type counts, potentially allowing guests to get write access to in-use pagetables. A malicious PV guest administrator may be able to escalate their privilege to that of the host. All x86 systems with untrusted PV guests are vulnerable. HVM and PVH guests cannot exercise this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP4:xen-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:xen-libs-32bit-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:xen-libs-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:xen-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:xen-doc-html-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:xen-libs-32bit-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:xen-libs-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:xen-tools-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:xen-tools-domU-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-doc-html-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-libs-32bit-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-libs-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-tools-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-tools-domU-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:xen-devel-4.11.2_04-2.17.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:xen-devel-4.11.2_04-2.17.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-18421",
"url": "https://www.suse.com/security/cve/CVE-2019-18421"
},
{
"category": "external",
"summary": "SUSE Bug 1154458 for CVE-2019-18421",
"url": "https://bugzilla.suse.com/1154458"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2019-18421",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP4:xen-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:xen-libs-32bit-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:xen-libs-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:xen-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:xen-doc-html-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:xen-libs-32bit-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:xen-libs-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:xen-tools-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:xen-tools-domU-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-doc-html-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-libs-32bit-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-libs-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-tools-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-tools-domU-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:xen-devel-4.11.2_04-2.17.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:xen-devel-4.11.2_04-2.17.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP4:xen-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:xen-libs-32bit-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:xen-libs-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:xen-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:xen-doc-html-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:xen-libs-32bit-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:xen-libs-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:xen-tools-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:xen-tools-domU-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-doc-html-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-libs-32bit-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-libs-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-tools-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-tools-domU-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:xen-devel-4.11.2_04-2.17.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:xen-devel-4.11.2_04-2.17.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:17:59Z",
"details": "important"
}
],
"title": "CVE-2019-18421"
},
{
"cve": "CVE-2019-18424",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-18424"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Xen through 4.12.x allowing attackers to gain host OS privileges via DMA in a situation where an untrusted domain has access to a physical device. This occurs because passed through PCI devices may corrupt host memory after deassignment. When a PCI device is assigned to an untrusted domain, it is possible for that domain to program the device to DMA to an arbitrary address. The IOMMU is used to protect the host from malicious DMA by making sure that the device addresses can only target memory assigned to the guest. However, when the guest domain is torn down, or the device is deassigned, the device is assigned back to dom0, thus allowing any in-flight DMA to potentially target critical host data. An untrusted domain with access to a physical device can DMA into host memory, leading to privilege escalation. Only systems where guests are given direct access to physical devices capable of DMA (PCI pass-through) are vulnerable. Systems which do not use PCI pass-through are not vulnerable.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP4:xen-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:xen-libs-32bit-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:xen-libs-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:xen-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:xen-doc-html-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:xen-libs-32bit-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:xen-libs-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:xen-tools-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:xen-tools-domU-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-doc-html-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-libs-32bit-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-libs-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-tools-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-tools-domU-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:xen-devel-4.11.2_04-2.17.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:xen-devel-4.11.2_04-2.17.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-18424",
"url": "https://www.suse.com/security/cve/CVE-2019-18424"
},
{
"category": "external",
"summary": "SUSE Bug 1154461 for CVE-2019-18424",
"url": "https://bugzilla.suse.com/1154461"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP4:xen-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:xen-libs-32bit-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:xen-libs-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:xen-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:xen-doc-html-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:xen-libs-32bit-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:xen-libs-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:xen-tools-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:xen-tools-domU-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-doc-html-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-libs-32bit-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-libs-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-tools-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-tools-domU-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:xen-devel-4.11.2_04-2.17.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:xen-devel-4.11.2_04-2.17.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.6,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP4:xen-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:xen-libs-32bit-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:xen-libs-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:xen-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:xen-doc-html-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:xen-libs-32bit-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:xen-libs-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:xen-tools-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:xen-tools-domU-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-doc-html-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-libs-32bit-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-libs-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-tools-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-tools-domU-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:xen-devel-4.11.2_04-2.17.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:xen-devel-4.11.2_04-2.17.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:17:59Z",
"details": "important"
}
],
"title": "CVE-2019-18424"
},
{
"cve": "CVE-2019-18425",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-18425"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Xen through 4.12.x allowing 32-bit PV guest OS users to gain guest OS privileges by installing and using descriptors. There is missing descriptor table limit checking in x86 PV emulation. When emulating certain PV guest operations, descriptor table accesses are performed by the emulating code. Such accesses should respect the guest specified limits, unless otherwise guaranteed to fail in such a case. Without this, emulation of 32-bit guest user mode calls through call gates would allow guest user mode to install and then use descriptors of their choice, as long as the guest kernel did not itself install an LDT. (Most OSes don\u0027t install any LDT by default). 32-bit PV guest user mode can elevate its privileges to that of the guest kernel. Xen versions from at least 3.2 onwards are affected. Only 32-bit PV guest user mode can leverage this vulnerability. HVM, PVH, as well as 64-bit PV guests cannot leverage this vulnerability. Arm systems are unaffected.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP4:xen-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:xen-libs-32bit-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:xen-libs-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:xen-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:xen-doc-html-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:xen-libs-32bit-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:xen-libs-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:xen-tools-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:xen-tools-domU-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-doc-html-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-libs-32bit-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-libs-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-tools-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-tools-domU-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:xen-devel-4.11.2_04-2.17.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:xen-devel-4.11.2_04-2.17.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-18425",
"url": "https://www.suse.com/security/cve/CVE-2019-18425"
},
{
"category": "external",
"summary": "SUSE Bug 1154456 for CVE-2019-18425",
"url": "https://bugzilla.suse.com/1154456"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2019-18425",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP4:xen-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:xen-libs-32bit-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:xen-libs-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:xen-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:xen-doc-html-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:xen-libs-32bit-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:xen-libs-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:xen-tools-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:xen-tools-domU-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-doc-html-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-libs-32bit-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-libs-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-tools-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-tools-domU-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:xen-devel-4.11.2_04-2.17.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:xen-devel-4.11.2_04-2.17.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP4:xen-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:xen-libs-32bit-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:xen-libs-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:xen-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:xen-doc-html-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:xen-libs-32bit-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:xen-libs-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:xen-tools-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server 12 SP4:xen-tools-domU-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-doc-html-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-libs-32bit-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-libs-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-tools-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:xen-tools-domU-4.11.2_04-2.17.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:xen-devel-4.11.2_04-2.17.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:xen-devel-4.11.2_04-2.17.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:17:59Z",
"details": "important"
}
],
"title": "CVE-2019-18425"
}
]
}
suse-su-2019:2956-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for qemu",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for qemu fixes the following issues:\n\n- Remove a backslash \u0027\\\u0027 escape character from 80-qemu-ga.rules (bsc#1153358)\n Unlike sles 15 or newer guests, The udev rule file of qemu guest agent in\n sles 12 sp4 or newer guest only needs one escape character.\n\n- Fix use-after-free in slirp (CVE-2018-20126 bsc#1119991)\n- Fix potential DOS in lsi scsi controller emulation (CVE-2019-12068\n bsc#1146873)\n- Expose taa-no \u0027feature\u0027, indicating CPU does not have the\n TSX Async Abort vulnerability. (CVE-2019-11135 bsc#1152506)\n- Expose pschange-mc-no \u0027feature\u0027, indicating CPU does not have\n the page size change machine check vulnerability (CVE-2018-12207\n bsc#1155812)\n- Patch queue updated from https://gitlab.suse.de/virtualization/qemu.git SLE12-SP4\n\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2019-2956,SUSE-SLE-DESKTOP-12-SP4-2019-2956,SUSE-SLE-SERVER-12-SP4-2019-2956",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_2956-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2019:2956-1",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192956-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2019:2956-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2019-November/006129.html"
},
{
"category": "self",
"summary": "SUSE Bug 1119991",
"url": "https://bugzilla.suse.com/1119991"
},
{
"category": "self",
"summary": "SUSE Bug 1146873",
"url": "https://bugzilla.suse.com/1146873"
},
{
"category": "self",
"summary": "SUSE Bug 1152506",
"url": "https://bugzilla.suse.com/1152506"
},
{
"category": "self",
"summary": "SUSE Bug 1153358",
"url": "https://bugzilla.suse.com/1153358"
},
{
"category": "self",
"summary": "SUSE Bug 1155812",
"url": "https://bugzilla.suse.com/1155812"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-12207 page",
"url": "https://www.suse.com/security/cve/CVE-2018-12207/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-20126 page",
"url": "https://www.suse.com/security/cve/CVE-2018-20126/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11135 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11135/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-12068 page",
"url": "https://www.suse.com/security/cve/CVE-2019-12068/"
}
],
"title": "Security update for qemu",
"tracking": {
"current_release_date": "2019-11-12T18:15:08Z",
"generator": {
"date": "2019-11-12T18:15:08Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2019:2956-1",
"initial_release_date": "2019-11-12T18:15:08Z",
"revision_history": [
{
"date": "2019-11-12T18:15:08Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "qemu-2.11.2-5.23.2.aarch64",
"product": {
"name": "qemu-2.11.2-5.23.2.aarch64",
"product_id": "qemu-2.11.2-5.23.2.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-arm-2.11.2-5.23.2.aarch64",
"product": {
"name": "qemu-arm-2.11.2-5.23.2.aarch64",
"product_id": "qemu-arm-2.11.2-5.23.2.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-block-curl-2.11.2-5.23.2.aarch64",
"product": {
"name": "qemu-block-curl-2.11.2-5.23.2.aarch64",
"product_id": "qemu-block-curl-2.11.2-5.23.2.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-block-dmg-2.11.2-5.23.2.aarch64",
"product": {
"name": "qemu-block-dmg-2.11.2-5.23.2.aarch64",
"product_id": "qemu-block-dmg-2.11.2-5.23.2.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-block-iscsi-2.11.2-5.23.2.aarch64",
"product": {
"name": "qemu-block-iscsi-2.11.2-5.23.2.aarch64",
"product_id": "qemu-block-iscsi-2.11.2-5.23.2.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-block-rbd-2.11.2-5.23.2.aarch64",
"product": {
"name": "qemu-block-rbd-2.11.2-5.23.2.aarch64",
"product_id": "qemu-block-rbd-2.11.2-5.23.2.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-block-ssh-2.11.2-5.23.2.aarch64",
"product": {
"name": "qemu-block-ssh-2.11.2-5.23.2.aarch64",
"product_id": "qemu-block-ssh-2.11.2-5.23.2.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-extra-2.11.2-5.23.2.aarch64",
"product": {
"name": "qemu-extra-2.11.2-5.23.2.aarch64",
"product_id": "qemu-extra-2.11.2-5.23.2.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-guest-agent-2.11.2-5.23.2.aarch64",
"product": {
"name": "qemu-guest-agent-2.11.2-5.23.2.aarch64",
"product_id": "qemu-guest-agent-2.11.2-5.23.2.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-lang-2.11.2-5.23.2.aarch64",
"product": {
"name": "qemu-lang-2.11.2-5.23.2.aarch64",
"product_id": "qemu-lang-2.11.2-5.23.2.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-linux-user-2.11.2-5.23.2.aarch64",
"product": {
"name": "qemu-linux-user-2.11.2-5.23.2.aarch64",
"product_id": "qemu-linux-user-2.11.2-5.23.2.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-ppc-2.11.2-5.23.2.aarch64",
"product": {
"name": "qemu-ppc-2.11.2-5.23.2.aarch64",
"product_id": "qemu-ppc-2.11.2-5.23.2.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-s390-2.11.2-5.23.2.aarch64",
"product": {
"name": "qemu-s390-2.11.2-5.23.2.aarch64",
"product_id": "qemu-s390-2.11.2-5.23.2.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-tools-2.11.2-5.23.2.aarch64",
"product": {
"name": "qemu-tools-2.11.2-5.23.2.aarch64",
"product_id": "qemu-tools-2.11.2-5.23.2.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-x86-2.11.2-5.23.2.aarch64",
"product": {
"name": "qemu-x86-2.11.2-5.23.2.aarch64",
"product_id": "qemu-x86-2.11.2-5.23.2.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-2.11.2-5.23.2.i586",
"product": {
"name": "qemu-2.11.2-5.23.2.i586",
"product_id": "qemu-2.11.2-5.23.2.i586"
}
},
{
"category": "product_version",
"name": "qemu-arm-2.11.2-5.23.2.i586",
"product": {
"name": "qemu-arm-2.11.2-5.23.2.i586",
"product_id": "qemu-arm-2.11.2-5.23.2.i586"
}
},
{
"category": "product_version",
"name": "qemu-block-curl-2.11.2-5.23.2.i586",
"product": {
"name": "qemu-block-curl-2.11.2-5.23.2.i586",
"product_id": "qemu-block-curl-2.11.2-5.23.2.i586"
}
},
{
"category": "product_version",
"name": "qemu-block-dmg-2.11.2-5.23.2.i586",
"product": {
"name": "qemu-block-dmg-2.11.2-5.23.2.i586",
"product_id": "qemu-block-dmg-2.11.2-5.23.2.i586"
}
},
{
"category": "product_version",
"name": "qemu-block-iscsi-2.11.2-5.23.2.i586",
"product": {
"name": "qemu-block-iscsi-2.11.2-5.23.2.i586",
"product_id": "qemu-block-iscsi-2.11.2-5.23.2.i586"
}
},
{
"category": "product_version",
"name": "qemu-block-ssh-2.11.2-5.23.2.i586",
"product": {
"name": "qemu-block-ssh-2.11.2-5.23.2.i586",
"product_id": "qemu-block-ssh-2.11.2-5.23.2.i586"
}
},
{
"category": "product_version",
"name": "qemu-extra-2.11.2-5.23.2.i586",
"product": {
"name": "qemu-extra-2.11.2-5.23.2.i586",
"product_id": "qemu-extra-2.11.2-5.23.2.i586"
}
},
{
"category": "product_version",
"name": "qemu-guest-agent-2.11.2-5.23.2.i586",
"product": {
"name": "qemu-guest-agent-2.11.2-5.23.2.i586",
"product_id": "qemu-guest-agent-2.11.2-5.23.2.i586"
}
},
{
"category": "product_version",
"name": "qemu-kvm-2.11.2-5.23.2.i586",
"product": {
"name": "qemu-kvm-2.11.2-5.23.2.i586",
"product_id": "qemu-kvm-2.11.2-5.23.2.i586"
}
},
{
"category": "product_version",
"name": "qemu-lang-2.11.2-5.23.2.i586",
"product": {
"name": "qemu-lang-2.11.2-5.23.2.i586",
"product_id": "qemu-lang-2.11.2-5.23.2.i586"
}
},
{
"category": "product_version",
"name": "qemu-linux-user-2.11.2-5.23.2.i586",
"product": {
"name": "qemu-linux-user-2.11.2-5.23.2.i586",
"product_id": "qemu-linux-user-2.11.2-5.23.2.i586"
}
},
{
"category": "product_version",
"name": "qemu-ppc-2.11.2-5.23.2.i586",
"product": {
"name": "qemu-ppc-2.11.2-5.23.2.i586",
"product_id": "qemu-ppc-2.11.2-5.23.2.i586"
}
},
{
"category": "product_version",
"name": "qemu-s390-2.11.2-5.23.2.i586",
"product": {
"name": "qemu-s390-2.11.2-5.23.2.i586",
"product_id": "qemu-s390-2.11.2-5.23.2.i586"
}
},
{
"category": "product_version",
"name": "qemu-tools-2.11.2-5.23.2.i586",
"product": {
"name": "qemu-tools-2.11.2-5.23.2.i586",
"product_id": "qemu-tools-2.11.2-5.23.2.i586"
}
},
{
"category": "product_version",
"name": "qemu-x86-2.11.2-5.23.2.i586",
"product": {
"name": "qemu-x86-2.11.2-5.23.2.i586",
"product_id": "qemu-x86-2.11.2-5.23.2.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-ipxe-1.0.0+-5.23.2.noarch",
"product": {
"name": "qemu-ipxe-1.0.0+-5.23.2.noarch",
"product_id": "qemu-ipxe-1.0.0+-5.23.2.noarch"
}
},
{
"category": "product_version",
"name": "qemu-seabios-1.11.0-5.23.2.noarch",
"product": {
"name": "qemu-seabios-1.11.0-5.23.2.noarch",
"product_id": "qemu-seabios-1.11.0-5.23.2.noarch"
}
},
{
"category": "product_version",
"name": "qemu-sgabios-8-5.23.2.noarch",
"product": {
"name": "qemu-sgabios-8-5.23.2.noarch",
"product_id": "qemu-sgabios-8-5.23.2.noarch"
}
},
{
"category": "product_version",
"name": "qemu-vgabios-1.11.0-5.23.2.noarch",
"product": {
"name": "qemu-vgabios-1.11.0-5.23.2.noarch",
"product_id": "qemu-vgabios-1.11.0-5.23.2.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-2.11.2-5.23.2.ppc64le",
"product": {
"name": "qemu-2.11.2-5.23.2.ppc64le",
"product_id": "qemu-2.11.2-5.23.2.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-arm-2.11.2-5.23.2.ppc64le",
"product": {
"name": "qemu-arm-2.11.2-5.23.2.ppc64le",
"product_id": "qemu-arm-2.11.2-5.23.2.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-block-curl-2.11.2-5.23.2.ppc64le",
"product": {
"name": "qemu-block-curl-2.11.2-5.23.2.ppc64le",
"product_id": "qemu-block-curl-2.11.2-5.23.2.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-block-dmg-2.11.2-5.23.2.ppc64le",
"product": {
"name": "qemu-block-dmg-2.11.2-5.23.2.ppc64le",
"product_id": "qemu-block-dmg-2.11.2-5.23.2.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-block-iscsi-2.11.2-5.23.2.ppc64le",
"product": {
"name": "qemu-block-iscsi-2.11.2-5.23.2.ppc64le",
"product_id": "qemu-block-iscsi-2.11.2-5.23.2.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-block-rbd-2.11.2-5.23.2.ppc64le",
"product": {
"name": "qemu-block-rbd-2.11.2-5.23.2.ppc64le",
"product_id": "qemu-block-rbd-2.11.2-5.23.2.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-block-ssh-2.11.2-5.23.2.ppc64le",
"product": {
"name": "qemu-block-ssh-2.11.2-5.23.2.ppc64le",
"product_id": "qemu-block-ssh-2.11.2-5.23.2.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-extra-2.11.2-5.23.2.ppc64le",
"product": {
"name": "qemu-extra-2.11.2-5.23.2.ppc64le",
"product_id": "qemu-extra-2.11.2-5.23.2.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-guest-agent-2.11.2-5.23.2.ppc64le",
"product": {
"name": "qemu-guest-agent-2.11.2-5.23.2.ppc64le",
"product_id": "qemu-guest-agent-2.11.2-5.23.2.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-lang-2.11.2-5.23.2.ppc64le",
"product": {
"name": "qemu-lang-2.11.2-5.23.2.ppc64le",
"product_id": "qemu-lang-2.11.2-5.23.2.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-linux-user-2.11.2-5.23.2.ppc64le",
"product": {
"name": "qemu-linux-user-2.11.2-5.23.2.ppc64le",
"product_id": "qemu-linux-user-2.11.2-5.23.2.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-ppc-2.11.2-5.23.2.ppc64le",
"product": {
"name": "qemu-ppc-2.11.2-5.23.2.ppc64le",
"product_id": "qemu-ppc-2.11.2-5.23.2.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-s390-2.11.2-5.23.2.ppc64le",
"product": {
"name": "qemu-s390-2.11.2-5.23.2.ppc64le",
"product_id": "qemu-s390-2.11.2-5.23.2.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-tools-2.11.2-5.23.2.ppc64le",
"product": {
"name": "qemu-tools-2.11.2-5.23.2.ppc64le",
"product_id": "qemu-tools-2.11.2-5.23.2.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-x86-2.11.2-5.23.2.ppc64le",
"product": {
"name": "qemu-x86-2.11.2-5.23.2.ppc64le",
"product_id": "qemu-x86-2.11.2-5.23.2.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-2.11.2-5.23.2.s390x",
"product": {
"name": "qemu-2.11.2-5.23.2.s390x",
"product_id": "qemu-2.11.2-5.23.2.s390x"
}
},
{
"category": "product_version",
"name": "qemu-arm-2.11.2-5.23.2.s390x",
"product": {
"name": "qemu-arm-2.11.2-5.23.2.s390x",
"product_id": "qemu-arm-2.11.2-5.23.2.s390x"
}
},
{
"category": "product_version",
"name": "qemu-block-curl-2.11.2-5.23.2.s390x",
"product": {
"name": "qemu-block-curl-2.11.2-5.23.2.s390x",
"product_id": "qemu-block-curl-2.11.2-5.23.2.s390x"
}
},
{
"category": "product_version",
"name": "qemu-block-dmg-2.11.2-5.23.2.s390x",
"product": {
"name": "qemu-block-dmg-2.11.2-5.23.2.s390x",
"product_id": "qemu-block-dmg-2.11.2-5.23.2.s390x"
}
},
{
"category": "product_version",
"name": "qemu-block-iscsi-2.11.2-5.23.2.s390x",
"product": {
"name": "qemu-block-iscsi-2.11.2-5.23.2.s390x",
"product_id": "qemu-block-iscsi-2.11.2-5.23.2.s390x"
}
},
{
"category": "product_version",
"name": "qemu-block-rbd-2.11.2-5.23.2.s390x",
"product": {
"name": "qemu-block-rbd-2.11.2-5.23.2.s390x",
"product_id": "qemu-block-rbd-2.11.2-5.23.2.s390x"
}
},
{
"category": "product_version",
"name": "qemu-block-ssh-2.11.2-5.23.2.s390x",
"product": {
"name": "qemu-block-ssh-2.11.2-5.23.2.s390x",
"product_id": "qemu-block-ssh-2.11.2-5.23.2.s390x"
}
},
{
"category": "product_version",
"name": "qemu-extra-2.11.2-5.23.2.s390x",
"product": {
"name": "qemu-extra-2.11.2-5.23.2.s390x",
"product_id": "qemu-extra-2.11.2-5.23.2.s390x"
}
},
{
"category": "product_version",
"name": "qemu-guest-agent-2.11.2-5.23.2.s390x",
"product": {
"name": "qemu-guest-agent-2.11.2-5.23.2.s390x",
"product_id": "qemu-guest-agent-2.11.2-5.23.2.s390x"
}
},
{
"category": "product_version",
"name": "qemu-kvm-2.11.2-5.23.2.s390x",
"product": {
"name": "qemu-kvm-2.11.2-5.23.2.s390x",
"product_id": "qemu-kvm-2.11.2-5.23.2.s390x"
}
},
{
"category": "product_version",
"name": "qemu-lang-2.11.2-5.23.2.s390x",
"product": {
"name": "qemu-lang-2.11.2-5.23.2.s390x",
"product_id": "qemu-lang-2.11.2-5.23.2.s390x"
}
},
{
"category": "product_version",
"name": "qemu-linux-user-2.11.2-5.23.2.s390x",
"product": {
"name": "qemu-linux-user-2.11.2-5.23.2.s390x",
"product_id": "qemu-linux-user-2.11.2-5.23.2.s390x"
}
},
{
"category": "product_version",
"name": "qemu-ppc-2.11.2-5.23.2.s390x",
"product": {
"name": "qemu-ppc-2.11.2-5.23.2.s390x",
"product_id": "qemu-ppc-2.11.2-5.23.2.s390x"
}
},
{
"category": "product_version",
"name": "qemu-s390-2.11.2-5.23.2.s390x",
"product": {
"name": "qemu-s390-2.11.2-5.23.2.s390x",
"product_id": "qemu-s390-2.11.2-5.23.2.s390x"
}
},
{
"category": "product_version",
"name": "qemu-tools-2.11.2-5.23.2.s390x",
"product": {
"name": "qemu-tools-2.11.2-5.23.2.s390x",
"product_id": "qemu-tools-2.11.2-5.23.2.s390x"
}
},
{
"category": "product_version",
"name": "qemu-x86-2.11.2-5.23.2.s390x",
"product": {
"name": "qemu-x86-2.11.2-5.23.2.s390x",
"product_id": "qemu-x86-2.11.2-5.23.2.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-2.11.2-5.23.2.x86_64",
"product": {
"name": "qemu-2.11.2-5.23.2.x86_64",
"product_id": "qemu-2.11.2-5.23.2.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-arm-2.11.2-5.23.2.x86_64",
"product": {
"name": "qemu-arm-2.11.2-5.23.2.x86_64",
"product_id": "qemu-arm-2.11.2-5.23.2.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-block-curl-2.11.2-5.23.2.x86_64",
"product": {
"name": "qemu-block-curl-2.11.2-5.23.2.x86_64",
"product_id": "qemu-block-curl-2.11.2-5.23.2.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-block-dmg-2.11.2-5.23.2.x86_64",
"product": {
"name": "qemu-block-dmg-2.11.2-5.23.2.x86_64",
"product_id": "qemu-block-dmg-2.11.2-5.23.2.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-block-iscsi-2.11.2-5.23.2.x86_64",
"product": {
"name": "qemu-block-iscsi-2.11.2-5.23.2.x86_64",
"product_id": "qemu-block-iscsi-2.11.2-5.23.2.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-block-rbd-2.11.2-5.23.2.x86_64",
"product": {
"name": "qemu-block-rbd-2.11.2-5.23.2.x86_64",
"product_id": "qemu-block-rbd-2.11.2-5.23.2.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-block-ssh-2.11.2-5.23.2.x86_64",
"product": {
"name": "qemu-block-ssh-2.11.2-5.23.2.x86_64",
"product_id": "qemu-block-ssh-2.11.2-5.23.2.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-extra-2.11.2-5.23.2.x86_64",
"product": {
"name": "qemu-extra-2.11.2-5.23.2.x86_64",
"product_id": "qemu-extra-2.11.2-5.23.2.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-guest-agent-2.11.2-5.23.2.x86_64",
"product": {
"name": "qemu-guest-agent-2.11.2-5.23.2.x86_64",
"product_id": "qemu-guest-agent-2.11.2-5.23.2.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-kvm-2.11.2-5.23.2.x86_64",
"product": {
"name": "qemu-kvm-2.11.2-5.23.2.x86_64",
"product_id": "qemu-kvm-2.11.2-5.23.2.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-lang-2.11.2-5.23.2.x86_64",
"product": {
"name": "qemu-lang-2.11.2-5.23.2.x86_64",
"product_id": "qemu-lang-2.11.2-5.23.2.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-linux-user-2.11.2-5.23.2.x86_64",
"product": {
"name": "qemu-linux-user-2.11.2-5.23.2.x86_64",
"product_id": "qemu-linux-user-2.11.2-5.23.2.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-ppc-2.11.2-5.23.2.x86_64",
"product": {
"name": "qemu-ppc-2.11.2-5.23.2.x86_64",
"product_id": "qemu-ppc-2.11.2-5.23.2.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-s390-2.11.2-5.23.2.x86_64",
"product": {
"name": "qemu-s390-2.11.2-5.23.2.x86_64",
"product_id": "qemu-s390-2.11.2-5.23.2.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-tools-2.11.2-5.23.2.x86_64",
"product": {
"name": "qemu-tools-2.11.2-5.23.2.x86_64",
"product_id": "qemu-tools-2.11.2-5.23.2.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-x86-2.11.2-5.23.2.x86_64",
"product": {
"name": "qemu-x86-2.11.2-5.23.2.x86_64",
"product_id": "qemu-x86-2.11.2-5.23.2.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Desktop 12 SP4",
"product": {
"name": "SUSE Linux Enterprise Desktop 12 SP4",
"product_id": "SUSE Linux Enterprise Desktop 12 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sled:12:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP4",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:12:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp4"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-2.11.2-5.23.2.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP4",
"product_id": "SUSE Linux Enterprise Desktop 12 SP4:qemu-2.11.2-5.23.2.x86_64"
},
"product_reference": "qemu-2.11.2-5.23.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-2.11.2-5.23.2.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP4",
"product_id": "SUSE Linux Enterprise Desktop 12 SP4:qemu-block-curl-2.11.2-5.23.2.x86_64"
},
"product_reference": "qemu-block-curl-2.11.2-5.23.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ipxe-1.0.0+-5.23.2.noarch as component of SUSE Linux Enterprise Desktop 12 SP4",
"product_id": "SUSE Linux Enterprise Desktop 12 SP4:qemu-ipxe-1.0.0+-5.23.2.noarch"
},
"product_reference": "qemu-ipxe-1.0.0+-5.23.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-2.11.2-5.23.2.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP4",
"product_id": "SUSE Linux Enterprise Desktop 12 SP4:qemu-kvm-2.11.2-5.23.2.x86_64"
},
"product_reference": "qemu-kvm-2.11.2-5.23.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-seabios-1.11.0-5.23.2.noarch as component of SUSE Linux Enterprise Desktop 12 SP4",
"product_id": "SUSE Linux Enterprise Desktop 12 SP4:qemu-seabios-1.11.0-5.23.2.noarch"
},
"product_reference": "qemu-seabios-1.11.0-5.23.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-sgabios-8-5.23.2.noarch as component of SUSE Linux Enterprise Desktop 12 SP4",
"product_id": "SUSE Linux Enterprise Desktop 12 SP4:qemu-sgabios-8-5.23.2.noarch"
},
"product_reference": "qemu-sgabios-8-5.23.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-2.11.2-5.23.2.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP4",
"product_id": "SUSE Linux Enterprise Desktop 12 SP4:qemu-tools-2.11.2-5.23.2.x86_64"
},
"product_reference": "qemu-tools-2.11.2-5.23.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-vgabios-1.11.0-5.23.2.noarch as component of SUSE Linux Enterprise Desktop 12 SP4",
"product_id": "SUSE Linux Enterprise Desktop 12 SP4:qemu-vgabios-1.11.0-5.23.2.noarch"
},
"product_reference": "qemu-vgabios-1.11.0-5.23.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-x86-2.11.2-5.23.2.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP4",
"product_id": "SUSE Linux Enterprise Desktop 12 SP4:qemu-x86-2.11.2-5.23.2.x86_64"
},
"product_reference": "qemu-x86-2.11.2-5.23.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-2.11.2-5.23.2.aarch64 as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:qemu-2.11.2-5.23.2.aarch64"
},
"product_reference": "qemu-2.11.2-5.23.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-2.11.2-5.23.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:qemu-2.11.2-5.23.2.ppc64le"
},
"product_reference": "qemu-2.11.2-5.23.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-2.11.2-5.23.2.s390x as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:qemu-2.11.2-5.23.2.s390x"
},
"product_reference": "qemu-2.11.2-5.23.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-2.11.2-5.23.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:qemu-2.11.2-5.23.2.x86_64"
},
"product_reference": "qemu-2.11.2-5.23.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-arm-2.11.2-5.23.2.aarch64 as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:qemu-arm-2.11.2-5.23.2.aarch64"
},
"product_reference": "qemu-arm-2.11.2-5.23.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-2.11.2-5.23.2.aarch64 as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:qemu-block-curl-2.11.2-5.23.2.aarch64"
},
"product_reference": "qemu-block-curl-2.11.2-5.23.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-2.11.2-5.23.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:qemu-block-curl-2.11.2-5.23.2.ppc64le"
},
"product_reference": "qemu-block-curl-2.11.2-5.23.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-2.11.2-5.23.2.s390x as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:qemu-block-curl-2.11.2-5.23.2.s390x"
},
"product_reference": "qemu-block-curl-2.11.2-5.23.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-2.11.2-5.23.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:qemu-block-curl-2.11.2-5.23.2.x86_64"
},
"product_reference": "qemu-block-curl-2.11.2-5.23.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-iscsi-2.11.2-5.23.2.aarch64 as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:qemu-block-iscsi-2.11.2-5.23.2.aarch64"
},
"product_reference": "qemu-block-iscsi-2.11.2-5.23.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-iscsi-2.11.2-5.23.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:qemu-block-iscsi-2.11.2-5.23.2.ppc64le"
},
"product_reference": "qemu-block-iscsi-2.11.2-5.23.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-iscsi-2.11.2-5.23.2.s390x as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:qemu-block-iscsi-2.11.2-5.23.2.s390x"
},
"product_reference": "qemu-block-iscsi-2.11.2-5.23.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-iscsi-2.11.2-5.23.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:qemu-block-iscsi-2.11.2-5.23.2.x86_64"
},
"product_reference": "qemu-block-iscsi-2.11.2-5.23.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-rbd-2.11.2-5.23.2.aarch64 as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:qemu-block-rbd-2.11.2-5.23.2.aarch64"
},
"product_reference": "qemu-block-rbd-2.11.2-5.23.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-rbd-2.11.2-5.23.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:qemu-block-rbd-2.11.2-5.23.2.x86_64"
},
"product_reference": "qemu-block-rbd-2.11.2-5.23.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-ssh-2.11.2-5.23.2.aarch64 as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:qemu-block-ssh-2.11.2-5.23.2.aarch64"
},
"product_reference": "qemu-block-ssh-2.11.2-5.23.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-ssh-2.11.2-5.23.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:qemu-block-ssh-2.11.2-5.23.2.ppc64le"
},
"product_reference": "qemu-block-ssh-2.11.2-5.23.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-ssh-2.11.2-5.23.2.s390x as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:qemu-block-ssh-2.11.2-5.23.2.s390x"
},
"product_reference": "qemu-block-ssh-2.11.2-5.23.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-ssh-2.11.2-5.23.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:qemu-block-ssh-2.11.2-5.23.2.x86_64"
},
"product_reference": "qemu-block-ssh-2.11.2-5.23.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2.11.2-5.23.2.aarch64 as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:qemu-guest-agent-2.11.2-5.23.2.aarch64"
},
"product_reference": "qemu-guest-agent-2.11.2-5.23.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2.11.2-5.23.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:qemu-guest-agent-2.11.2-5.23.2.ppc64le"
},
"product_reference": "qemu-guest-agent-2.11.2-5.23.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2.11.2-5.23.2.s390x as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:qemu-guest-agent-2.11.2-5.23.2.s390x"
},
"product_reference": "qemu-guest-agent-2.11.2-5.23.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2.11.2-5.23.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:qemu-guest-agent-2.11.2-5.23.2.x86_64"
},
"product_reference": "qemu-guest-agent-2.11.2-5.23.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ipxe-1.0.0+-5.23.2.noarch as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:qemu-ipxe-1.0.0+-5.23.2.noarch"
},
"product_reference": "qemu-ipxe-1.0.0+-5.23.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-2.11.2-5.23.2.s390x as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:qemu-kvm-2.11.2-5.23.2.s390x"
},
"product_reference": "qemu-kvm-2.11.2-5.23.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-2.11.2-5.23.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:qemu-kvm-2.11.2-5.23.2.x86_64"
},
"product_reference": "qemu-kvm-2.11.2-5.23.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-2.11.2-5.23.2.aarch64 as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:qemu-lang-2.11.2-5.23.2.aarch64"
},
"product_reference": "qemu-lang-2.11.2-5.23.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-2.11.2-5.23.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:qemu-lang-2.11.2-5.23.2.ppc64le"
},
"product_reference": "qemu-lang-2.11.2-5.23.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-2.11.2-5.23.2.s390x as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:qemu-lang-2.11.2-5.23.2.s390x"
},
"product_reference": "qemu-lang-2.11.2-5.23.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-2.11.2-5.23.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:qemu-lang-2.11.2-5.23.2.x86_64"
},
"product_reference": "qemu-lang-2.11.2-5.23.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ppc-2.11.2-5.23.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:qemu-ppc-2.11.2-5.23.2.ppc64le"
},
"product_reference": "qemu-ppc-2.11.2-5.23.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-s390-2.11.2-5.23.2.s390x as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:qemu-s390-2.11.2-5.23.2.s390x"
},
"product_reference": "qemu-s390-2.11.2-5.23.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-seabios-1.11.0-5.23.2.noarch as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:qemu-seabios-1.11.0-5.23.2.noarch"
},
"product_reference": "qemu-seabios-1.11.0-5.23.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-sgabios-8-5.23.2.noarch as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:qemu-sgabios-8-5.23.2.noarch"
},
"product_reference": "qemu-sgabios-8-5.23.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-2.11.2-5.23.2.aarch64 as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:qemu-tools-2.11.2-5.23.2.aarch64"
},
"product_reference": "qemu-tools-2.11.2-5.23.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-2.11.2-5.23.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:qemu-tools-2.11.2-5.23.2.ppc64le"
},
"product_reference": "qemu-tools-2.11.2-5.23.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-2.11.2-5.23.2.s390x as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:qemu-tools-2.11.2-5.23.2.s390x"
},
"product_reference": "qemu-tools-2.11.2-5.23.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-2.11.2-5.23.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:qemu-tools-2.11.2-5.23.2.x86_64"
},
"product_reference": "qemu-tools-2.11.2-5.23.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-vgabios-1.11.0-5.23.2.noarch as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:qemu-vgabios-1.11.0-5.23.2.noarch"
},
"product_reference": "qemu-vgabios-1.11.0-5.23.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-x86-2.11.2-5.23.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:qemu-x86-2.11.2-5.23.2.x86_64"
},
"product_reference": "qemu-x86-2.11.2-5.23.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-2.11.2-5.23.2.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-2.11.2-5.23.2.aarch64"
},
"product_reference": "qemu-2.11.2-5.23.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-2.11.2-5.23.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-2.11.2-5.23.2.ppc64le"
},
"product_reference": "qemu-2.11.2-5.23.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-2.11.2-5.23.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-2.11.2-5.23.2.s390x"
},
"product_reference": "qemu-2.11.2-5.23.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-2.11.2-5.23.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-2.11.2-5.23.2.x86_64"
},
"product_reference": "qemu-2.11.2-5.23.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-arm-2.11.2-5.23.2.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-arm-2.11.2-5.23.2.aarch64"
},
"product_reference": "qemu-arm-2.11.2-5.23.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-2.11.2-5.23.2.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-curl-2.11.2-5.23.2.aarch64"
},
"product_reference": "qemu-block-curl-2.11.2-5.23.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-2.11.2-5.23.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-curl-2.11.2-5.23.2.ppc64le"
},
"product_reference": "qemu-block-curl-2.11.2-5.23.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-2.11.2-5.23.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-curl-2.11.2-5.23.2.s390x"
},
"product_reference": "qemu-block-curl-2.11.2-5.23.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-2.11.2-5.23.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-curl-2.11.2-5.23.2.x86_64"
},
"product_reference": "qemu-block-curl-2.11.2-5.23.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-iscsi-2.11.2-5.23.2.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-iscsi-2.11.2-5.23.2.aarch64"
},
"product_reference": "qemu-block-iscsi-2.11.2-5.23.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-iscsi-2.11.2-5.23.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-iscsi-2.11.2-5.23.2.ppc64le"
},
"product_reference": "qemu-block-iscsi-2.11.2-5.23.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-iscsi-2.11.2-5.23.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-iscsi-2.11.2-5.23.2.s390x"
},
"product_reference": "qemu-block-iscsi-2.11.2-5.23.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-iscsi-2.11.2-5.23.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-iscsi-2.11.2-5.23.2.x86_64"
},
"product_reference": "qemu-block-iscsi-2.11.2-5.23.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-rbd-2.11.2-5.23.2.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-rbd-2.11.2-5.23.2.aarch64"
},
"product_reference": "qemu-block-rbd-2.11.2-5.23.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-rbd-2.11.2-5.23.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-rbd-2.11.2-5.23.2.x86_64"
},
"product_reference": "qemu-block-rbd-2.11.2-5.23.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-ssh-2.11.2-5.23.2.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-ssh-2.11.2-5.23.2.aarch64"
},
"product_reference": "qemu-block-ssh-2.11.2-5.23.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-ssh-2.11.2-5.23.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-ssh-2.11.2-5.23.2.ppc64le"
},
"product_reference": "qemu-block-ssh-2.11.2-5.23.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-ssh-2.11.2-5.23.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-ssh-2.11.2-5.23.2.s390x"
},
"product_reference": "qemu-block-ssh-2.11.2-5.23.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-ssh-2.11.2-5.23.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-ssh-2.11.2-5.23.2.x86_64"
},
"product_reference": "qemu-block-ssh-2.11.2-5.23.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2.11.2-5.23.2.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-guest-agent-2.11.2-5.23.2.aarch64"
},
"product_reference": "qemu-guest-agent-2.11.2-5.23.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2.11.2-5.23.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-guest-agent-2.11.2-5.23.2.ppc64le"
},
"product_reference": "qemu-guest-agent-2.11.2-5.23.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2.11.2-5.23.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-guest-agent-2.11.2-5.23.2.s390x"
},
"product_reference": "qemu-guest-agent-2.11.2-5.23.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2.11.2-5.23.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-guest-agent-2.11.2-5.23.2.x86_64"
},
"product_reference": "qemu-guest-agent-2.11.2-5.23.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ipxe-1.0.0+-5.23.2.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-ipxe-1.0.0+-5.23.2.noarch"
},
"product_reference": "qemu-ipxe-1.0.0+-5.23.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-2.11.2-5.23.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-kvm-2.11.2-5.23.2.s390x"
},
"product_reference": "qemu-kvm-2.11.2-5.23.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-2.11.2-5.23.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-kvm-2.11.2-5.23.2.x86_64"
},
"product_reference": "qemu-kvm-2.11.2-5.23.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-2.11.2-5.23.2.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-lang-2.11.2-5.23.2.aarch64"
},
"product_reference": "qemu-lang-2.11.2-5.23.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-2.11.2-5.23.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-lang-2.11.2-5.23.2.ppc64le"
},
"product_reference": "qemu-lang-2.11.2-5.23.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-2.11.2-5.23.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-lang-2.11.2-5.23.2.s390x"
},
"product_reference": "qemu-lang-2.11.2-5.23.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-2.11.2-5.23.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-lang-2.11.2-5.23.2.x86_64"
},
"product_reference": "qemu-lang-2.11.2-5.23.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ppc-2.11.2-5.23.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-ppc-2.11.2-5.23.2.ppc64le"
},
"product_reference": "qemu-ppc-2.11.2-5.23.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-s390-2.11.2-5.23.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-s390-2.11.2-5.23.2.s390x"
},
"product_reference": "qemu-s390-2.11.2-5.23.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-seabios-1.11.0-5.23.2.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-seabios-1.11.0-5.23.2.noarch"
},
"product_reference": "qemu-seabios-1.11.0-5.23.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-sgabios-8-5.23.2.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-sgabios-8-5.23.2.noarch"
},
"product_reference": "qemu-sgabios-8-5.23.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-2.11.2-5.23.2.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-tools-2.11.2-5.23.2.aarch64"
},
"product_reference": "qemu-tools-2.11.2-5.23.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-2.11.2-5.23.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-tools-2.11.2-5.23.2.ppc64le"
},
"product_reference": "qemu-tools-2.11.2-5.23.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-2.11.2-5.23.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-tools-2.11.2-5.23.2.s390x"
},
"product_reference": "qemu-tools-2.11.2-5.23.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-2.11.2-5.23.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-tools-2.11.2-5.23.2.x86_64"
},
"product_reference": "qemu-tools-2.11.2-5.23.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-vgabios-1.11.0-5.23.2.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-vgabios-1.11.0-5.23.2.noarch"
},
"product_reference": "qemu-vgabios-1.11.0-5.23.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-x86-2.11.2-5.23.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-x86-2.11.2-5.23.2.x86_64"
},
"product_reference": "qemu-x86-2.11.2-5.23.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-12207",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-12207"
}
],
"notes": [
{
"category": "general",
"text": "Improper invalidation for page table updates by a virtual guest operating system for multiple Intel(R) Processors may allow an authenticated user to potentially enable denial of service of the host system via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP4:qemu-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:qemu-block-curl-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:qemu-ipxe-1.0.0+-5.23.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:qemu-kvm-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:qemu-seabios-1.11.0-5.23.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:qemu-sgabios-8-5.23.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:qemu-tools-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:qemu-vgabios-1.11.0-5.23.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:qemu-x86-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:qemu-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:qemu-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:qemu-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:qemu-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:qemu-arm-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-curl-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-curl-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-curl-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-curl-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-iscsi-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-iscsi-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-iscsi-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-iscsi-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-rbd-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-rbd-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-ssh-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-ssh-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-ssh-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-ssh-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:qemu-guest-agent-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:qemu-guest-agent-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:qemu-guest-agent-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:qemu-guest-agent-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:qemu-ipxe-1.0.0+-5.23.2.noarch",
"SUSE Linux Enterprise Server 12 SP4:qemu-kvm-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:qemu-kvm-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:qemu-lang-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:qemu-lang-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:qemu-lang-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:qemu-lang-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:qemu-ppc-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:qemu-s390-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:qemu-seabios-1.11.0-5.23.2.noarch",
"SUSE Linux Enterprise Server 12 SP4:qemu-sgabios-8-5.23.2.noarch",
"SUSE Linux Enterprise Server 12 SP4:qemu-tools-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:qemu-tools-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:qemu-tools-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:qemu-tools-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:qemu-vgabios-1.11.0-5.23.2.noarch",
"SUSE Linux Enterprise Server 12 SP4:qemu-x86-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-arm-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-curl-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-curl-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-curl-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-curl-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-iscsi-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-iscsi-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-iscsi-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-iscsi-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-rbd-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-rbd-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-ssh-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-ssh-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-ssh-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-ssh-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-guest-agent-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-guest-agent-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-guest-agent-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-guest-agent-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-ipxe-1.0.0+-5.23.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-kvm-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-kvm-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-lang-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-lang-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-lang-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-lang-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-ppc-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-s390-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-seabios-1.11.0-5.23.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-sgabios-8-5.23.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-tools-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-tools-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-tools-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-tools-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-vgabios-1.11.0-5.23.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-x86-2.11.2-5.23.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-12207",
"url": "https://www.suse.com/security/cve/CVE-2018-12207"
},
{
"category": "external",
"summary": "SUSE Bug 1117665 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1117665"
},
{
"category": "external",
"summary": "SUSE Bug 1139073 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1139073"
},
{
"category": "external",
"summary": "SUSE Bug 1152505 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1152505"
},
{
"category": "external",
"summary": "SUSE Bug 1155812 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1155812"
},
{
"category": "external",
"summary": "SUSE Bug 1155817 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1155817"
},
{
"category": "external",
"summary": "SUSE Bug 1155945 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1155945"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1201877"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP4:qemu-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:qemu-block-curl-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:qemu-ipxe-1.0.0+-5.23.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:qemu-kvm-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:qemu-seabios-1.11.0-5.23.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:qemu-sgabios-8-5.23.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:qemu-tools-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:qemu-vgabios-1.11.0-5.23.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:qemu-x86-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:qemu-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:qemu-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:qemu-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:qemu-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:qemu-arm-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-curl-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-curl-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-curl-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-curl-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-iscsi-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-iscsi-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-iscsi-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-iscsi-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-rbd-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-rbd-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-ssh-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-ssh-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-ssh-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-ssh-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:qemu-guest-agent-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:qemu-guest-agent-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:qemu-guest-agent-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:qemu-guest-agent-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:qemu-ipxe-1.0.0+-5.23.2.noarch",
"SUSE Linux Enterprise Server 12 SP4:qemu-kvm-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:qemu-kvm-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:qemu-lang-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:qemu-lang-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:qemu-lang-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:qemu-lang-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:qemu-ppc-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:qemu-s390-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:qemu-seabios-1.11.0-5.23.2.noarch",
"SUSE Linux Enterprise Server 12 SP4:qemu-sgabios-8-5.23.2.noarch",
"SUSE Linux Enterprise Server 12 SP4:qemu-tools-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:qemu-tools-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:qemu-tools-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:qemu-tools-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:qemu-vgabios-1.11.0-5.23.2.noarch",
"SUSE Linux Enterprise Server 12 SP4:qemu-x86-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-arm-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-curl-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-curl-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-curl-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-curl-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-iscsi-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-iscsi-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-iscsi-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-iscsi-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-rbd-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-rbd-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-ssh-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-ssh-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-ssh-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-ssh-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-guest-agent-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-guest-agent-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-guest-agent-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-guest-agent-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-ipxe-1.0.0+-5.23.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-kvm-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-kvm-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-lang-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-lang-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-lang-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-lang-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-ppc-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-s390-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-seabios-1.11.0-5.23.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-sgabios-8-5.23.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-tools-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-tools-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-tools-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-tools-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-vgabios-1.11.0-5.23.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-x86-2.11.2-5.23.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP4:qemu-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:qemu-block-curl-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:qemu-ipxe-1.0.0+-5.23.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:qemu-kvm-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:qemu-seabios-1.11.0-5.23.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:qemu-sgabios-8-5.23.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:qemu-tools-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:qemu-vgabios-1.11.0-5.23.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:qemu-x86-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:qemu-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:qemu-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:qemu-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:qemu-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:qemu-arm-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-curl-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-curl-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-curl-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-curl-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-iscsi-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-iscsi-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-iscsi-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-iscsi-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-rbd-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-rbd-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-ssh-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-ssh-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-ssh-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-ssh-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:qemu-guest-agent-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:qemu-guest-agent-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:qemu-guest-agent-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:qemu-guest-agent-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:qemu-ipxe-1.0.0+-5.23.2.noarch",
"SUSE Linux Enterprise Server 12 SP4:qemu-kvm-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:qemu-kvm-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:qemu-lang-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:qemu-lang-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:qemu-lang-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:qemu-lang-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:qemu-ppc-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:qemu-s390-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:qemu-seabios-1.11.0-5.23.2.noarch",
"SUSE Linux Enterprise Server 12 SP4:qemu-sgabios-8-5.23.2.noarch",
"SUSE Linux Enterprise Server 12 SP4:qemu-tools-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:qemu-tools-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:qemu-tools-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:qemu-tools-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:qemu-vgabios-1.11.0-5.23.2.noarch",
"SUSE Linux Enterprise Server 12 SP4:qemu-x86-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-arm-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-curl-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-curl-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-curl-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-curl-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-iscsi-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-iscsi-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-iscsi-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-iscsi-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-rbd-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-rbd-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-ssh-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-ssh-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-ssh-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-ssh-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-guest-agent-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-guest-agent-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-guest-agent-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-guest-agent-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-ipxe-1.0.0+-5.23.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-kvm-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-kvm-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-lang-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-lang-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-lang-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-lang-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-ppc-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-s390-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-seabios-1.11.0-5.23.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-sgabios-8-5.23.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-tools-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-tools-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-tools-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-tools-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-vgabios-1.11.0-5.23.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-x86-2.11.2-5.23.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:15:08Z",
"details": "moderate"
}
],
"title": "CVE-2018-12207"
},
{
"cve": "CVE-2018-20126",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-20126"
}
],
"notes": [
{
"category": "general",
"text": "hw/rdma/vmw/pvrdma_cmd.c in QEMU allows create_cq and create_qp memory leaks because errors are mishandled.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP4:qemu-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:qemu-block-curl-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:qemu-ipxe-1.0.0+-5.23.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:qemu-kvm-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:qemu-seabios-1.11.0-5.23.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:qemu-sgabios-8-5.23.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:qemu-tools-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:qemu-vgabios-1.11.0-5.23.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:qemu-x86-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:qemu-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:qemu-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:qemu-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:qemu-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:qemu-arm-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-curl-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-curl-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-curl-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-curl-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-iscsi-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-iscsi-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-iscsi-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-iscsi-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-rbd-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-rbd-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-ssh-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-ssh-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-ssh-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-ssh-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:qemu-guest-agent-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:qemu-guest-agent-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:qemu-guest-agent-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:qemu-guest-agent-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:qemu-ipxe-1.0.0+-5.23.2.noarch",
"SUSE Linux Enterprise Server 12 SP4:qemu-kvm-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:qemu-kvm-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:qemu-lang-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:qemu-lang-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:qemu-lang-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:qemu-lang-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:qemu-ppc-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:qemu-s390-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:qemu-seabios-1.11.0-5.23.2.noarch",
"SUSE Linux Enterprise Server 12 SP4:qemu-sgabios-8-5.23.2.noarch",
"SUSE Linux Enterprise Server 12 SP4:qemu-tools-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:qemu-tools-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:qemu-tools-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:qemu-tools-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:qemu-vgabios-1.11.0-5.23.2.noarch",
"SUSE Linux Enterprise Server 12 SP4:qemu-x86-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-arm-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-curl-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-curl-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-curl-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-curl-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-iscsi-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-iscsi-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-iscsi-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-iscsi-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-rbd-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-rbd-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-ssh-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-ssh-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-ssh-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-ssh-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-guest-agent-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-guest-agent-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-guest-agent-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-guest-agent-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-ipxe-1.0.0+-5.23.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-kvm-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-kvm-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-lang-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-lang-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-lang-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-lang-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-ppc-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-s390-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-seabios-1.11.0-5.23.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-sgabios-8-5.23.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-tools-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-tools-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-tools-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-tools-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-vgabios-1.11.0-5.23.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-x86-2.11.2-5.23.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-20126",
"url": "https://www.suse.com/security/cve/CVE-2018-20126"
},
{
"category": "external",
"summary": "SUSE Bug 1119991 for CVE-2018-20126",
"url": "https://bugzilla.suse.com/1119991"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP4:qemu-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:qemu-block-curl-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:qemu-ipxe-1.0.0+-5.23.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:qemu-kvm-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:qemu-seabios-1.11.0-5.23.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:qemu-sgabios-8-5.23.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:qemu-tools-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:qemu-vgabios-1.11.0-5.23.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:qemu-x86-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:qemu-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:qemu-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:qemu-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:qemu-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:qemu-arm-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-curl-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-curl-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-curl-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-curl-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-iscsi-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-iscsi-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-iscsi-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-iscsi-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-rbd-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-rbd-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-ssh-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-ssh-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-ssh-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-ssh-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:qemu-guest-agent-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:qemu-guest-agent-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:qemu-guest-agent-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:qemu-guest-agent-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:qemu-ipxe-1.0.0+-5.23.2.noarch",
"SUSE Linux Enterprise Server 12 SP4:qemu-kvm-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:qemu-kvm-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:qemu-lang-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:qemu-lang-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:qemu-lang-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:qemu-lang-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:qemu-ppc-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:qemu-s390-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:qemu-seabios-1.11.0-5.23.2.noarch",
"SUSE Linux Enterprise Server 12 SP4:qemu-sgabios-8-5.23.2.noarch",
"SUSE Linux Enterprise Server 12 SP4:qemu-tools-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:qemu-tools-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:qemu-tools-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:qemu-tools-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:qemu-vgabios-1.11.0-5.23.2.noarch",
"SUSE Linux Enterprise Server 12 SP4:qemu-x86-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-arm-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-curl-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-curl-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-curl-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-curl-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-iscsi-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-iscsi-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-iscsi-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-iscsi-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-rbd-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-rbd-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-ssh-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-ssh-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-ssh-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-ssh-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-guest-agent-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-guest-agent-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-guest-agent-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-guest-agent-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-ipxe-1.0.0+-5.23.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-kvm-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-kvm-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-lang-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-lang-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-lang-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-lang-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-ppc-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-s390-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-seabios-1.11.0-5.23.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-sgabios-8-5.23.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-tools-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-tools-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-tools-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-tools-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-vgabios-1.11.0-5.23.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-x86-2.11.2-5.23.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.8,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP4:qemu-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:qemu-block-curl-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:qemu-ipxe-1.0.0+-5.23.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:qemu-kvm-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:qemu-seabios-1.11.0-5.23.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:qemu-sgabios-8-5.23.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:qemu-tools-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:qemu-vgabios-1.11.0-5.23.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:qemu-x86-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:qemu-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:qemu-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:qemu-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:qemu-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:qemu-arm-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-curl-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-curl-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-curl-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-curl-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-iscsi-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-iscsi-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-iscsi-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-iscsi-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-rbd-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-rbd-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-ssh-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-ssh-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-ssh-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-ssh-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:qemu-guest-agent-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:qemu-guest-agent-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:qemu-guest-agent-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:qemu-guest-agent-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:qemu-ipxe-1.0.0+-5.23.2.noarch",
"SUSE Linux Enterprise Server 12 SP4:qemu-kvm-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:qemu-kvm-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:qemu-lang-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:qemu-lang-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:qemu-lang-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:qemu-lang-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:qemu-ppc-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:qemu-s390-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:qemu-seabios-1.11.0-5.23.2.noarch",
"SUSE Linux Enterprise Server 12 SP4:qemu-sgabios-8-5.23.2.noarch",
"SUSE Linux Enterprise Server 12 SP4:qemu-tools-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:qemu-tools-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:qemu-tools-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:qemu-tools-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:qemu-vgabios-1.11.0-5.23.2.noarch",
"SUSE Linux Enterprise Server 12 SP4:qemu-x86-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-arm-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-curl-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-curl-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-curl-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-curl-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-iscsi-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-iscsi-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-iscsi-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-iscsi-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-rbd-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-rbd-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-ssh-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-ssh-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-ssh-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-ssh-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-guest-agent-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-guest-agent-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-guest-agent-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-guest-agent-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-ipxe-1.0.0+-5.23.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-kvm-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-kvm-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-lang-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-lang-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-lang-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-lang-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-ppc-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-s390-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-seabios-1.11.0-5.23.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-sgabios-8-5.23.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-tools-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-tools-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-tools-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-tools-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-vgabios-1.11.0-5.23.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-x86-2.11.2-5.23.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:15:08Z",
"details": "low"
}
],
"title": "CVE-2018-20126"
},
{
"cve": "CVE-2019-11135",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11135"
}
],
"notes": [
{
"category": "general",
"text": "TSX Asynchronous Abort condition on some CPUs utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP4:qemu-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:qemu-block-curl-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:qemu-ipxe-1.0.0+-5.23.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:qemu-kvm-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:qemu-seabios-1.11.0-5.23.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:qemu-sgabios-8-5.23.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:qemu-tools-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:qemu-vgabios-1.11.0-5.23.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:qemu-x86-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:qemu-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:qemu-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:qemu-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:qemu-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:qemu-arm-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-curl-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-curl-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-curl-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-curl-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-iscsi-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-iscsi-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-iscsi-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-iscsi-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-rbd-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-rbd-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-ssh-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-ssh-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-ssh-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-ssh-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:qemu-guest-agent-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:qemu-guest-agent-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:qemu-guest-agent-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:qemu-guest-agent-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:qemu-ipxe-1.0.0+-5.23.2.noarch",
"SUSE Linux Enterprise Server 12 SP4:qemu-kvm-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:qemu-kvm-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:qemu-lang-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:qemu-lang-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:qemu-lang-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:qemu-lang-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:qemu-ppc-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:qemu-s390-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:qemu-seabios-1.11.0-5.23.2.noarch",
"SUSE Linux Enterprise Server 12 SP4:qemu-sgabios-8-5.23.2.noarch",
"SUSE Linux Enterprise Server 12 SP4:qemu-tools-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:qemu-tools-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:qemu-tools-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:qemu-tools-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:qemu-vgabios-1.11.0-5.23.2.noarch",
"SUSE Linux Enterprise Server 12 SP4:qemu-x86-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-arm-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-curl-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-curl-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-curl-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-curl-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-iscsi-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-iscsi-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-iscsi-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-iscsi-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-rbd-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-rbd-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-ssh-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-ssh-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-ssh-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-ssh-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-guest-agent-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-guest-agent-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-guest-agent-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-guest-agent-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-ipxe-1.0.0+-5.23.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-kvm-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-kvm-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-lang-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-lang-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-lang-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-lang-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-ppc-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-s390-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-seabios-1.11.0-5.23.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-sgabios-8-5.23.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-tools-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-tools-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-tools-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-tools-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-vgabios-1.11.0-5.23.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-x86-2.11.2-5.23.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11135",
"url": "https://www.suse.com/security/cve/CVE-2019-11135"
},
{
"category": "external",
"summary": "SUSE Bug 1139073 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1139073"
},
{
"category": "external",
"summary": "SUSE Bug 1152497 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1152497"
},
{
"category": "external",
"summary": "SUSE Bug 1152505 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1152505"
},
{
"category": "external",
"summary": "SUSE Bug 1152506 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1152506"
},
{
"category": "external",
"summary": "SUSE Bug 1160120 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1160120"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1201877"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP4:qemu-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:qemu-block-curl-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:qemu-ipxe-1.0.0+-5.23.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:qemu-kvm-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:qemu-seabios-1.11.0-5.23.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:qemu-sgabios-8-5.23.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:qemu-tools-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:qemu-vgabios-1.11.0-5.23.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:qemu-x86-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:qemu-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:qemu-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:qemu-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:qemu-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:qemu-arm-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-curl-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-curl-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-curl-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-curl-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-iscsi-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-iscsi-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-iscsi-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-iscsi-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-rbd-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-rbd-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-ssh-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-ssh-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-ssh-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-ssh-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:qemu-guest-agent-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:qemu-guest-agent-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:qemu-guest-agent-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:qemu-guest-agent-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:qemu-ipxe-1.0.0+-5.23.2.noarch",
"SUSE Linux Enterprise Server 12 SP4:qemu-kvm-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:qemu-kvm-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:qemu-lang-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:qemu-lang-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:qemu-lang-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:qemu-lang-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:qemu-ppc-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:qemu-s390-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:qemu-seabios-1.11.0-5.23.2.noarch",
"SUSE Linux Enterprise Server 12 SP4:qemu-sgabios-8-5.23.2.noarch",
"SUSE Linux Enterprise Server 12 SP4:qemu-tools-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:qemu-tools-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:qemu-tools-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:qemu-tools-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:qemu-vgabios-1.11.0-5.23.2.noarch",
"SUSE Linux Enterprise Server 12 SP4:qemu-x86-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-arm-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-curl-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-curl-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-curl-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-curl-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-iscsi-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-iscsi-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-iscsi-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-iscsi-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-rbd-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-rbd-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-ssh-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-ssh-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-ssh-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-ssh-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-guest-agent-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-guest-agent-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-guest-agent-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-guest-agent-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-ipxe-1.0.0+-5.23.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-kvm-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-kvm-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-lang-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-lang-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-lang-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-lang-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-ppc-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-s390-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-seabios-1.11.0-5.23.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-sgabios-8-5.23.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-tools-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-tools-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-tools-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-tools-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-vgabios-1.11.0-5.23.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-x86-2.11.2-5.23.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP4:qemu-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:qemu-block-curl-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:qemu-ipxe-1.0.0+-5.23.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:qemu-kvm-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:qemu-seabios-1.11.0-5.23.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:qemu-sgabios-8-5.23.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:qemu-tools-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:qemu-vgabios-1.11.0-5.23.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:qemu-x86-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:qemu-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:qemu-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:qemu-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:qemu-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:qemu-arm-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-curl-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-curl-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-curl-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-curl-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-iscsi-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-iscsi-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-iscsi-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-iscsi-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-rbd-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-rbd-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-ssh-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-ssh-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-ssh-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-ssh-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:qemu-guest-agent-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:qemu-guest-agent-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:qemu-guest-agent-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:qemu-guest-agent-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:qemu-ipxe-1.0.0+-5.23.2.noarch",
"SUSE Linux Enterprise Server 12 SP4:qemu-kvm-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:qemu-kvm-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:qemu-lang-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:qemu-lang-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:qemu-lang-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:qemu-lang-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:qemu-ppc-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:qemu-s390-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:qemu-seabios-1.11.0-5.23.2.noarch",
"SUSE Linux Enterprise Server 12 SP4:qemu-sgabios-8-5.23.2.noarch",
"SUSE Linux Enterprise Server 12 SP4:qemu-tools-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:qemu-tools-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:qemu-tools-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:qemu-tools-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:qemu-vgabios-1.11.0-5.23.2.noarch",
"SUSE Linux Enterprise Server 12 SP4:qemu-x86-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-arm-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-curl-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-curl-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-curl-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-curl-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-iscsi-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-iscsi-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-iscsi-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-iscsi-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-rbd-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-rbd-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-ssh-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-ssh-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-ssh-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-ssh-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-guest-agent-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-guest-agent-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-guest-agent-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-guest-agent-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-ipxe-1.0.0+-5.23.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-kvm-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-kvm-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-lang-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-lang-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-lang-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-lang-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-ppc-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-s390-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-seabios-1.11.0-5.23.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-sgabios-8-5.23.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-tools-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-tools-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-tools-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-tools-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-vgabios-1.11.0-5.23.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-x86-2.11.2-5.23.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:15:08Z",
"details": "moderate"
}
],
"title": "CVE-2019-11135"
},
{
"cve": "CVE-2019-12068",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-12068"
}
],
"notes": [
{
"category": "general",
"text": "In QEMU 1:4.1-1, 1:2.1+dfsg-12+deb8u6, 1:2.8+dfsg-6+deb9u8, 1:3.1+dfsg-8~deb10u1, 1:3.1+dfsg-8+deb10u2, and 1:2.1+dfsg-12+deb8u12 (fixed), when executing script in lsi_execute_script(), the LSI scsi adapter emulator advances \u0027s-\u003edsp\u0027 index to read next opcode. This can lead to an infinite loop if the next opcode is empty. Move the existing loop exit after 10k iterations so that it covers no-op opcodes as well.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP4:qemu-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:qemu-block-curl-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:qemu-ipxe-1.0.0+-5.23.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:qemu-kvm-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:qemu-seabios-1.11.0-5.23.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:qemu-sgabios-8-5.23.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:qemu-tools-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:qemu-vgabios-1.11.0-5.23.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:qemu-x86-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:qemu-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:qemu-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:qemu-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:qemu-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:qemu-arm-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-curl-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-curl-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-curl-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-curl-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-iscsi-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-iscsi-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-iscsi-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-iscsi-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-rbd-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-rbd-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-ssh-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-ssh-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-ssh-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-ssh-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:qemu-guest-agent-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:qemu-guest-agent-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:qemu-guest-agent-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:qemu-guest-agent-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:qemu-ipxe-1.0.0+-5.23.2.noarch",
"SUSE Linux Enterprise Server 12 SP4:qemu-kvm-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:qemu-kvm-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:qemu-lang-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:qemu-lang-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:qemu-lang-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:qemu-lang-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:qemu-ppc-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:qemu-s390-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:qemu-seabios-1.11.0-5.23.2.noarch",
"SUSE Linux Enterprise Server 12 SP4:qemu-sgabios-8-5.23.2.noarch",
"SUSE Linux Enterprise Server 12 SP4:qemu-tools-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:qemu-tools-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:qemu-tools-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:qemu-tools-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:qemu-vgabios-1.11.0-5.23.2.noarch",
"SUSE Linux Enterprise Server 12 SP4:qemu-x86-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-arm-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-curl-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-curl-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-curl-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-curl-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-iscsi-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-iscsi-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-iscsi-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-iscsi-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-rbd-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-rbd-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-ssh-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-ssh-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-ssh-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-ssh-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-guest-agent-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-guest-agent-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-guest-agent-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-guest-agent-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-ipxe-1.0.0+-5.23.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-kvm-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-kvm-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-lang-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-lang-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-lang-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-lang-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-ppc-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-s390-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-seabios-1.11.0-5.23.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-sgabios-8-5.23.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-tools-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-tools-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-tools-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-tools-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-vgabios-1.11.0-5.23.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-x86-2.11.2-5.23.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-12068",
"url": "https://www.suse.com/security/cve/CVE-2019-12068"
},
{
"category": "external",
"summary": "SUSE Bug 1146873 for CVE-2019-12068",
"url": "https://bugzilla.suse.com/1146873"
},
{
"category": "external",
"summary": "SUSE Bug 1146874 for CVE-2019-12068",
"url": "https://bugzilla.suse.com/1146874"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2019-12068",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP4:qemu-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:qemu-block-curl-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:qemu-ipxe-1.0.0+-5.23.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:qemu-kvm-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:qemu-seabios-1.11.0-5.23.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:qemu-sgabios-8-5.23.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:qemu-tools-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:qemu-vgabios-1.11.0-5.23.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:qemu-x86-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:qemu-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:qemu-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:qemu-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:qemu-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:qemu-arm-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-curl-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-curl-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-curl-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-curl-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-iscsi-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-iscsi-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-iscsi-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-iscsi-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-rbd-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-rbd-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-ssh-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-ssh-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-ssh-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-ssh-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:qemu-guest-agent-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:qemu-guest-agent-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:qemu-guest-agent-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:qemu-guest-agent-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:qemu-ipxe-1.0.0+-5.23.2.noarch",
"SUSE Linux Enterprise Server 12 SP4:qemu-kvm-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:qemu-kvm-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:qemu-lang-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:qemu-lang-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:qemu-lang-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:qemu-lang-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:qemu-ppc-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:qemu-s390-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:qemu-seabios-1.11.0-5.23.2.noarch",
"SUSE Linux Enterprise Server 12 SP4:qemu-sgabios-8-5.23.2.noarch",
"SUSE Linux Enterprise Server 12 SP4:qemu-tools-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:qemu-tools-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:qemu-tools-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:qemu-tools-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:qemu-vgabios-1.11.0-5.23.2.noarch",
"SUSE Linux Enterprise Server 12 SP4:qemu-x86-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-arm-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-curl-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-curl-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-curl-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-curl-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-iscsi-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-iscsi-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-iscsi-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-iscsi-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-rbd-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-rbd-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-ssh-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-ssh-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-ssh-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-ssh-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-guest-agent-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-guest-agent-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-guest-agent-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-guest-agent-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-ipxe-1.0.0+-5.23.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-kvm-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-kvm-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-lang-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-lang-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-lang-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-lang-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-ppc-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-s390-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-seabios-1.11.0-5.23.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-sgabios-8-5.23.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-tools-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-tools-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-tools-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-tools-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-vgabios-1.11.0-5.23.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-x86-2.11.2-5.23.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP4:qemu-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:qemu-block-curl-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:qemu-ipxe-1.0.0+-5.23.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:qemu-kvm-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:qemu-seabios-1.11.0-5.23.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:qemu-sgabios-8-5.23.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:qemu-tools-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:qemu-vgabios-1.11.0-5.23.2.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:qemu-x86-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:qemu-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:qemu-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:qemu-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:qemu-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:qemu-arm-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-curl-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-curl-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-curl-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-curl-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-iscsi-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-iscsi-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-iscsi-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-iscsi-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-rbd-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-rbd-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-ssh-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-ssh-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-ssh-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:qemu-block-ssh-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:qemu-guest-agent-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:qemu-guest-agent-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:qemu-guest-agent-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:qemu-guest-agent-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:qemu-ipxe-1.0.0+-5.23.2.noarch",
"SUSE Linux Enterprise Server 12 SP4:qemu-kvm-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:qemu-kvm-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:qemu-lang-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:qemu-lang-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:qemu-lang-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:qemu-lang-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:qemu-ppc-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:qemu-s390-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:qemu-seabios-1.11.0-5.23.2.noarch",
"SUSE Linux Enterprise Server 12 SP4:qemu-sgabios-8-5.23.2.noarch",
"SUSE Linux Enterprise Server 12 SP4:qemu-tools-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4:qemu-tools-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:qemu-tools-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server 12 SP4:qemu-tools-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server 12 SP4:qemu-vgabios-1.11.0-5.23.2.noarch",
"SUSE Linux Enterprise Server 12 SP4:qemu-x86-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-arm-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-curl-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-curl-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-curl-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-curl-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-iscsi-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-iscsi-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-iscsi-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-iscsi-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-rbd-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-rbd-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-ssh-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-ssh-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-ssh-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-block-ssh-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-guest-agent-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-guest-agent-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-guest-agent-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-guest-agent-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-ipxe-1.0.0+-5.23.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-kvm-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-kvm-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-lang-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-lang-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-lang-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-lang-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-ppc-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-s390-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-seabios-1.11.0-5.23.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-sgabios-8-5.23.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-tools-2.11.2-5.23.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-tools-2.11.2-5.23.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-tools-2.11.2-5.23.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-tools-2.11.2-5.23.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-vgabios-1.11.0-5.23.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:qemu-x86-2.11.2-5.23.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:15:08Z",
"details": "moderate"
}
],
"title": "CVE-2019-12068"
}
]
}
suse-su-2019:3294-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "The SUSE Linux Enterprise 12 SP4 RT kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2019-15916: Fixed a memory leak in register_queue_kobjects() which might\n have led denial of service (bsc#1149448).\n- CVE-2019-0154: Fixed an improper access control in subsystem for Intel (R)\n processor graphics whichs may have allowed an authenticated user to potentially\n enable denial of service via local access (bsc#1135966).\n- CVE-2019-0155: Fixed an improper access control in subsystem for Intel (R)\n processor graphics whichs may have allowed an authenticated user to potentially\n enable escalation of privilege via local access (bsc#1135967).\n- CVE-2019-16231: Fixed a NULL pointer dereference due to lack of checking the\n alloc_workqueue return value (bsc#1150466).\n- CVE-2019-18805: Fixed an integer overflow in tcp_ack_update_rtt() leading to\n a denial of service or possibly unspecified other impact (bsc#1156187).\n- CVE-2019-17055: Enforced CAP_NET_RAW in the AF_ISDN network module to restrict\n unprivileged users to create a raw socket (bsc#1152782).\n- CVE-2019-16995: Fixed a memory leak in hsr_dev_finalize() which may have caused\n denial of service (bsc#1152685).\n- CVE-2019-11135: Aborting an asynchronous TSX operation on Intel CPUs with\n Transactional Memory support could be used to facilitate sidechannel\n information leaks out of microarchitectural buffers, similar to the\n previously described \u0027Microarchitectural Data Sampling\u0027 attack.(bsc#1139073).\n The Linux kernel was supplemented with the option to disable TSX operation\n altogether (requiring CPU Microcode updates on older systems) and better\n flushing of microarchitectural buffers (VERW).\n The set of options available is described in our TID at https://www.suse.com/support/kb/doc/?id=7024251\n- CVE-2019-16233: drivers/scsi/qla2xxx/qla_os.c did not check the\n alloc_workqueue return value, leading to a NULL pointer dereference.\n (bsc#1150457).\n- CVE-2018-12207: Untrusted virtual machines on Intel CPUs could exploit a race\n condition in the Instruction Fetch Unit of the Intel CPU to cause a Machine\n Exception during Page Size Change, causing the CPU core to be non-functional.\n- CVE-2019-10220: Added sanity checks on the pathnames passed to the user\n space. (bsc#1144903)\n- CVE-2019-17666: rtlwifi: Fix potential overflow in P2P code (bsc#1154372).\n- CVE-2019-16232: Fix a potential NULL pointer dereference in the Marwell\n libertas driver (bsc#1150465).\n- CVE-2019-16234: iwlwifi pcie driver did not check the alloc_workqueue return\n value, leading to a NULL pointer dereference. (bsc#1150452).\n- CVE-2019-17133: cfg80211 wireless extension did not reject a long SSID IE,\n leading to a Buffer Overflow (bsc#1153158).\n- CVE-2019-17056: The AF_NFC network module did not enforce CAP_NET_RAW, which\n meant that unprivileged users could create a raw socket (bsc#1152788).\n\nThe following non-security bugs were fixed:\n\n- 9p: avoid attaching writeback_fid on mmap with type PRIVATE (bsc#1051510).\n- ACPI / CPPC: do not require the _PSD method (bsc#1051510).\n- ACPI: CPPC: Set pcc_data[pcc_ss_id] to NULL in acpi_cppc_processor_exit() (bsc#1051510).\n- ACPI / processor: do not print errors for processorIDs == 0xff (bsc#1051510).\n- act_mirred: Fix mirred_init_module error handling (bsc#1051510).\n- Add kernel module compression support (bsc#1135854) For enabling the kernel module compress, add the item COMPRESS_MODULES=\u0027xz\u0027 in config.sh, then mkspec will pass it to the spec file.\n- alarmtimer: Use EOPNOTSUPP instead of ENOTSUPP (bsc#1151680).\n- ALSA: bebob: Fix prototype of helper function to return negative value (bsc#1051510).\n- ALSA: bebob: fix to detect configured source of sampling clock for Focusrite Saffire Pro i/o series (git-fixes).\n- ALSA: hda: Add Cometlake-S PCI ID (git-fixes).\n- ALSA: hda: Add Elkhart Lake PCI ID (bsc#1051510).\n- ALSA: hda - Add laptop imic fixup for ASUS M9V laptop (bsc#1051510).\n- ALSA: hda: Add support of Zhaoxin controller (bsc#1051510).\n- ALSA: hda: Add Tigerlake/Jasperlake PCI ID (bsc#1051510).\n- ALSA: hda - Apply AMD controller workaround for Raven platform (bsc#1051510).\n- ALSA: hda/ca0132 - Fix possible workqueue stall (bsc#1155836).\n- ALSA: hda - Define a fallback_pin_fixup_tbl for alc269 family (bsc#1051510).\n- ALSA: hda - Drop unsol event handler for Intel HDMI codecs (bsc#1051510).\n- ALSA: hda - Expand pin_match function to match upcoming new tbls (bsc#1051510).\n- ALSA: hda: Flush interrupts on disabling (bsc#1051510).\n- ALSA: hda/hdmi: remove redundant assignment to variable pcm_idx (bsc#1051510).\n- ALSA: hda - Inform too slow responses (bsc#1051510).\n- ALSA: hda/intel: add CometLake PCI IDs (bsc#1156729).\n- ALSA: hda/realtek - Add support for ALC623 (bsc#1051510).\n- ALSA: hda/realtek - Add support for ALC711 (bsc#1051510).\n- ALSA: hda/realtek - Blacklist PC beep for Lenovo ThinkCentre M73/93 (bsc#1051510).\n- ALSA: hda/realtek - Check beep whitelist before assigning in all codecs (bsc#1051510).\n- ALSA: hda/realtek - Fix 2 front mics of codec 0x623 (bsc#1051510).\n- ALSA: hda/realtek - Fix alienware headset mic (bsc#1051510).\n- ALSA: hda/realtek: Reduce the Headphone static noise on XPS 9350/9360 (bsc#1051510).\n- ALSA: hda: Set fifo_size for both playback and capture streams (bsc#1051510).\n- ALSA: hda - Show the fatal CORB/RIRB error more clearly (bsc#1051510).\n- ALSA: hda/sigmatel - remove unused variable \u0027stac9200_core_init\u0027 (bsc#1051510).\n- ALSA: i2c: ak4xxx-adda: Fix a possible null pointer dereference in build_adc_controls() (bsc#1051510).\n- ALSA: line6: sizeof (byte) is always 1, use that fact (bsc#1051510).\n- ALSA: pcm: Fix stream lock usage in snd_pcm_period_elapsed() (git-fixes).\n- ALSA: timer: Fix incorrectly assigned timer instance (git-fixes).\n- ALSA: timer: Fix mutex deadlock at releasing card (bsc#1051510).\n- ALSA: usb-audio: Add Pioneer DDJ-SX3 PCM quirck (bsc#1051510).\n- ALSA: usb-audio: Disable quirks for BOSS Katana amplifiers (bsc#1051510).\n- ALSA: usb-audio: Fix missing error check at mixer resolution test (git-fixes).\n- ALSA: usb-audio: not submit urb for stopped endpoint (git-fixes).\n- ALSA: usb-audio: Skip bSynchAddress endpoint check if it is invalid (bsc#1051510).\n- appletalk: enforce CAP_NET_RAW for raw sockets (bsc#1051510).\n- arcnet: provide a buffer big enough to actually receive packets (networking-stable-19_09_30).\n- arm64: Update config files. (bsc#1156466) Enable HW_RANDOM_OMAP driver and mark driver omap-rng as supported.\n- ASoC: Define a set of DAPM pre/post-up events (bsc#1051510).\n- ASoC: dmaengine: Make the pcm-\u003ename equal to pcm-\u003eid if the name is not set (bsc#1051510).\n- ASoC: Intel: Fix use of potentially uninitialized variable (bsc#1051510).\n- ASoC: Intel: NHLT: Fix debug print format (bsc#1051510).\n- ASoc: rockchip: i2s: Fix RPM imbalance (bsc#1051510).\n- ASoC: rsnd: Reinitialize bit clock inversion flag for every format setting (bsc#1051510).\n- ASoC: sgtl5000: Fix charge pump source assignment (bsc#1051510).\n- auxdisplay: panel: need to delete scan_timer when misc_register fails in panel_attach (bsc#1051510).\n- ax25: enforce CAP_NET_RAW for raw sockets (bsc#1051510).\n- Blacklist \u0027signal: Correct namespace fixups of si_pid and si_uid\u0027 (bsc#1142667)\n- blk-wbt: abstract out end IO completion handler (bsc#1135873).\n- blk-wbt: fix has-sleeper queueing check (bsc#1135873).\n- blk-wbt: improve waking of tasks (bsc#1135873).\n- blk-wbt: move disable check into get_limit() (bsc#1135873).\n- blk-wbt: use wq_has_sleeper() for wq active check (bsc#1135873).\n- block: add io timeout to sysfs (bsc#1148410).\n- block: do not show io_timeout if driver has no timeout handler (bsc#1148410).\n- Bluetooth: btrtl: Additional Realtek 8822CE Bluetooth devices (bsc#1051510).\n- bnx2x: Fix VF\u0027s VLAN reconfiguration in reload (bsc#1086323 ).\n- bpf: fix use after free in prog symbol exposure (bsc#1083647).\n- bridge/mdb: remove wrong use of NLM_F_MULTI (networking-stable-19_09_15).\n- Btrfs: bail out gracefully rather than BUG_ON (bsc#1153646).\n- Btrfs: block-group: Fix a memory leak due to missing btrfs_put_block_group() (bsc#1155178).\n- Btrfs: check for the full sync flag while holding the inode lock during fsync (bsc#1153713).\n- Btrfs: Ensure btrfs_init_dev_replace_tgtdev sees up to date values (bsc#1154651).\n- Btrfs: Ensure replaced device does not have pending chunk allocation (bsc#1154607).\n- Btrfs: fix log context list corruption after rename exchange operation (bsc#1156494).\n- Btrfs: qgroup: Always free PREALLOC META reserve in btrfs_delalloc_release_extents() (bsc#1155179).\n- Btrfs: remove wrong use of volume_mutex from btrfs_dev_replace_start (bsc#1154651).\n- Btrfs: tracepoints: Fix bad entry members of qgroup events (bsc#1155186).\n- Btrfs: tracepoints: Fix wrong parameter order for qgroup events (bsc#1155184).\n- can: dev: call netif_carrier_off() in register_candev() (bsc#1051510).\n- can: mcp251x: mcp251x_hw_reset(): allow more time after a reset (bsc#1051510).\n- can: xilinx_can: xcan_probe(): skip error message on deferred probe (bsc#1051510).\n- cdc_ether: fix rndis support for Mediatek based smartphones (networking-stable-19_09_15).\n- cdc_ncm: fix divide-by-zero caused by invalid wMaxPacketSize (bsc#1051510).\n- ceph: fix directories inode i_blkbits initialization (bsc#1153717).\n- ceph: reconnect connection if session hang in opening state (bsc#1153718).\n- ceph: update the mtime when truncating up (bsc#1153719).\n- cfg80211: add and use strongly typed element iteration macros (bsc#1051510).\n- cfg80211: Purge frame registrations on iftype change (bsc#1051510).\n- clk: at91: select parent if main oscillator or bypass is enabled (bsc#1051510).\n- clk: qoriq: Fix -Wunused-const-variable (bsc#1051510).\n- clk: sirf: Do not reference clk_init_data after registration (bsc#1051510).\n- clk: zx296718: Do not reference clk_init_data after registration (bsc#1051510).\n- crypto: af_alg - consolidation of duplicate code (bsc#1154737).\n- crypto: af_alg - fix race accessing cipher request (bsc#1154737).\n- crypto: af_alg - Fix race around ctx-\u003ercvused by making it atomic_t (bsc#1154737).\n- crypto: af_alg - Initialize sg_num_bytes in error code path (bsc#1051510).\n- crypto: af_alg - remove locking in async callback (bsc#1154737).\n- crypto: af_alg - update correct dst SGL entry (bsc#1051510).\n- crypto: af_alg - wait for data at beginning of recvmsg (bsc#1154737).\n- crypto: algif_aead - copy AAD from src to dst (bsc#1154737).\n- crypto: algif_aead - fix reference counting of null skcipher (bsc#1154737).\n- crypto: algif_aead - overhaul memory management (bsc#1154737).\n- crypto: algif_aead - skip SGL entries with NULL page (bsc#1154737).\n- crypto: algif - return error code when no data was processed (bsc#1154737).\n- crypto: algif_skcipher - overhaul memory management (bsc#1154737).\n- crypto: talitos - fix missing break in switch statement (bsc#1142635).\n- cxgb4: fix endianness for vlan value in cxgb4_tc_flower (bsc#1064802 bsc#1066129).\n- cxgb4:Fix out-of-bounds MSI-X info array access (networking-stable-19_10_05).\n- cxgb4: offload VLAN flows regardless of VLAN ethtype (bsc#1064802 bsc#1066129).\n- cxgb4: reduce kernel stack usage in cudbg_collect_mem_region() (bsc#1073513).\n- cxgb4: Signedness bug in init_one() (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).\n- cxgb4: smt: Add lock for atomic_dec_and_test (bsc#1064802 bsc#1066129).\n- dasd_fba: Display \u002700000000\u0027 for zero page when dumping sense (bsc#1123080).\n- dmaengine: bcm2835: Print error in case setting DMA mask fails (bsc#1051510).\n- dmaengine: imx-sdma: fix size check for sdma script_number (bsc#1051510).\n- drm/amdgpu: Check for valid number of registers to read (bsc#1051510).\n- drm/amdgpu/si: fix ASIC tests (git-fixes).\n- drm/amd/powerplay/smu7: enforce minimal VBITimeout (v2) (bsc#1051510).\n- drm/ast: Fixed reboot test may cause system hanged (bsc#1051510).\n- drm/bridge: tc358767: Increase AUX transfer length limit (bsc#1051510).\n- drm/edid: Add 6 bpc quirk for SDC panel in Lenovo G50 (bsc#1051510).\n- drm: Flush output polling on shutdown (bsc#1051510).\n- drm/i915: Add gen9 BCS cmdparsing (bsc#1135967)\n- drm/i915: Add support for mandatory cmdparsing (bsc#1135967)\n- drm/i915: Allow parsing of unsized batches (bsc#1135967)\n- drm/i915/cmdparser: Add support for backward jumps (bsc#1135967)\n- drm/i915/cmdparser: Ignore Length operands during command matching (bsc#1135967)\n- drm/i915/cmdparser: Use explicit goto for error paths (bsc#1135967)\n- drm/i915: Disable Secure Batches for gen6+\n- drm/i915/gen8+: Add RC6 CTX corruption WA (bsc#1135967)\n- drm/i915/gtt: Add read only pages to gen8_pte_encode (bsc#1135967)\n- drm/i915/gtt: Disable read-only support under GVT (bsc#1135967)\n- drm/i915/gtt: Read-only pages for insert_entries on bdw (bsc#1135967)\n- drm/i915: Lower RM timeout to avoid DSI hard hangs (bsc#1135967)\n- drm/i915: Prevent writing into a read-only object via a GGTT mmap (bsc#1135967)\n- drm/i915: Remove Master tables from cmdparser\n- drm/i915: Rename gen7 cmdparser tables (bsc#1135967)\n- drm/i915: Support ro ppgtt mapped cmdparser shadow buffers (bsc#1135967)\n- drm/msm/dsi: Implement reset correctly (bsc#1051510).\n- drm/panel: simple: fix AUO g185han01 horizontal blanking (bsc#1051510).\n- drm/radeon: Fix EEH during kexec (bsc#1051510).\n- drm/tilcdc: Register cpufreq notifier after we have initialized crtc (bsc#1051510).\n- drm/vmwgfx: Fix double free in vmw_recv_msg() (bsc#1051510).\n- Drop multiversion(kernel) from the KMP template (bsc#1127155).\n- e1000e: add workaround for possible stalled packet (bsc#1051510).\n- efi: cper: print AER info of PCIe fatal error (bsc#1051510).\n- efi/memattr: Do not bail on zero VA if it equals the region\u0027s PA (bsc#1051510).\n- efivar/ssdt: Do not iterate over EFI vars if no SSDT override was specified (bsc#1051510).\n- firmware: dmi: Fix unlikely out-of-bounds read in save_mem_devices (git-fixes).\n- Fix AMD IOMMU kABI (bsc#1154610).\n- Fix KVM kABI after x86 mmu backports (bsc#1117665).\n- Fix NULL pointer dereference in fc_lookup_rport (bsc#1098291).\n- gpu: drm: radeon: Fix a possible null-pointer dereference in radeon_connector_set_property() (bsc#1051510).\n- HID: apple: Fix stuck function keys when using FN (bsc#1051510).\n- HID: fix error message in hid_open_report() (bsc#1051510).\n- HID: hidraw: Fix invalid read in hidraw_ioctl (bsc#1051510).\n- HID: logitech: Fix general protection fault caused by Logitech driver (bsc#1051510).\n- HID: logitech-hidpp: do all FF cleanup in hidpp_ff_destroy() (bsc#1051510).\n- HID: prodikeys: Fix general protection fault during probe (bsc#1051510).\n- HID: sony: Fix memory corruption issue on cleanup (bsc#1051510).\n- hso: fix NULL-deref on tty open (bsc#1051510).\n- hwmon: (acpi_power_meter) Change log level for \u0027unsafe software power cap\u0027 (bsc#1051510).\n- hwrng: core - do not wait on add_early_randomness() (git-fixes).\n- hyperv: set nvme msi interrupts to unmanaged (jsc#SLE-8953, jsc#SLE-9221, jsc#SLE-4941, bsc#1119461, bsc#1119465, bsc#1138190, bsc#1154905).\n- i2c: riic: Clear NACK in tend isr (bsc#1051510).\n- IB/core: Add mitigation for Spectre V1 (bsc#1155671)\n- IB/core, ipoib: Do not overreact to SM LID change event (bsc#1154108)\n- IB/hfi1: Remove overly conservative VM_EXEC flag check (bsc#1144449).\n- IB/mlx5: Consolidate use_umr checks into single function (bsc#1093205).\n- IB/mlx5: Fix MR re-registration flow to use UMR properly (bsc#1093205).\n- IB/mlx5: Report correctly tag matching rendezvous capability (bsc#1046305).\n- ieee802154: atusb: fix use-after-free at disconnect (bsc#1051510).\n- ieee802154: ca8210: prevent memory leak (bsc#1051510).\n- ieee802154: enforce CAP_NET_RAW for raw sockets (bsc#1051510).\n- iio: adc: ad799x: fix probe error handling (bsc#1051510).\n- iio: light: opt3001: fix mutex unlock race (bsc#1051510).\n- ima: always return negative code for error (bsc#1051510).\n- Input: da9063 - fix capability and drop KEY_SLEEP (bsc#1051510).\n- Input: synaptics-rmi4 - avoid processing unknown IRQs (bsc#1051510).\n- integrity: prevent deadlock during digsig verification (bsc#1090631).\n- iommu/amd: Apply the same IVRS IOAPIC workaround to Acer Aspire A315-41 (bsc#1137799).\n- iommu/amd: Check PM_LEVEL_SIZE() condition in locked section (bsc#1154608).\n- iommu/amd: Override wrong IVRS IOAPIC on Raven Ridge systems (bsc#1137799).\n- iommu/amd: Remove domain-\u003eupdated (bsc#1154610).\n- iommu/amd: Wait for completion of IOTLB flush in attach_device (bsc#1154611).\n- ipmi_si: Only schedule continuously in the thread in maintenance mode (bsc#1051510).\n- ipv6: drop incoming packets having a v4mapped source address (networking-stable-19_10_05).\n- ipv6: Fix the link time qualifier of \u0027ping_v6_proc_exit_net()\u0027 (networking-stable-19_09_15).\n- ipv6: Handle missing host route in __ipv6_ifa_notify (networking-stable-19_10_05).\n- iwlwifi: do not panic in error path on non-msix systems (bsc#1155692).\n- iwlwifi: exclude GEO SAR support for 3168 (git-fixes).\n- ixgbe: Prevent u8 wrapping of ITR value to something less than 10us (bsc#1101674).\n- ixgbe: sync the first fragment unconditionally (bsc#1133140).\n- kABI: net: sched: act_sample: fix psample group handling on overwrite (networking-stable-19_09_05).\n- kABI/severities: Whitelist functions internal to radix mm. To call these functions you have to first detect if you are running in radix mm mode which can\u0027t be expected of OOT code.\n- kABI workaround for crypto/af_alg changes (bsc#1154737).\n- kABI workaround for drm_vma_offset_node readonly field addition (bsc#1135967)\n- kABI workaround for snd_hda_pick_pin_fixup() changes (bsc#1051510).\n- kernel-binary: Drop .kernel-binary.spec.buildenv (boo#1154578). \n- kernel-binary.spec.in: Fix build of non-modular kernels (boo#1154578).\n- kernel-binary.spec.in: Obsolete kgraft packages only when not building them.\n- kernel-subpackage-build: create zero size ghost for uncompressed vmlinux (bsc#1154354). It is not strictly necessary to uncompress it so maybe the ghost file can be 0 size in this case.\n- kernel/sysctl.c: do not override max_threads provided by userspace (bnc#1150875).\n- ksm: cleanup stable_node chain collapse case (bnc#1144338).\n- ksm: fix use after free with merge_across_nodes = 0 (bnc#1144338).\n- ksm: introduce ksm_max_page_sharing per page deduplication limit (bnc#1144338).\n- ksm: optimize refile of stable_node_dup at the head of the chain (bnc#1144338).\n- ksm: swap the two output parameters of chain/chain_prune (bnc#1144338).\n- KVM: Convert kvm_lock to a mutex (bsc#1117665).\n- KVM: MMU: drop vcpu param in gpte_access (bsc#1117665).\n- KVM: PPC: Book3S HV: use smp_mb() when setting/clearing host_ipi flag (bsc#1061840).\n- KVM: vmx, svm: always run with EFER.NXE=1 when shadow paging is active (bsc#1117665).\n- KVM: x86: add tracepoints around __direct_map and FNAME(fetch) (bsc#1117665).\n- KVM: x86: adjust kvm_mmu_page member to save 8 bytes (bsc#1117665).\n- KVM: x86: change kvm_mmu_page_get_gfn BUG_ON to WARN_ON (bsc#1117665).\n- KVM: x86: Do not release the page inside mmu_set_spte() (bsc#1117665).\n- KVM: x86: make FNAME(fetch) and __direct_map more similar (bsc#1117665).\n- KVM: x86, powerpc: do not allow clearing largepages debugfs entry (bsc#1117665).\n- KVM: x86: remove now unneeded hugepage gfn adjustment (bsc#1117665).\n- libertas: Add missing sentinel at end of if_usb.c fw_table (bsc#1051510).\n- lib/mpi: Fix karactx leak in mpi_powm (bsc#1051510).\n- lib/scatterlist: Fix chaining support in sgl_alloc_order() (git-fixes).\n- lib/scatterlist: Introduce sgl_alloc() and sgl_free() (git-fixes).\n- mac80211: accept deauth frames in IBSS mode (bsc#1051510).\n- mac80211: fix txq null pointer dereference (bsc#1051510).\n- mac80211: Reject malformed SSID elements (bsc#1051510).\n- macsec: drop skb sk before calling gro_cells_receive (bsc#1051510).\n- md/raid0: avoid RAID0 data corruption due to layout confusion (bsc#1140090).\n- md/raid0: fix warning message for parameter default_layout (bsc#1140090).\n- media: atmel: atmel-isc: fix asd memory allocation (bsc#1135642).\n- media: cpia2_usb: fix memory leaks (bsc#1051510).\n- media: dvb-core: fix a memory leak bug (bsc#1051510).\n- media: exynos4-is: fix leaked of_node references (bsc#1051510).\n- media: gspca: zero usb_buf on error (bsc#1051510).\n- media: hdpvr: Add device num check and handling (bsc#1051510).\n- media: hdpvr: add terminating 0 at end of string (bsc#1051510).\n- media: i2c: ov5645: Fix power sequence (bsc#1051510).\n- media: iguanair: add sanity checks (bsc#1051510).\n- media: omap3isp: Do not set streaming state on random subdevs (bsc#1051510).\n- media: omap3isp: Set device on omap3isp subdevs (bsc#1051510).\n- media: ov9650: add a sanity check (bsc#1051510).\n- media: radio/si470x: kill urb on error (bsc#1051510).\n- media: saa7134: fix terminology around saa7134_i2c_eeprom_md7134_gate() (bsc#1051510).\n- media: saa7146: add cleanup in hexium_attach() (bsc#1051510).\n- media: sn9c20x: Add MSI MS-1039 laptop to flip_dmi_table (bsc#1051510).\n- media: stkwebcam: fix runtime PM after driver unbind (bsc#1051510).\n- media: ttusb-dec: Fix info-leak in ttusb_dec_send_command() (bsc#1051510).\n- memstick: jmb38x_ms: Fix an error handling path in \u0027jmb38x_ms_probe()\u0027 (bsc#1051510).\n- mfd: intel-lpss: Remove D3cold delay (bsc#1051510).\n- mISDN: enforce CAP_NET_RAW for raw sockets (bsc#1051510).\n- mld: fix memory leak in mld_del_delrec() (networking-stable-19_09_05).\n- mmc: sdhci-esdhc-imx: correct the fix of ERR004536 (git-fixes).\n- mmc: sdhci: Fix incorrect switch to HS mode (bsc#1051510).\n- mmc: sdhci: improve ADMA error reporting (bsc#1051510).\n- mmc: sdhci-of-esdhc: set DMA snooping based on DMA coherence (bsc#1051510).\n- mtd: nand: mtk: fix incorrect register setting order about ecc irq.\n- netfilter: nf_nat: do not bug when mapping already exists (bsc#1146612).\n- net: Fix null de-reference of device refcount (networking-stable-19_09_15).\n- net: fix skb use after free in netpoll (networking-stable-19_09_05).\n- net: gso: Fix skb_segment splat when splitting gso_size mangled skb having linear-headed frag_list (networking-stable-19_09_15).\n- net/ibmvnic: Fix EOI when running in XIVE mode (bsc#1089644, ltc#166495, ltc#165544, git-fixes).\n- net/mlx4_en: fix a memory leak bug (bsc#1046299).\n- net/mlx5: Add device ID of upcoming BlueField-2 (bsc#1046303 ).\n- net/mlx5: Fix error handling in mlx5_load() (bsc#1046305 ).\n- net: openvswitch: free vport unless register_netdevice() succeeds (git-fixes).\n- net/phy: fix DP83865 10 Mbps HDX loopback disable function (networking-stable-19_09_30).\n- net: qlogic: Fix memory leak in ql_alloc_large_buffers (networking-stable-19_10_05).\n- net: qrtr: Stop rx_worker before freeing node (networking-stable-19_09_30).\n- net/rds: Fix error handling in rds_ib_add_one() (networking-stable-19_10_05).\n- net/rds: fix warn in rds_message_alloc_sgs (bsc#1154848).\n- net/rds: remove user triggered WARN_ON in rds_sendmsg (bsc#1154848).\n- net: Replace NF_CT_ASSERT() with WARN_ON() (bsc#1146612).\n- net/sched: act_sample: do not push mac header on ip6gre ingress (networking-stable-19_09_30).\n- net: sched: act_sample: fix psample group handling on overwrite (networking-stable-19_09_05).\n- net_sched: add policy validation for action attributes (networking-stable-19_09_30).\n- net_sched: fix backward compatibility for TCA_ACT_KIND (git-fixes).\n- net/smc: fix SMCD link group creation with VLAN id (bsc#1154959).\n- net: stmmac: dwmac-rk: Do not fail if phy regulator is absent (networking-stable-19_09_05).\n- net: Unpublish sk from sk_reuseport_cb before call_rcu (networking-stable-19_10_05).\n- NFC: fix attrs checks in netlink interface (bsc#1051510).\n- NFC: fix memory leak in llcp_sock_bind() (bsc#1051510).\n- NFC: pn533: fix use-after-free and memleaks (bsc#1051510).\n- NFS: fix incorrectly backported patch (boo#1154189 bsc#1154747).\n- NFSv4.1 - backchannel request should hold ref on xprt (bsc#1152624).\n- nl80211: fix null pointer dereference (bsc#1051510).\n- objtool: Clobber user CFLAGS variable (bsc#1153236).\n- openvswitch: change type of UPCALL_PID attribute to NLA_UNSPEC (networking-stable-19_09_30).\n- packaging: add support for riscv64\n- Parametrize kgraft vs livepatch.\n- PCI: Correct pci=resource_alignment parameter example (bsc#1051510).\n- PCI: dra7xx: Fix legacy INTD IRQ handling (bsc#1087092).\n- PCI: hv: Use bytes 4 and 5 from instance ID as the PCI domain numbers (bsc#1153263).\n- PCI: PM: Fix pci_power_up() (bsc#1051510).\n- pinctrl: tegra: Fix write barrier placement in pmx_writel (bsc#1051510).\n- platform/x86: classmate-laptop: remove unused variable (bsc#1051510).\n- platform/x86: pmc_atom: Add Siemens SIMATIC IPC277E to critclk_systems DMI table (bsc#1051510).\n- powerpc/64: Make meltdown reporting Book3S 64 specific (bsc#1091041).\n- powerpc/64s/pseries: radix flush translations before MMU is enabled at boot (bsc#1055186).\n- powerpc/64s/radix: keep kernel ERAT over local process/guest invalidates (bsc#1055186).\n- powerpc/64s/radix: tidy up TLB flushing code (bsc#1055186).\n- powerpc/64s: Rename PPC_INVALIDATE_ERAT to PPC_ISA_3_0_INVALIDATE_ERAT (bsc#1055186).\n- powerpc/mm/book3s64: Move book3s64 code to pgtable-book3s64 (bsc#1055186).\n- powerpc/mm: mark more tlb functions as __always_inline (bsc#1055186).\n- powerpc/mm: Properly invalidate when setting process table base (bsc#1055186).\n- powerpc/mm/radix: mark as __tlbie_pid() and friends as__always_inline (bsc#1055186).\n- powerpc/mm/radix: mark __radix__flush_tlb_range_psize() as __always_inline (bsc#1055186).\n- powerpc/pseries: address checkpatch warnings in dlpar_offline_cpu (bsc#1156700 ltc#182459).\n- powerpc/pseries: Export maximum memory value (bsc#1122363).\n- powerpc/pseries: Export raw per-CPU VPA data via debugfs ().\n- powerpc/pseries/mobility: use cond_resched when updating device tree (bsc#1153112 ltc#181778).\n- powerpc/pseries: Remove confusing warning message (bsc#1109158).\n- powerpc/pseries: safely roll back failed DLPAR cpu add (bsc#1156700 ltc#182459).\n- powerpc/rtas: allow rescheduling while changing cpu states (bsc#1153112 ltc#181778).\n- powerpc/security/book3s64: Report L1TF status in sysfs (bsc#1091041).\n- powerpc/security: Fix wrong message when RFI Flush is disable (bsc#1131107).\n- powerpc/xive: Prevent page fault issues in the machine crash handler (bsc#1156882 ltc#182435).\n- power: supply: max14656: fix potential use-after-free (bsc#1051510).\n- power: supply: sysfs: ratelimit property read error message (bsc#1051510).\n- Pull packaging cleanup from mkubecek.\n- qed: iWARP - Fix default window size to be based on chip (bsc#1050536 bsc#1050545).\n- qed: iWARP - Fix tc for MPA ll2 connection (bsc#1050536 bsc#1050545).\n- qed: iWARP - fix uninitialized callback (bsc#1050536 bsc#1050545).\n- qed: iWARP - Use READ_ONCE and smp_store_release to access ep-\u003estate (bsc#1050536 bsc#1050545).\n- qmi_wwan: add support for Cinterion CLS8 devices (networking-stable-19_10_05).\n- r8152: Set macpassthru in reset_resume callback (bsc#1051510).\n- RDMA/bnxt_re: Fix spelling mistake \u0027missin_resp\u0027 -\u003e \u0027missing_resp\u0027 (bsc#1050244).\n- RDMA: Fix goto target to release the allocated memory (bsc#1050244).\n- rds: Fix warning (bsc#1154848).\n- reiserfs: fix extended attributes on the root directory (bsc#1151225).\n- rpm/config.sh: Enable kgraft.\n- rpm/config.sh: Enable livepatch.\n- rpm/constraints.in: lower disk space required for ARM With a requirement of 35GB, only 2 slow workers are usable for ARM. Current aarch64 build requires 27G and armv6/7 requires 14G. Set requirements respectively to 30GB and 20GB.\n- rpm/dtb.spec.in.in: do not make dtb directory inaccessible There is no reason to lock down the dtb directory for ordinary users.\n- rpm/kernel-binary.spec.in: build kernel-*-kgraft only for default SLE kernel RT and Azure variants are excluded for the moment. (bsc#1141600)\n- rpm/kernel-binary.spec.in: Fix kernel-livepatch description typo.\n- rpm/kernel-binary.spec.in: handle modules.builtin.modinfo It was added in 5.2.\n- rpm/kernel-binary.spec.in: support partial rt debug config.\n- rpm/kernel-subpackage-spec: Mention debuginfo in the subpackage description (bsc#1149119).\n- rpm/macros.kernel-source: KMPs should depend on kmod-compat to build. kmod-compat links are used in find-provides.ksyms, find-requires.ksyms, and find-supplements.ksyms in rpm-config-SUSE.\n- rpm/mkspec: Correct tarball URL for rc kernels.\n- rpm/mkspec: Make building DTBs optional.\n- rpm/modflist: Simplify compression support.\n- rpm: raise required disk space for binary packages Current disk space constraints (10 GB on s390x, 25 GB on other architectures) no longer suffice for 5.3 kernel builds. The statistics show ~30 GB of disk consumption on x86_64 and ~11 GB on s390x so raise the constraints to 35 GB in general and 14 GB on s390x.\n- rpm: support compressed modules Some of our scripts and scriptlets in rpm/ do not expect module files not ending with \u0027.ko\u0027 which currently leads to failure in preuninstall scriptlet of cluster-md-kmp-default (and probably also other subpackages). Let those which could be run on compressed module files recognize \u0027.ko.xz\u0027 in addition to \u0027.ko\u0027.\n- rtlwifi: rtl8192cu: Fix value set in descriptor (bsc#1142635).\n- s390/cmf: set_schib_wait add timeout (bsc#1153509, bsc#1153476).\n- s390/cpumsf: Check for CPU Measurement sampling (bsc#1153681 LTC#181855).\n- s390/crypto: fix gcm-aes-s390 selftest failures (bsc#1137861 LTC#178091).\n- sc16is7xx: Fix for \u0027Unexpected interrupt: 8\u0027 (bsc#1051510).\n- sch_cbq: validate TCA_CBQ_WRROPT to avoid crash (networking-stable-19_10_05).\n- sch_dsmark: fix potential NULL deref in dsmark_init() (networking-stable-19_10_05).\n- sched/fair: Avoid divide by zero when rebalancing domains (bsc#1096254).\n- sch_hhf: ensure quantum and hhf_non_hh_weight are non-zero (networking-stable-19_09_15).\n- sch_netem: fix a divide by zero in tabledist() (networking-stable-19_09_30).\n- scripts/arch-symbols: add missing link.\n- scsi: lpfc: Fix devices that do not return after devloss followed by rediscovery (bsc#1137040).\n- scsi: lpfc: Fix null ptr oops updating lpfc_devloss_tmo via sysfs attribute (bsc#1140845).\n- scsi: lpfc: Fix propagation of devloss_tmo setting to nvme transport (bsc#1140883).\n- scsi: lpfc: Honor module parameter lpfc_use_adisc (bsc#1153628).\n- scsi: lpfc: Limit xri count for kdump environment (bsc#1154124).\n- scsi: lpfc: Remove bg debugfs buffers (bsc#1144375).\n- scsi: qedf: fc_rport_priv reference counting fixes (bsc#1098291).\n- scsi: qedf: Modify abort and tmf handler to handle edge condition and flush (bsc#1098291).\n- scsi: qla2xxx: Add error handling for PLOGI ELS passthrough (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Capture FW dump on MPI heartbeat stop event (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Check for MB timeout while capturing ISP27/28xx FW dump (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Do command completion on abort timeout (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: qla2xxx: do not use zero for FC4_PRIORITY_NVME (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: qla2xxx: Dual FCP-NVMe target port support (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Fix a dma_pool_free() call (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: qla2xxx: Fix device connect issues in P2P configuration (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: qla2xxx: Fix double scsi_done for abort path (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: qla2xxx: Fix driver unload hang (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: qla2xxx: Fix memory leak when sending I/O fails (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: qla2xxx: Fix N2N link reset (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Fix N2N link up fail (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Fix partial flash write of MBI (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Fix SRB leak on switch command timeout (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: qla2xxx: Fix stale mem access on driver unload (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Fix unbound sleep in fcport delete path (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: fixup incorrect usage of host_byte (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Fix wait condition in loop (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Improve logging for scan thread (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Initialized mailbox to prevent driver load failure (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: initialize fc4_type_priority (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: qla2xxx: Optimize NPIV tear down process (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Remove an include directive (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: qla2xxx: remove redundant assignment to pointer host (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Retry PLOGI on FC-NVMe PRLI failure (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: qla2xxx: Set remove flag for all VP (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Silence fwdump template message (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: stop timer in shutdown path (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Update driver version to 10.01.00.20-k (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Update driver version to 10.01.00.21-k (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: sd: Ignore a failure to sync cache due to lack of authorization (git-fixes).\n- scsi: storvsc: Add ability to change scsi queue depth (bsc#1155021).\n- scsi: storvsc: setup 1:1 mapping between hardware queue and CPU queue (bsc#1140729).\n- scsi: zfcp: fix reaction on bit error threshold notification (bsc#1154956 LTC#182054).\n- sctp: Fix the link time qualifier of \u0027sctp_ctrlsock_exit()\u0027 (networking-stable-19_09_15).\n- sctp: use transport pf_retrans in sctp_do_8_2_transport_strike (networking-stable-19_09_15).\n- serial: fix kernel-doc warning in comments (bsc#1051510).\n- serial: mctrl_gpio: Check for NULL pointer (bsc#1051510).\n- serial: uartlite: fix exit path null pointer (bsc#1051510).\n- skge: fix checksum byte order (networking-stable-19_09_30).\n- sock_diag: fix autoloading of the raw_diag module (bsc#1152791).\n- sock_diag: request _diag module only when the family or proto has been registered (bsc#1152791).\n- staging: rtl8188eu: fix null dereference when kzalloc fails (bsc#1051510).\n- staging: vt6655: Fix memory leak in vt6655_probe (bsc#1051510).\n- staging: wlan-ng: fix exit return when sme-\u003ekey_idx \u003e= NUM_WEPKEYS (bsc#1051510).\n- supporte.conf: add efivarfs to kernel-default-base (bsc#1154858).\n- tcp: Do not dequeue SYN/FIN-segments from write-queue (git-gixes).\n- tcp: fix tcp_ecn_withdraw_cwr() to clear TCP_ECN_QUEUE_CWR (networking-stable-19_09_15).\n- tcp: inherit timestamp on mtu probe (networking-stable-19_09_05).\n- tcp: remove empty skb from write queue in error cases (networking-stable-19_09_05).\n- thermal: Fix use-after-free when unregistering thermal zone device (bsc#1051510).\n- thermal_hwmon: Sanitize thermal_zone type (bsc#1051510).\n- tipc: add NULL pointer check before calling kfree_rcu (networking-stable-19_09_15).\n- tipc: fix unlimited bundling of small messages (networking-stable-19_10_05).\n- tracing: Get trace_array reference for available_tracers files (bsc#1156429).\n- tracing: Initialize iter-\u003eseq after zeroing in tracing_read_pipe() (bsc#1151508).\n- tun: fix use-after-free when register netdev failed (networking-stable-19_09_15).\n- tuntap: correctly set SOCKWQ_ASYNC_NOSPACE (bsc#1145099).\n- tuntap: correctly set SOCKWQ_ASYNC_NOSPACE (bsc#1145099).\n- UAS: Revert commit 3ae62a42090f (\u0027UAS: fix alignment of scatter/gather segments\u0027).\n- USB: adutux: fix NULL-derefs on disconnect (bsc#1142635).\n- USB: adutux: fix use-after-free on disconnect (bsc#1142635).\n- USB: adutux: fix use-after-free on release (bsc#1051510).\n- USB: chaoskey: fix use-after-free on release (bsc#1051510).\n- USB: dummy-hcd: fix power budget for SuperSpeed mode (bsc#1051510).\n- USB: gadget: Reject endpoints with 0 maxpacket value (bsc#1051510).\n- USB: gadget: udc: atmel: Fix interrupt storm in FIFO mode (bsc#1051510).\n- USB: handle warm-reset port requests on hub resume (bsc#1051510).\n- USB: iowarrior: fix use-after-free after driver unbind (bsc#1051510).\n- USB: iowarrior: fix use-after-free on disconnect (bsc#1051510).\n- USB: iowarrior: fix use-after-free on release (bsc#1051510).\n- USBIP: add config dependency for SGL_ALLOC (git-fixes).\n- USBIP: Fix free of unallocated memory in vhci tx (git-fixes).\n- USBIP: Fix vhci_urb_enqueue() URB null transfer buffer error path (git-fixes).\n- USBIP: Implement SG support to vhci-hcd and stub driver (git-fixes).\n- USB: ldusb: fix control-message timeout (bsc#1051510).\n- USB: ldusb: fix memleak on disconnect (bsc#1051510).\n- USB: ldusb: fix NULL-derefs on driver unbind (bsc#1051510).\n- USB: ldusb: fix read info leaks (bsc#1051510).\n- USB: ldusb: fix ring-buffer locking (bsc#1051510).\n- USB: legousbtower: fix a signedness bug in tower_probe() (bsc#1051510).\n- USB: legousbtower: fix deadlock on disconnect (bsc#1142635).\n- USB: legousbtower: fix memleak on disconnect (bsc#1051510).\n- USB: legousbtower: fix open after failed reset request (bsc#1142635).\n- USB: legousbtower: fix potential NULL-deref on disconnect (bsc#1142635).\n- USB: legousbtower: fix slab info leak at probe (bsc#1142635).\n- USB: legousbtower: fix use-after-free on release (bsc#1051510).\n- USB: microtek: fix info-leak at probe (bsc#1142635).\n- usbnet: ignore endpoints with invalid wMaxPacketSize (bsc#1051510).\n- usbnet: sanity checking of packet sizes and device mtu (bsc#1051510).\n- USB: serial: fix runtime PM after driver unbind (bsc#1051510).\n- USB: serial: ftdi_sio: add device IDs for Sienna and Echelon PL-20 (bsc#1051510).\n- USB: serial: keyspan: fix NULL-derefs on open() and write() (bsc#1051510).\n- USB: serial: option: add support for Cinterion CLS8 devices (bsc#1051510).\n- USB: serial: option: add Telit FN980 compositions (bsc#1051510).\n- USB: serial: ti_usb_3410_5052: fix port-close races (bsc#1051510).\n- USB: serial: whiteheat: fix line-speed endianness (bsc#1051510).\n- USB: serial: whiteheat: fix potential slab corruption (bsc#1051510).\n- usb-storage: Revert commit 747668dbc061 (\u0027usb-storage: Set virt_boundary_mask to avoid SG overflows\u0027) (bsc#1051510).\n- USB: udc: lpc32xx: fix bad bit shift operation (bsc#1051510).\n- USB: usblcd: fix I/O after disconnect (bsc#1142635).\n- USB: usblp: fix runtime PM after driver unbind (bsc#1051510).\n- USB: usblp: fix use-after-free on disconnect (bsc#1051510).\n- USB: usb-skeleton: fix NULL-deref on disconnect (bsc#1051510).\n- USB: usb-skeleton: fix runtime PM after driver unbind (bsc#1051510).\n- USB: usb-skeleton: fix use-after-free after driver unbind (bsc#1051510).\n- USB: xhci: wait for CNR controller not ready bit in xhci resume (bsc#1051510).\n- USB: yurex: Do not retry on unexpected errors (bsc#1051510).\n- USB: yurex: fix NULL-derefs on disconnect (bsc#1051510).\n- vfio_pci: Restore original state on release (bsc#1051510).\n- vhost_net: conditionally enable tx polling (bsc#1145099).\n- vhost_net: conditionally enable tx polling (bsc#1145099).\n- video: of: display_timing: Add of_node_put() in of_get_display_timing() (bsc#1051510).\n- vsock: Fix a lockdep warning in __vsock_release() (networking-stable-19_10_05).\n- watchdog: imx2_wdt: fix min() calculation in imx2_wdt_set_timeout (bsc#1051510).\n- x86/asm: Fix MWAITX C-state hint value (bsc#1114279).\n- x86/boot/64: Make level2_kernel_pgt pages invalid outside kernel area (bnc#1153969).\n- x86/boot/64: Round memory hole size up to next PMD page (bnc#1153969).\n- x86/mm: Use WRITE_ONCE() when setting PTEs (bsc#1114279).\n- xen/netback: fix error path of xenvif_connect_data() (bsc#1065600).\n- xen-netfront: do not use ~0U as error return value for xennet_fill_frags() (bsc#1065600).\n- xen/pv: Fix Xen PV guest int3 handling (bsc#1153811).\n- xen/xenbus: fix self-deadlock after killing user process (bsc#1065600).\n- xfrm: fix sa selector validation (bsc#1156609).\n- xfrm: Fix xfrm sel prefix length validation (git-fixes).\n- xhci: Check all endpoints for LPM timeout (bsc#1051510).\n- xhci: Fix false warning message about wrong bounce buffer write length (bsc#1051510).\n- xhci: Increase STS_SAVE timeout in xhci_suspend() (bsc#1051510).\n- xhci: Prevent device initiated U1/U2 link pm if exit latency is too long (bsc#1051510).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2019-3294,SUSE-SLE-RT-12-SP4-2019-3294",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_3294-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2019:3294-1",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20193294-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2019:3294-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2019-December/006256.html"
},
{
"category": "self",
"summary": "SUSE Bug 1046299",
"url": "https://bugzilla.suse.com/1046299"
},
{
"category": "self",
"summary": "SUSE Bug 1046303",
"url": "https://bugzilla.suse.com/1046303"
},
{
"category": "self",
"summary": "SUSE Bug 1046305",
"url": "https://bugzilla.suse.com/1046305"
},
{
"category": "self",
"summary": "SUSE Bug 1048942",
"url": "https://bugzilla.suse.com/1048942"
},
{
"category": "self",
"summary": "SUSE Bug 1050244",
"url": "https://bugzilla.suse.com/1050244"
},
{
"category": "self",
"summary": "SUSE Bug 1050536",
"url": "https://bugzilla.suse.com/1050536"
},
{
"category": "self",
"summary": "SUSE Bug 1050545",
"url": "https://bugzilla.suse.com/1050545"
},
{
"category": "self",
"summary": "SUSE Bug 1051510",
"url": "https://bugzilla.suse.com/1051510"
},
{
"category": "self",
"summary": "SUSE Bug 1055186",
"url": "https://bugzilla.suse.com/1055186"
},
{
"category": "self",
"summary": "SUSE Bug 1061840",
"url": "https://bugzilla.suse.com/1061840"
},
{
"category": "self",
"summary": "SUSE Bug 1064802",
"url": "https://bugzilla.suse.com/1064802"
},
{
"category": "self",
"summary": "SUSE Bug 1065600",
"url": "https://bugzilla.suse.com/1065600"
},
{
"category": "self",
"summary": "SUSE Bug 1066129",
"url": "https://bugzilla.suse.com/1066129"
},
{
"category": "self",
"summary": "SUSE Bug 1073513",
"url": "https://bugzilla.suse.com/1073513"
},
{
"category": "self",
"summary": "SUSE Bug 1082635",
"url": "https://bugzilla.suse.com/1082635"
},
{
"category": "self",
"summary": "SUSE Bug 1083647",
"url": "https://bugzilla.suse.com/1083647"
},
{
"category": "self",
"summary": "SUSE Bug 1086323",
"url": "https://bugzilla.suse.com/1086323"
},
{
"category": "self",
"summary": "SUSE Bug 1087092",
"url": "https://bugzilla.suse.com/1087092"
},
{
"category": "self",
"summary": "SUSE Bug 1089644",
"url": "https://bugzilla.suse.com/1089644"
},
{
"category": "self",
"summary": "SUSE Bug 1090631",
"url": "https://bugzilla.suse.com/1090631"
},
{
"category": "self",
"summary": "SUSE Bug 1091041",
"url": "https://bugzilla.suse.com/1091041"
},
{
"category": "self",
"summary": "SUSE Bug 1093205",
"url": "https://bugzilla.suse.com/1093205"
},
{
"category": "self",
"summary": "SUSE Bug 1096254",
"url": "https://bugzilla.suse.com/1096254"
},
{
"category": "self",
"summary": "SUSE Bug 1097583",
"url": "https://bugzilla.suse.com/1097583"
},
{
"category": "self",
"summary": "SUSE Bug 1097584",
"url": "https://bugzilla.suse.com/1097584"
},
{
"category": "self",
"summary": "SUSE Bug 1097585",
"url": "https://bugzilla.suse.com/1097585"
},
{
"category": "self",
"summary": "SUSE Bug 1097586",
"url": "https://bugzilla.suse.com/1097586"
},
{
"category": "self",
"summary": "SUSE Bug 1097587",
"url": "https://bugzilla.suse.com/1097587"
},
{
"category": "self",
"summary": "SUSE Bug 1097588",
"url": "https://bugzilla.suse.com/1097588"
},
{
"category": "self",
"summary": "SUSE Bug 1098291",
"url": "https://bugzilla.suse.com/1098291"
},
{
"category": "self",
"summary": "SUSE Bug 1101674",
"url": "https://bugzilla.suse.com/1101674"
},
{
"category": "self",
"summary": "SUSE Bug 1109158",
"url": "https://bugzilla.suse.com/1109158"
},
{
"category": "self",
"summary": "SUSE Bug 1114279",
"url": "https://bugzilla.suse.com/1114279"
},
{
"category": "self",
"summary": "SUSE Bug 1117665",
"url": "https://bugzilla.suse.com/1117665"
},
{
"category": "self",
"summary": "SUSE Bug 1119461",
"url": "https://bugzilla.suse.com/1119461"
},
{
"category": "self",
"summary": "SUSE Bug 1119465",
"url": "https://bugzilla.suse.com/1119465"
},
{
"category": "self",
"summary": "SUSE Bug 1122363",
"url": "https://bugzilla.suse.com/1122363"
},
{
"category": "self",
"summary": "SUSE Bug 1123034",
"url": "https://bugzilla.suse.com/1123034"
},
{
"category": "self",
"summary": "SUSE Bug 1123080",
"url": "https://bugzilla.suse.com/1123080"
},
{
"category": "self",
"summary": "SUSE Bug 1127155",
"url": "https://bugzilla.suse.com/1127155"
},
{
"category": "self",
"summary": "SUSE Bug 1131107",
"url": "https://bugzilla.suse.com/1131107"
},
{
"category": "self",
"summary": "SUSE Bug 1133140",
"url": "https://bugzilla.suse.com/1133140"
},
{
"category": "self",
"summary": "SUSE Bug 1134303",
"url": "https://bugzilla.suse.com/1134303"
},
{
"category": "self",
"summary": "SUSE Bug 1135642",
"url": "https://bugzilla.suse.com/1135642"
},
{
"category": "self",
"summary": "SUSE Bug 1135854",
"url": "https://bugzilla.suse.com/1135854"
},
{
"category": "self",
"summary": "SUSE Bug 1135873",
"url": "https://bugzilla.suse.com/1135873"
},
{
"category": "self",
"summary": "SUSE Bug 1135966",
"url": "https://bugzilla.suse.com/1135966"
},
{
"category": "self",
"summary": "SUSE Bug 1135967",
"url": "https://bugzilla.suse.com/1135967"
},
{
"category": "self",
"summary": "SUSE Bug 1137040",
"url": "https://bugzilla.suse.com/1137040"
},
{
"category": "self",
"summary": "SUSE Bug 1137799",
"url": "https://bugzilla.suse.com/1137799"
},
{
"category": "self",
"summary": "SUSE Bug 1137861",
"url": "https://bugzilla.suse.com/1137861"
},
{
"category": "self",
"summary": "SUSE Bug 1138190",
"url": "https://bugzilla.suse.com/1138190"
},
{
"category": "self",
"summary": "SUSE Bug 1139073",
"url": "https://bugzilla.suse.com/1139073"
},
{
"category": "self",
"summary": "SUSE Bug 1140090",
"url": "https://bugzilla.suse.com/1140090"
},
{
"category": "self",
"summary": "SUSE Bug 1140729",
"url": "https://bugzilla.suse.com/1140729"
},
{
"category": "self",
"summary": "SUSE Bug 1140845",
"url": "https://bugzilla.suse.com/1140845"
},
{
"category": "self",
"summary": "SUSE Bug 1140883",
"url": "https://bugzilla.suse.com/1140883"
},
{
"category": "self",
"summary": "SUSE Bug 1141600",
"url": "https://bugzilla.suse.com/1141600"
},
{
"category": "self",
"summary": "SUSE Bug 1142635",
"url": "https://bugzilla.suse.com/1142635"
},
{
"category": "self",
"summary": "SUSE Bug 1142667",
"url": "https://bugzilla.suse.com/1142667"
},
{
"category": "self",
"summary": "SUSE Bug 1143706",
"url": "https://bugzilla.suse.com/1143706"
},
{
"category": "self",
"summary": "SUSE Bug 1144338",
"url": "https://bugzilla.suse.com/1144338"
},
{
"category": "self",
"summary": "SUSE Bug 1144375",
"url": "https://bugzilla.suse.com/1144375"
},
{
"category": "self",
"summary": "SUSE Bug 1144449",
"url": "https://bugzilla.suse.com/1144449"
},
{
"category": "self",
"summary": "SUSE Bug 1144903",
"url": "https://bugzilla.suse.com/1144903"
},
{
"category": "self",
"summary": "SUSE Bug 1145099",
"url": "https://bugzilla.suse.com/1145099"
},
{
"category": "self",
"summary": "SUSE Bug 1146612",
"url": "https://bugzilla.suse.com/1146612"
},
{
"category": "self",
"summary": "SUSE Bug 1148410",
"url": "https://bugzilla.suse.com/1148410"
},
{
"category": "self",
"summary": "SUSE Bug 1149119",
"url": "https://bugzilla.suse.com/1149119"
},
{
"category": "self",
"summary": "SUSE Bug 1149448",
"url": "https://bugzilla.suse.com/1149448"
},
{
"category": "self",
"summary": "SUSE Bug 1150452",
"url": "https://bugzilla.suse.com/1150452"
},
{
"category": "self",
"summary": "SUSE Bug 1150457",
"url": "https://bugzilla.suse.com/1150457"
},
{
"category": "self",
"summary": "SUSE Bug 1150465",
"url": "https://bugzilla.suse.com/1150465"
},
{
"category": "self",
"summary": "SUSE Bug 1150466",
"url": "https://bugzilla.suse.com/1150466"
},
{
"category": "self",
"summary": "SUSE Bug 1150875",
"url": "https://bugzilla.suse.com/1150875"
},
{
"category": "self",
"summary": "SUSE Bug 1151225",
"url": "https://bugzilla.suse.com/1151225"
},
{
"category": "self",
"summary": "SUSE Bug 1151508",
"url": "https://bugzilla.suse.com/1151508"
},
{
"category": "self",
"summary": "SUSE Bug 1151680",
"url": "https://bugzilla.suse.com/1151680"
},
{
"category": "self",
"summary": "SUSE Bug 1152497",
"url": "https://bugzilla.suse.com/1152497"
},
{
"category": "self",
"summary": "SUSE Bug 1152505",
"url": "https://bugzilla.suse.com/1152505"
},
{
"category": "self",
"summary": "SUSE Bug 1152506",
"url": "https://bugzilla.suse.com/1152506"
},
{
"category": "self",
"summary": "SUSE Bug 1152624",
"url": "https://bugzilla.suse.com/1152624"
},
{
"category": "self",
"summary": "SUSE Bug 1152685",
"url": "https://bugzilla.suse.com/1152685"
},
{
"category": "self",
"summary": "SUSE Bug 1152782",
"url": "https://bugzilla.suse.com/1152782"
},
{
"category": "self",
"summary": "SUSE Bug 1152788",
"url": "https://bugzilla.suse.com/1152788"
},
{
"category": "self",
"summary": "SUSE Bug 1152791",
"url": "https://bugzilla.suse.com/1152791"
},
{
"category": "self",
"summary": "SUSE Bug 1153112",
"url": "https://bugzilla.suse.com/1153112"
},
{
"category": "self",
"summary": "SUSE Bug 1153158",
"url": "https://bugzilla.suse.com/1153158"
},
{
"category": "self",
"summary": "SUSE Bug 1153236",
"url": "https://bugzilla.suse.com/1153236"
},
{
"category": "self",
"summary": "SUSE Bug 1153263",
"url": "https://bugzilla.suse.com/1153263"
},
{
"category": "self",
"summary": "SUSE Bug 1153476",
"url": "https://bugzilla.suse.com/1153476"
},
{
"category": "self",
"summary": "SUSE Bug 1153509",
"url": "https://bugzilla.suse.com/1153509"
},
{
"category": "self",
"summary": "SUSE Bug 1153628",
"url": "https://bugzilla.suse.com/1153628"
},
{
"category": "self",
"summary": "SUSE Bug 1153646",
"url": "https://bugzilla.suse.com/1153646"
},
{
"category": "self",
"summary": "SUSE Bug 1153681",
"url": "https://bugzilla.suse.com/1153681"
},
{
"category": "self",
"summary": "SUSE Bug 1153713",
"url": "https://bugzilla.suse.com/1153713"
},
{
"category": "self",
"summary": "SUSE Bug 1153717",
"url": "https://bugzilla.suse.com/1153717"
},
{
"category": "self",
"summary": "SUSE Bug 1153718",
"url": "https://bugzilla.suse.com/1153718"
},
{
"category": "self",
"summary": "SUSE Bug 1153719",
"url": "https://bugzilla.suse.com/1153719"
},
{
"category": "self",
"summary": "SUSE Bug 1153811",
"url": "https://bugzilla.suse.com/1153811"
},
{
"category": "self",
"summary": "SUSE Bug 1153969",
"url": "https://bugzilla.suse.com/1153969"
},
{
"category": "self",
"summary": "SUSE Bug 1154108",
"url": "https://bugzilla.suse.com/1154108"
},
{
"category": "self",
"summary": "SUSE Bug 1154124",
"url": "https://bugzilla.suse.com/1154124"
},
{
"category": "self",
"summary": "SUSE Bug 1154189",
"url": "https://bugzilla.suse.com/1154189"
},
{
"category": "self",
"summary": "SUSE Bug 1154354",
"url": "https://bugzilla.suse.com/1154354"
},
{
"category": "self",
"summary": "SUSE Bug 1154372",
"url": "https://bugzilla.suse.com/1154372"
},
{
"category": "self",
"summary": "SUSE Bug 1154526",
"url": "https://bugzilla.suse.com/1154526"
},
{
"category": "self",
"summary": "SUSE Bug 1154578",
"url": "https://bugzilla.suse.com/1154578"
},
{
"category": "self",
"summary": "SUSE Bug 1154607",
"url": "https://bugzilla.suse.com/1154607"
},
{
"category": "self",
"summary": "SUSE Bug 1154608",
"url": "https://bugzilla.suse.com/1154608"
},
{
"category": "self",
"summary": "SUSE Bug 1154610",
"url": "https://bugzilla.suse.com/1154610"
},
{
"category": "self",
"summary": "SUSE Bug 1154611",
"url": "https://bugzilla.suse.com/1154611"
},
{
"category": "self",
"summary": "SUSE Bug 1154651",
"url": "https://bugzilla.suse.com/1154651"
},
{
"category": "self",
"summary": "SUSE Bug 1154737",
"url": "https://bugzilla.suse.com/1154737"
},
{
"category": "self",
"summary": "SUSE Bug 1154747",
"url": "https://bugzilla.suse.com/1154747"
},
{
"category": "self",
"summary": "SUSE Bug 1154848",
"url": "https://bugzilla.suse.com/1154848"
},
{
"category": "self",
"summary": "SUSE Bug 1154858",
"url": "https://bugzilla.suse.com/1154858"
},
{
"category": "self",
"summary": "SUSE Bug 1154905",
"url": "https://bugzilla.suse.com/1154905"
},
{
"category": "self",
"summary": "SUSE Bug 1154956",
"url": "https://bugzilla.suse.com/1154956"
},
{
"category": "self",
"summary": "SUSE Bug 1154959",
"url": "https://bugzilla.suse.com/1154959"
},
{
"category": "self",
"summary": "SUSE Bug 1155021",
"url": "https://bugzilla.suse.com/1155021"
},
{
"category": "self",
"summary": "SUSE Bug 1155178",
"url": "https://bugzilla.suse.com/1155178"
},
{
"category": "self",
"summary": "SUSE Bug 1155179",
"url": "https://bugzilla.suse.com/1155179"
},
{
"category": "self",
"summary": "SUSE Bug 1155184",
"url": "https://bugzilla.suse.com/1155184"
},
{
"category": "self",
"summary": "SUSE Bug 1155186",
"url": "https://bugzilla.suse.com/1155186"
},
{
"category": "self",
"summary": "SUSE Bug 1155671",
"url": "https://bugzilla.suse.com/1155671"
},
{
"category": "self",
"summary": "SUSE Bug 1155692",
"url": "https://bugzilla.suse.com/1155692"
},
{
"category": "self",
"summary": "SUSE Bug 1155812",
"url": "https://bugzilla.suse.com/1155812"
},
{
"category": "self",
"summary": "SUSE Bug 1155817",
"url": "https://bugzilla.suse.com/1155817"
},
{
"category": "self",
"summary": "SUSE Bug 1155836",
"url": "https://bugzilla.suse.com/1155836"
},
{
"category": "self",
"summary": "SUSE Bug 1155945",
"url": "https://bugzilla.suse.com/1155945"
},
{
"category": "self",
"summary": "SUSE Bug 1155982",
"url": "https://bugzilla.suse.com/1155982"
},
{
"category": "self",
"summary": "SUSE Bug 1156187",
"url": "https://bugzilla.suse.com/1156187"
},
{
"category": "self",
"summary": "SUSE Bug 1156429",
"url": "https://bugzilla.suse.com/1156429"
},
{
"category": "self",
"summary": "SUSE Bug 1156466",
"url": "https://bugzilla.suse.com/1156466"
},
{
"category": "self",
"summary": "SUSE Bug 1156494",
"url": "https://bugzilla.suse.com/1156494"
},
{
"category": "self",
"summary": "SUSE Bug 1156609",
"url": "https://bugzilla.suse.com/1156609"
},
{
"category": "self",
"summary": "SUSE Bug 1156700",
"url": "https://bugzilla.suse.com/1156700"
},
{
"category": "self",
"summary": "SUSE Bug 1156729",
"url": "https://bugzilla.suse.com/1156729"
},
{
"category": "self",
"summary": "SUSE Bug 1156882",
"url": "https://bugzilla.suse.com/1156882"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-12207 page",
"url": "https://www.suse.com/security/cve/CVE-2018-12207/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-0154 page",
"url": "https://www.suse.com/security/cve/CVE-2019-0154/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-0155 page",
"url": "https://www.suse.com/security/cve/CVE-2019-0155/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-10220 page",
"url": "https://www.suse.com/security/cve/CVE-2019-10220/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11135 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11135/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15916 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15916/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-16231 page",
"url": "https://www.suse.com/security/cve/CVE-2019-16231/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-16232 page",
"url": "https://www.suse.com/security/cve/CVE-2019-16232/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-16233 page",
"url": "https://www.suse.com/security/cve/CVE-2019-16233/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-16234 page",
"url": "https://www.suse.com/security/cve/CVE-2019-16234/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-16995 page",
"url": "https://www.suse.com/security/cve/CVE-2019-16995/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-17055 page",
"url": "https://www.suse.com/security/cve/CVE-2019-17055/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-17056 page",
"url": "https://www.suse.com/security/cve/CVE-2019-17056/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-17133 page",
"url": "https://www.suse.com/security/cve/CVE-2019-17133/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-17666 page",
"url": "https://www.suse.com/security/cve/CVE-2019-17666/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-18805 page",
"url": "https://www.suse.com/security/cve/CVE-2019-18805/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2019-12-13T17:29:22Z",
"generator": {
"date": "2019-12-13T17:29:22Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2019:3294-1",
"initial_release_date": "2019-12-13T17:29:22Z",
"revision_history": [
{
"date": "2019-12-13T17:29:22Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-rt-4.12.14-8.9.3.noarch",
"product": {
"name": "kernel-devel-rt-4.12.14-8.9.3.noarch",
"product_id": "kernel-devel-rt-4.12.14-8.9.3.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-rt-4.12.14-8.9.3.noarch",
"product": {
"name": "kernel-source-rt-4.12.14-8.9.3.noarch",
"product_id": "kernel-source-rt-4.12.14-8.9.3.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-rt-4.12.14-8.9.3.x86_64",
"product": {
"name": "cluster-md-kmp-rt-4.12.14-8.9.3.x86_64",
"product_id": "cluster-md-kmp-rt-4.12.14-8.9.3.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-rt-4.12.14-8.9.3.x86_64",
"product": {
"name": "dlm-kmp-rt-4.12.14-8.9.3.x86_64",
"product_id": "dlm-kmp-rt-4.12.14-8.9.3.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-rt-4.12.14-8.9.3.x86_64",
"product": {
"name": "gfs2-kmp-rt-4.12.14-8.9.3.x86_64",
"product_id": "gfs2-kmp-rt-4.12.14-8.9.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-4.12.14-8.9.3.x86_64",
"product": {
"name": "kernel-rt-4.12.14-8.9.3.x86_64",
"product_id": "kernel-rt-4.12.14-8.9.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-base-4.12.14-8.9.3.x86_64",
"product": {
"name": "kernel-rt-base-4.12.14-8.9.3.x86_64",
"product_id": "kernel-rt-base-4.12.14-8.9.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-4.12.14-8.9.3.x86_64",
"product": {
"name": "kernel-rt-devel-4.12.14-8.9.3.x86_64",
"product_id": "kernel-rt-devel-4.12.14-8.9.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-devel-4.12.14-8.9.3.x86_64",
"product": {
"name": "kernel-rt_debug-devel-4.12.14-8.9.3.x86_64",
"product_id": "kernel-rt_debug-devel-4.12.14-8.9.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-rt-4.12.14-8.9.3.x86_64",
"product": {
"name": "kernel-syms-rt-4.12.14-8.9.3.x86_64",
"product_id": "kernel-syms-rt-4.12.14-8.9.3.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-rt-4.12.14-8.9.3.x86_64",
"product": {
"name": "ocfs2-kmp-rt-4.12.14-8.9.3.x86_64",
"product_id": "ocfs2-kmp-rt-4.12.14-8.9.3.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Real Time 12 SP4",
"product": {
"name": "SUSE Linux Enterprise Real Time 12 SP4",
"product_id": "SUSE Linux Enterprise Real Time 12 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-linux-enterprise-rt:12:sp4"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-rt-4.12.14-8.9.3.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP4",
"product_id": "SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.9.3.x86_64"
},
"product_reference": "cluster-md-kmp-rt-4.12.14-8.9.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-rt-4.12.14-8.9.3.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP4",
"product_id": "SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.9.3.x86_64"
},
"product_reference": "dlm-kmp-rt-4.12.14-8.9.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-rt-4.12.14-8.9.3.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP4",
"product_id": "SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.9.3.x86_64"
},
"product_reference": "gfs2-kmp-rt-4.12.14-8.9.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-rt-4.12.14-8.9.3.noarch as component of SUSE Linux Enterprise Real Time 12 SP4",
"product_id": "SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.9.3.noarch"
},
"product_reference": "kernel-devel-rt-4.12.14-8.9.3.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-4.12.14-8.9.3.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP4",
"product_id": "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.9.3.x86_64"
},
"product_reference": "kernel-rt-4.12.14-8.9.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-base-4.12.14-8.9.3.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP4",
"product_id": "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.9.3.x86_64"
},
"product_reference": "kernel-rt-base-4.12.14-8.9.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-4.12.14-8.9.3.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP4",
"product_id": "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.9.3.x86_64"
},
"product_reference": "kernel-rt-devel-4.12.14-8.9.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt_debug-devel-4.12.14-8.9.3.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP4",
"product_id": "SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.9.3.x86_64"
},
"product_reference": "kernel-rt_debug-devel-4.12.14-8.9.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-rt-4.12.14-8.9.3.noarch as component of SUSE Linux Enterprise Real Time 12 SP4",
"product_id": "SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.9.3.noarch"
},
"product_reference": "kernel-source-rt-4.12.14-8.9.3.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-rt-4.12.14-8.9.3.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP4",
"product_id": "SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.9.3.x86_64"
},
"product_reference": "kernel-syms-rt-4.12.14-8.9.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-rt-4.12.14-8.9.3.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP4",
"product_id": "SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.9.3.x86_64"
},
"product_reference": "ocfs2-kmp-rt-4.12.14-8.9.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-12207",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-12207"
}
],
"notes": [
{
"category": "general",
"text": "Improper invalidation for page table updates by a virtual guest operating system for multiple Intel(R) Processors may allow an authenticated user to potentially enable denial of service of the host system via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.9.3.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.9.3.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.9.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-12207",
"url": "https://www.suse.com/security/cve/CVE-2018-12207"
},
{
"category": "external",
"summary": "SUSE Bug 1117665 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1117665"
},
{
"category": "external",
"summary": "SUSE Bug 1139073 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1139073"
},
{
"category": "external",
"summary": "SUSE Bug 1152505 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1152505"
},
{
"category": "external",
"summary": "SUSE Bug 1155812 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1155812"
},
{
"category": "external",
"summary": "SUSE Bug 1155817 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1155817"
},
{
"category": "external",
"summary": "SUSE Bug 1155945 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1155945"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1201877"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.9.3.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.9.3.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.9.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.9.3.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.9.3.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.9.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-12-13T17:29:22Z",
"details": "moderate"
}
],
"title": "CVE-2018-12207"
},
{
"cve": "CVE-2019-0154",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-0154"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient access control in subsystem for Intel (R) processor graphics in 6th, 7th, 8th and 9th Generation Intel(R) Core(TM) Processor Families; Intel(R) Pentium(R) Processor J, N, Silver and Gold Series; Intel(R) Celeron(R) Processor J, N, G3900 and G4900 Series; Intel(R) Atom(R) Processor A and E3900 Series; Intel(R) Xeon(R) Processor E3-1500 v5 and v6 and E-2100 Processor Families may allow an authenticated user to potentially enable denial of service via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.9.3.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.9.3.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.9.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-0154",
"url": "https://www.suse.com/security/cve/CVE-2019-0154"
},
{
"category": "external",
"summary": "SUSE Bug 1135966 for CVE-2019-0154",
"url": "https://bugzilla.suse.com/1135966"
},
{
"category": "external",
"summary": "SUSE Bug 1181720 for CVE-2019-0154",
"url": "https://bugzilla.suse.com/1181720"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.9.3.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.9.3.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.9.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.9.3.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.9.3.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.9.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-12-13T17:29:22Z",
"details": "important"
}
],
"title": "CVE-2019-0154"
},
{
"cve": "CVE-2019-0155",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-0155"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient access control in a subsystem for Intel (R) processor graphics in 6th, 7th, 8th and 9th Generation Intel(R) Core(TM) Processor Families; Intel(R) Pentium(R) Processor J, N, Silver and Gold Series; Intel(R) Celeron(R) Processor J, N, G3900 and G4900 Series; Intel(R) Atom(R) Processor A and E3900 Series; Intel(R) Xeon(R) Processor E3-1500 v5 and v6, E-2100 and E-2200 Processor Families; Intel(R) Graphics Driver for Windows before 26.20.100.6813 (DCH) or 26.20.100.6812 and before 21.20.x.5077 (aka15.45.5077), i915 Linux Driver for Intel(R) Processor Graphics before versions 5.4-rc7, 5.3.11, 4.19.84, 4.14.154, 4.9.201, 4.4.201 may allow an authenticated user to potentially enable escalation of privilege via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.9.3.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.9.3.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.9.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-0155",
"url": "https://www.suse.com/security/cve/CVE-2019-0155"
},
{
"category": "external",
"summary": "SUSE Bug 1135966 for CVE-2019-0155",
"url": "https://bugzilla.suse.com/1135966"
},
{
"category": "external",
"summary": "SUSE Bug 1135967 for CVE-2019-0155",
"url": "https://bugzilla.suse.com/1135967"
},
{
"category": "external",
"summary": "SUSE Bug 1173663 for CVE-2019-0155",
"url": "https://bugzilla.suse.com/1173663"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.9.3.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.9.3.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.9.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.9.3.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.9.3.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.9.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-12-13T17:29:22Z",
"details": "important"
}
],
"title": "CVE-2019-0155"
},
{
"cve": "CVE-2019-10220",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-10220"
}
],
"notes": [
{
"category": "general",
"text": "Linux kernel CIFS implementation, version 4.9.0 is vulnerable to a relative paths injection in directory entry lists.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.9.3.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.9.3.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.9.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-10220",
"url": "https://www.suse.com/security/cve/CVE-2019-10220"
},
{
"category": "external",
"summary": "SUSE Bug 1144903 for CVE-2019-10220",
"url": "https://bugzilla.suse.com/1144903"
},
{
"category": "external",
"summary": "SUSE Bug 1153108 for CVE-2019-10220",
"url": "https://bugzilla.suse.com/1153108"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.9.3.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.9.3.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.9.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.9.3.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.9.3.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.9.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-12-13T17:29:22Z",
"details": "important"
}
],
"title": "CVE-2019-10220"
},
{
"cve": "CVE-2019-11135",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11135"
}
],
"notes": [
{
"category": "general",
"text": "TSX Asynchronous Abort condition on some CPUs utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.9.3.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.9.3.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.9.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11135",
"url": "https://www.suse.com/security/cve/CVE-2019-11135"
},
{
"category": "external",
"summary": "SUSE Bug 1139073 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1139073"
},
{
"category": "external",
"summary": "SUSE Bug 1152497 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1152497"
},
{
"category": "external",
"summary": "SUSE Bug 1152505 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1152505"
},
{
"category": "external",
"summary": "SUSE Bug 1152506 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1152506"
},
{
"category": "external",
"summary": "SUSE Bug 1160120 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1160120"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1201877"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.9.3.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.9.3.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.9.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.9.3.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.9.3.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.9.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-12-13T17:29:22Z",
"details": "moderate"
}
],
"title": "CVE-2019-11135"
},
{
"cve": "CVE-2019-15916",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15916"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.0.1. There is a memory leak in register_queue_kobjects() in net/core/net-sysfs.c, which will cause denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.9.3.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.9.3.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.9.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15916",
"url": "https://www.suse.com/security/cve/CVE-2019-15916"
},
{
"category": "external",
"summary": "SUSE Bug 1149448 for CVE-2019-15916",
"url": "https://bugzilla.suse.com/1149448"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.9.3.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.9.3.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.9.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.9.3.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.9.3.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.9.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-12-13T17:29:22Z",
"details": "low"
}
],
"title": "CVE-2019-15916"
},
{
"cve": "CVE-2019-16231",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-16231"
}
],
"notes": [
{
"category": "general",
"text": "drivers/net/fjes/fjes_main.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.9.3.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.9.3.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.9.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-16231",
"url": "https://www.suse.com/security/cve/CVE-2019-16231"
},
{
"category": "external",
"summary": "SUSE Bug 1150466 for CVE-2019-16231",
"url": "https://bugzilla.suse.com/1150466"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.9.3.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.9.3.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.9.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.9.3.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.9.3.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.9.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-12-13T17:29:22Z",
"details": "low"
}
],
"title": "CVE-2019-16231"
},
{
"cve": "CVE-2019-16232",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-16232"
}
],
"notes": [
{
"category": "general",
"text": "drivers/net/wireless/marvell/libertas/if_sdio.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.9.3.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.9.3.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.9.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-16232",
"url": "https://www.suse.com/security/cve/CVE-2019-16232"
},
{
"category": "external",
"summary": "SUSE Bug 1150465 for CVE-2019-16232",
"url": "https://bugzilla.suse.com/1150465"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.9.3.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.9.3.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.9.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.9.3.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.9.3.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.9.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-12-13T17:29:22Z",
"details": "low"
}
],
"title": "CVE-2019-16232"
},
{
"cve": "CVE-2019-16233",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-16233"
}
],
"notes": [
{
"category": "general",
"text": "drivers/scsi/qla2xxx/qla_os.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.9.3.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.9.3.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.9.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-16233",
"url": "https://www.suse.com/security/cve/CVE-2019-16233"
},
{
"category": "external",
"summary": "SUSE Bug 1150457 for CVE-2019-16233",
"url": "https://bugzilla.suse.com/1150457"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.9.3.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.9.3.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.9.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.9.3.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.9.3.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.9.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-12-13T17:29:22Z",
"details": "low"
}
],
"title": "CVE-2019-16233"
},
{
"cve": "CVE-2019-16234",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-16234"
}
],
"notes": [
{
"category": "general",
"text": "drivers/net/wireless/intel/iwlwifi/pcie/trans.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.9.3.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.9.3.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.9.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-16234",
"url": "https://www.suse.com/security/cve/CVE-2019-16234"
},
{
"category": "external",
"summary": "SUSE Bug 1150452 for CVE-2019-16234",
"url": "https://bugzilla.suse.com/1150452"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.9.3.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.9.3.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.9.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.9.3.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.9.3.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.9.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-12-13T17:29:22Z",
"details": "low"
}
],
"title": "CVE-2019-16234"
},
{
"cve": "CVE-2019-16995",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-16995"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel before 5.0.3, a memory leak exits in hsr_dev_finalize() in net/hsr/hsr_device.c if hsr_add_port fails to add a port, which may cause denial of service, aka CID-6caabe7f197d.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.9.3.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.9.3.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.9.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-16995",
"url": "https://www.suse.com/security/cve/CVE-2019-16995"
},
{
"category": "external",
"summary": "SUSE Bug 1152685 for CVE-2019-16995",
"url": "https://bugzilla.suse.com/1152685"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.9.3.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.9.3.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.9.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.9.3.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.9.3.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.9.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-12-13T17:29:22Z",
"details": "moderate"
}
],
"title": "CVE-2019-16995"
},
{
"cve": "CVE-2019-17055",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-17055"
}
],
"notes": [
{
"category": "general",
"text": "base_sock_create in drivers/isdn/mISDN/socket.c in the AF_ISDN network module in the Linux kernel through 5.3.2 does not enforce CAP_NET_RAW, which means that unprivileged users can create a raw socket, aka CID-b91ee4aa2a21.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.9.3.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.9.3.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.9.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-17055",
"url": "https://www.suse.com/security/cve/CVE-2019-17055"
},
{
"category": "external",
"summary": "SUSE Bug 1152782 for CVE-2019-17055",
"url": "https://bugzilla.suse.com/1152782"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.9.3.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.9.3.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.9.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.9.3.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.9.3.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.9.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-12-13T17:29:22Z",
"details": "low"
}
],
"title": "CVE-2019-17055"
},
{
"cve": "CVE-2019-17056",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-17056"
}
],
"notes": [
{
"category": "general",
"text": "llcp_sock_create in net/nfc/llcp_sock.c in the AF_NFC network module in the Linux kernel through 5.3.2 does not enforce CAP_NET_RAW, which means that unprivileged users can create a raw socket, aka CID-3a359798b176.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.9.3.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.9.3.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.9.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-17056",
"url": "https://www.suse.com/security/cve/CVE-2019-17056"
},
{
"category": "external",
"summary": "SUSE Bug 1152788 for CVE-2019-17056",
"url": "https://bugzilla.suse.com/1152788"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.9.3.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.9.3.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.9.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.9.3.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.9.3.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.9.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-12-13T17:29:22Z",
"details": "moderate"
}
],
"title": "CVE-2019-17056"
},
{
"cve": "CVE-2019-17133",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-17133"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel through 5.3.2, cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c does not reject a long SSID IE, leading to a Buffer Overflow.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.9.3.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.9.3.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.9.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-17133",
"url": "https://www.suse.com/security/cve/CVE-2019-17133"
},
{
"category": "external",
"summary": "SUSE Bug 1153158 for CVE-2019-17133",
"url": "https://bugzilla.suse.com/1153158"
},
{
"category": "external",
"summary": "SUSE Bug 1153161 for CVE-2019-17133",
"url": "https://bugzilla.suse.com/1153161"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.9.3.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.9.3.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.9.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.9.3.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.9.3.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.9.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-12-13T17:29:22Z",
"details": "important"
}
],
"title": "CVE-2019-17133"
},
{
"cve": "CVE-2019-17666",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-17666"
}
],
"notes": [
{
"category": "general",
"text": "rtl_p2p_noa_ie in drivers/net/wireless/realtek/rtlwifi/ps.c in the Linux kernel through 5.3.6 lacks a certain upper-bound check, leading to a buffer overflow.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.9.3.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.9.3.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.9.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-17666",
"url": "https://www.suse.com/security/cve/CVE-2019-17666"
},
{
"category": "external",
"summary": "SUSE Bug 1154372 for CVE-2019-17666",
"url": "https://bugzilla.suse.com/1154372"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.9.3.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.9.3.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.9.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.9.3.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.9.3.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.9.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-12-13T17:29:22Z",
"details": "moderate"
}
],
"title": "CVE-2019-17666"
},
{
"cve": "CVE-2019-18805",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-18805"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in net/ipv4/sysctl_net_ipv4.c in the Linux kernel before 5.0.11. There is a net/ipv4/tcp_input.c signed integer overflow in tcp_ack_update_rtt() when userspace writes a very large integer to /proc/sys/net/ipv4/tcp_min_rtt_wlen, leading to a denial of service or possibly unspecified other impact, aka CID-19fad20d15a6.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.9.3.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.9.3.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.9.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-18805",
"url": "https://www.suse.com/security/cve/CVE-2019-18805"
},
{
"category": "external",
"summary": "SUSE Bug 1156187 for CVE-2019-18805",
"url": "https://bugzilla.suse.com/1156187"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.9.3.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.9.3.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.9.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP4:cluster-md-kmp-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:dlm-kmp-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:gfs2-kmp-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-devel-rt-4.12.14-8.9.3.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-base-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt-devel-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-rt_debug-devel-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-source-rt-4.12.14-8.9.3.noarch",
"SUSE Linux Enterprise Real Time 12 SP4:kernel-syms-rt-4.12.14-8.9.3.x86_64",
"SUSE Linux Enterprise Real Time 12 SP4:ocfs2-kmp-rt-4.12.14-8.9.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-12-13T17:29:22Z",
"details": "low"
}
],
"title": "CVE-2019-18805"
}
]
}
suse-su-2020:0388-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for xen",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for xen fixes the following issues:\n\n- CVE-2018-12207: Fixed a race condition where untrusted virtual machines could have been using the Instruction Fetch Unit of the Intel CPU to cause a Machine Exception during Page Size Change, causing the CPU core to be non-functional (bsc#1155945 XSA-304).\n- CVE-2018-19965: Fixed a DoS from attempting to use INVPCID with a non-canonical addresses (bsc#1115045 XSA-279).\n- CVE-2019-11135: Aborting an asynchronous TSX operation on Intel CPUs with Transactional Memory support could be used to facilitate side-channel information leaks out of microarchitectural buffers, similar to the previously described \u0027Microarchitectural Data Sampling\u0027 attack. (bsc#1152497 XSA-305).\n- CVE-2019-12067: Fixed a null pointer dereference in QEMU AHCI (bsc#1145652).\n- CVE-2019-12068: Fixed an infinite loop while executing script (bsc#1146874).\n- CVE-2019-12155: Fixed a null pointer dereference while releasing spice resources (bsc#1135905).\n- CVE-2019-14378: Fixed a heap buffer overflow during packet reassembly in slirp networking implementation (bsc#1143797).\n- CVE-2019-15890: Fixed a use-after-free during packet reassembly (bsc#1149813).\n- CVE-2019-17340: Fixed grant table transfer issues on large hosts (XSA-284 bsc#1126140).\n- CVE-2019-17341: Fixed a race with pass-through device hotplug (XSA-285 bsc#1126141).\n- CVE-2019-17342: Fixed steal_page violating page_struct access discipline (XSA-287 bsc#1126192).\n- CVE-2019-17343: Fixed an inconsistent PV IOMMU discipline (XSA-288 bsc#1126195).\n- CVE-2019-17344: Fixed a missing preemption in x86 PV page table unvalidation (XSA-290 bsc#1126196).\n- CVE-2019-17347: Fixed a PV kernel context switch corruption (XSA-293 bsc#1126201).\n- CVE-2019-18420: Fixed a hypervisor crash that could be caused by malicious x86 PV guests, resulting in a denial of service (bsc#1154448 XSA-296).\n- CVE-2019-18421: Fixed a privilege escalation through malicious PV guest administrators (bsc#1154458 XSA-299).\n- CVE-2019-18424: Fixed a privilege escalation through DMA to physical devices by untrusted domains (bsc#1154461 XSA-302). \n- CVE-2019-18425: Fixed a privilege escalation from 32-bit PV guest used mode (bsc#1154456 XSA-298).\n- CVE-2019-19577: Fixed an issue where a malicious guest administrator could have caused Xen to access data structures while they are being modified leading to a crash (bsc#1158007 XSA-311). \n- CVE-2019-19578: Fixed an issue where a malicious or buggy PV guest could have caused hypervisor crash resulting in denial of service affecting the entire host (bsc#1158005 XSA-309).\n- CVE-2019-19579: Fixed a privilege escalation where an untrusted domain with access to a physical device can DMA into host memory (bsc#1157888 XSA-306).\n- CVE-2019-19580: Fixed a privilege escalation where a malicious PV guest administrator could have been able to escalate their privilege to that of the host (bsc#1158006 XSA-310).\n- CVE-2019-19581: Fixed a potential out of bounds on 32-bit Arm (bsc#1158003 XSA-307).\n- CVE-2019-19583: Fixed improper checks which could have allowed HVM/PVH guest userspace code to crash the guest, leading to a guest denial of service (bsc#1158004 XSA-308).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2020-388,SUSE-SLE-SAP-12-SP1-2020-388,SUSE-SLE-SERVER-12-SP1-2020-388",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_0388-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2020:0388-1",
"url": "https://www.suse.com/support/update/announcement/2020/suse-su-20200388-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2020:0388-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2020-February/006485.html"
},
{
"category": "self",
"summary": "SUSE Bug 1115045",
"url": "https://bugzilla.suse.com/1115045"
},
{
"category": "self",
"summary": "SUSE Bug 1126140",
"url": "https://bugzilla.suse.com/1126140"
},
{
"category": "self",
"summary": "SUSE Bug 1126141",
"url": "https://bugzilla.suse.com/1126141"
},
{
"category": "self",
"summary": "SUSE Bug 1126192",
"url": "https://bugzilla.suse.com/1126192"
},
{
"category": "self",
"summary": "SUSE Bug 1126195",
"url": "https://bugzilla.suse.com/1126195"
},
{
"category": "self",
"summary": "SUSE Bug 1126196",
"url": "https://bugzilla.suse.com/1126196"
},
{
"category": "self",
"summary": "SUSE Bug 1126201",
"url": "https://bugzilla.suse.com/1126201"
},
{
"category": "self",
"summary": "SUSE Bug 1135905",
"url": "https://bugzilla.suse.com/1135905"
},
{
"category": "self",
"summary": "SUSE Bug 1143797",
"url": "https://bugzilla.suse.com/1143797"
},
{
"category": "self",
"summary": "SUSE Bug 1145652",
"url": "https://bugzilla.suse.com/1145652"
},
{
"category": "self",
"summary": "SUSE Bug 1146874",
"url": "https://bugzilla.suse.com/1146874"
},
{
"category": "self",
"summary": "SUSE Bug 1149813",
"url": "https://bugzilla.suse.com/1149813"
},
{
"category": "self",
"summary": "SUSE Bug 1152497",
"url": "https://bugzilla.suse.com/1152497"
},
{
"category": "self",
"summary": "SUSE Bug 1154448",
"url": "https://bugzilla.suse.com/1154448"
},
{
"category": "self",
"summary": "SUSE Bug 1154456",
"url": "https://bugzilla.suse.com/1154456"
},
{
"category": "self",
"summary": "SUSE Bug 1154458",
"url": "https://bugzilla.suse.com/1154458"
},
{
"category": "self",
"summary": "SUSE Bug 1154461",
"url": "https://bugzilla.suse.com/1154461"
},
{
"category": "self",
"summary": "SUSE Bug 1155945",
"url": "https://bugzilla.suse.com/1155945"
},
{
"category": "self",
"summary": "SUSE Bug 1157888",
"url": "https://bugzilla.suse.com/1157888"
},
{
"category": "self",
"summary": "SUSE Bug 1158003",
"url": "https://bugzilla.suse.com/1158003"
},
{
"category": "self",
"summary": "SUSE Bug 1158004",
"url": "https://bugzilla.suse.com/1158004"
},
{
"category": "self",
"summary": "SUSE Bug 1158005",
"url": "https://bugzilla.suse.com/1158005"
},
{
"category": "self",
"summary": "SUSE Bug 1158006",
"url": "https://bugzilla.suse.com/1158006"
},
{
"category": "self",
"summary": "SUSE Bug 1158007",
"url": "https://bugzilla.suse.com/1158007"
},
{
"category": "self",
"summary": "SUSE Bug 1161181",
"url": "https://bugzilla.suse.com/1161181"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-12207 page",
"url": "https://www.suse.com/security/cve/CVE-2018-12207/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-19965 page",
"url": "https://www.suse.com/security/cve/CVE-2018-19965/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11135 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11135/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-12067 page",
"url": "https://www.suse.com/security/cve/CVE-2019-12067/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-12068 page",
"url": "https://www.suse.com/security/cve/CVE-2019-12068/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-12155 page",
"url": "https://www.suse.com/security/cve/CVE-2019-12155/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-14378 page",
"url": "https://www.suse.com/security/cve/CVE-2019-14378/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15890 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15890/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-17340 page",
"url": "https://www.suse.com/security/cve/CVE-2019-17340/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-17341 page",
"url": "https://www.suse.com/security/cve/CVE-2019-17341/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-17342 page",
"url": "https://www.suse.com/security/cve/CVE-2019-17342/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-17343 page",
"url": "https://www.suse.com/security/cve/CVE-2019-17343/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-17344 page",
"url": "https://www.suse.com/security/cve/CVE-2019-17344/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-17347 page",
"url": "https://www.suse.com/security/cve/CVE-2019-17347/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-18420 page",
"url": "https://www.suse.com/security/cve/CVE-2019-18420/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-18421 page",
"url": "https://www.suse.com/security/cve/CVE-2019-18421/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-18424 page",
"url": "https://www.suse.com/security/cve/CVE-2019-18424/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-18425 page",
"url": "https://www.suse.com/security/cve/CVE-2019-18425/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-19577 page",
"url": "https://www.suse.com/security/cve/CVE-2019-19577/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-19578 page",
"url": "https://www.suse.com/security/cve/CVE-2019-19578/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-19579 page",
"url": "https://www.suse.com/security/cve/CVE-2019-19579/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-19580 page",
"url": "https://www.suse.com/security/cve/CVE-2019-19580/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-19581 page",
"url": "https://www.suse.com/security/cve/CVE-2019-19581/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-19583 page",
"url": "https://www.suse.com/security/cve/CVE-2019-19583/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-7211 page",
"url": "https://www.suse.com/security/cve/CVE-2020-7211/"
}
],
"title": "Security update for xen",
"tracking": {
"current_release_date": "2020-02-17T14:03:16Z",
"generator": {
"date": "2020-02-17T14:03:16Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2020:0388-1",
"initial_release_date": "2020-02-17T14:03:16Z",
"revision_history": [
{
"date": "2020-02-17T14:03:16Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "xen-devel-4.5.5_28-22.64.1.i586",
"product": {
"name": "xen-devel-4.5.5_28-22.64.1.i586",
"product_id": "xen-devel-4.5.5_28-22.64.1.i586"
}
},
{
"category": "product_version",
"name": "xen-libs-4.5.5_28-22.64.1.i586",
"product": {
"name": "xen-libs-4.5.5_28-22.64.1.i586",
"product_id": "xen-libs-4.5.5_28-22.64.1.i586"
}
},
{
"category": "product_version",
"name": "xen-tools-domU-4.5.5_28-22.64.1.i586",
"product": {
"name": "xen-tools-domU-4.5.5_28-22.64.1.i586",
"product_id": "xen-tools-domU-4.5.5_28-22.64.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "xen-4.5.5_28-22.64.1.x86_64",
"product": {
"name": "xen-4.5.5_28-22.64.1.x86_64",
"product_id": "xen-4.5.5_28-22.64.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-devel-4.5.5_28-22.64.1.x86_64",
"product": {
"name": "xen-devel-4.5.5_28-22.64.1.x86_64",
"product_id": "xen-devel-4.5.5_28-22.64.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-doc-html-4.5.5_28-22.64.1.x86_64",
"product": {
"name": "xen-doc-html-4.5.5_28-22.64.1.x86_64",
"product_id": "xen-doc-html-4.5.5_28-22.64.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64",
"product": {
"name": "xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64",
"product_id": "xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-libs-4.5.5_28-22.64.1.x86_64",
"product": {
"name": "xen-libs-4.5.5_28-22.64.1.x86_64",
"product_id": "xen-libs-4.5.5_28-22.64.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-libs-32bit-4.5.5_28-22.64.1.x86_64",
"product": {
"name": "xen-libs-32bit-4.5.5_28-22.64.1.x86_64",
"product_id": "xen-libs-32bit-4.5.5_28-22.64.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-tools-4.5.5_28-22.64.1.x86_64",
"product": {
"name": "xen-tools-4.5.5_28-22.64.1.x86_64",
"product_id": "xen-tools-4.5.5_28-22.64.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-tools-domU-4.5.5_28-22.64.1.x86_64",
"product": {
"name": "xen-tools-domU-4.5.5_28-22.64.1.x86_64",
"product_id": "xen-tools-domU-4.5.5_28-22.64.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP1-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12:sp1"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-4.5.5_28-22.64.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_28-22.64.1.x86_64"
},
"product_reference": "xen-4.5.5_28-22.64.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-doc-html-4.5.5_28-22.64.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_28-22.64.1.x86_64"
},
"product_reference": "xen-doc-html-4.5.5_28-22.64.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64"
},
"product_reference": "xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.5.5_28-22.64.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_28-22.64.1.x86_64"
},
"product_reference": "xen-libs-4.5.5_28-22.64.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-32bit-4.5.5_28-22.64.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_28-22.64.1.x86_64"
},
"product_reference": "xen-libs-32bit-4.5.5_28-22.64.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-4.5.5_28-22.64.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_28-22.64.1.x86_64"
},
"product_reference": "xen-tools-4.5.5_28-22.64.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-domU-4.5.5_28-22.64.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_28-22.64.1.x86_64"
},
"product_reference": "xen-tools-domU-4.5.5_28-22.64.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-4.5.5_28-22.64.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_28-22.64.1.x86_64"
},
"product_reference": "xen-4.5.5_28-22.64.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-doc-html-4.5.5_28-22.64.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_28-22.64.1.x86_64"
},
"product_reference": "xen-doc-html-4.5.5_28-22.64.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64"
},
"product_reference": "xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.5.5_28-22.64.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_28-22.64.1.x86_64"
},
"product_reference": "xen-libs-4.5.5_28-22.64.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-32bit-4.5.5_28-22.64.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_28-22.64.1.x86_64"
},
"product_reference": "xen-libs-32bit-4.5.5_28-22.64.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-4.5.5_28-22.64.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_28-22.64.1.x86_64"
},
"product_reference": "xen-tools-4.5.5_28-22.64.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-domU-4.5.5_28-22.64.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_28-22.64.1.x86_64"
},
"product_reference": "xen-tools-domU-4.5.5_28-22.64.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-12207",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-12207"
}
],
"notes": [
{
"category": "general",
"text": "Improper invalidation for page table updates by a virtual guest operating system for multiple Intel(R) Processors may allow an authenticated user to potentially enable denial of service of the host system via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_28-22.64.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-12207",
"url": "https://www.suse.com/security/cve/CVE-2018-12207"
},
{
"category": "external",
"summary": "SUSE Bug 1117665 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1117665"
},
{
"category": "external",
"summary": "SUSE Bug 1139073 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1139073"
},
{
"category": "external",
"summary": "SUSE Bug 1152505 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1152505"
},
{
"category": "external",
"summary": "SUSE Bug 1155812 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1155812"
},
{
"category": "external",
"summary": "SUSE Bug 1155817 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1155817"
},
{
"category": "external",
"summary": "SUSE Bug 1155945 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1155945"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1201877"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_28-22.64.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_28-22.64.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-02-17T14:03:16Z",
"details": "moderate"
}
],
"title": "CVE-2018-12207"
},
{
"cve": "CVE-2018-19965",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-19965"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Xen through 4.11.x allowing 64-bit PV guest OS users to cause a denial of service (host OS crash) because #GP[0] can occur after a non-canonical address is passed to the TLB flushing code. NOTE: this issue exists because of an incorrect CVE-2017-5754 (aka Meltdown) mitigation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_28-22.64.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-19965",
"url": "https://www.suse.com/security/cve/CVE-2018-19965"
},
{
"category": "external",
"summary": "SUSE Bug 1115045 for CVE-2018-19965",
"url": "https://bugzilla.suse.com/1115045"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_28-22.64.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_28-22.64.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-02-17T14:03:16Z",
"details": "moderate"
}
],
"title": "CVE-2018-19965"
},
{
"cve": "CVE-2019-11135",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11135"
}
],
"notes": [
{
"category": "general",
"text": "TSX Asynchronous Abort condition on some CPUs utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_28-22.64.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11135",
"url": "https://www.suse.com/security/cve/CVE-2019-11135"
},
{
"category": "external",
"summary": "SUSE Bug 1139073 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1139073"
},
{
"category": "external",
"summary": "SUSE Bug 1152497 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1152497"
},
{
"category": "external",
"summary": "SUSE Bug 1152505 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1152505"
},
{
"category": "external",
"summary": "SUSE Bug 1152506 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1152506"
},
{
"category": "external",
"summary": "SUSE Bug 1160120 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1160120"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1201877"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_28-22.64.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_28-22.64.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-02-17T14:03:16Z",
"details": "moderate"
}
],
"title": "CVE-2019-11135"
},
{
"cve": "CVE-2019-12067",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-12067"
}
],
"notes": [
{
"category": "general",
"text": "The ahci_commit_buf function in ide/ahci.c in QEMU allows attackers to cause a denial of service (NULL dereference) when the command header \u0027ad-\u003ecur_cmd\u0027 is null.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_28-22.64.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-12067",
"url": "https://www.suse.com/security/cve/CVE-2019-12067"
},
{
"category": "external",
"summary": "SUSE Bug 1145642 for CVE-2019-12067",
"url": "https://bugzilla.suse.com/1145642"
},
{
"category": "external",
"summary": "SUSE Bug 1145652 for CVE-2019-12067",
"url": "https://bugzilla.suse.com/1145652"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_28-22.64.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_28-22.64.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-02-17T14:03:16Z",
"details": "low"
}
],
"title": "CVE-2019-12067"
},
{
"cve": "CVE-2019-12068",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-12068"
}
],
"notes": [
{
"category": "general",
"text": "In QEMU 1:4.1-1, 1:2.1+dfsg-12+deb8u6, 1:2.8+dfsg-6+deb9u8, 1:3.1+dfsg-8~deb10u1, 1:3.1+dfsg-8+deb10u2, and 1:2.1+dfsg-12+deb8u12 (fixed), when executing script in lsi_execute_script(), the LSI scsi adapter emulator advances \u0027s-\u003edsp\u0027 index to read next opcode. This can lead to an infinite loop if the next opcode is empty. Move the existing loop exit after 10k iterations so that it covers no-op opcodes as well.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_28-22.64.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-12068",
"url": "https://www.suse.com/security/cve/CVE-2019-12068"
},
{
"category": "external",
"summary": "SUSE Bug 1146873 for CVE-2019-12068",
"url": "https://bugzilla.suse.com/1146873"
},
{
"category": "external",
"summary": "SUSE Bug 1146874 for CVE-2019-12068",
"url": "https://bugzilla.suse.com/1146874"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2019-12068",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_28-22.64.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_28-22.64.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-02-17T14:03:16Z",
"details": "moderate"
}
],
"title": "CVE-2019-12068"
},
{
"cve": "CVE-2019-12155",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-12155"
}
],
"notes": [
{
"category": "general",
"text": "interface_release_resource in hw/display/qxl.c in QEMU 3.1.x through 4.0.0 has a NULL pointer dereference.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_28-22.64.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-12155",
"url": "https://www.suse.com/security/cve/CVE-2019-12155"
},
{
"category": "external",
"summary": "SUSE Bug 1135902 for CVE-2019-12155",
"url": "https://bugzilla.suse.com/1135902"
},
{
"category": "external",
"summary": "SUSE Bug 1135905 for CVE-2019-12155",
"url": "https://bugzilla.suse.com/1135905"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_28-22.64.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.8,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_28-22.64.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-02-17T14:03:16Z",
"details": "low"
}
],
"title": "CVE-2019-12155"
},
{
"cve": "CVE-2019-14378",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-14378"
}
],
"notes": [
{
"category": "general",
"text": "ip_reass in ip_input.c in libslirp 4.0.0 has a heap-based buffer overflow via a large packet because it mishandles a case involving the first fragment.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_28-22.64.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-14378",
"url": "https://www.suse.com/security/cve/CVE-2019-14378"
},
{
"category": "external",
"summary": "SUSE Bug 1143794 for CVE-2019-14378",
"url": "https://bugzilla.suse.com/1143794"
},
{
"category": "external",
"summary": "SUSE Bug 1143797 for CVE-2019-14378",
"url": "https://bugzilla.suse.com/1143797"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2019-14378",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_28-22.64.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_28-22.64.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-02-17T14:03:16Z",
"details": "important"
}
],
"title": "CVE-2019-14378"
},
{
"cve": "CVE-2019-15890",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15890"
}
],
"notes": [
{
"category": "general",
"text": "libslirp 4.0.0, as used in QEMU 4.1.0, has a use-after-free in ip_reass in ip_input.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_28-22.64.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15890",
"url": "https://www.suse.com/security/cve/CVE-2019-15890"
},
{
"category": "external",
"summary": "SUSE Bug 1149811 for CVE-2019-15890",
"url": "https://bugzilla.suse.com/1149811"
},
{
"category": "external",
"summary": "SUSE Bug 1149813 for CVE-2019-15890",
"url": "https://bugzilla.suse.com/1149813"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2019-15890",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_28-22.64.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_28-22.64.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-02-17T14:03:16Z",
"details": "moderate"
}
],
"title": "CVE-2019-15890"
},
{
"cve": "CVE-2019-17340",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-17340"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Xen through 4.11.x allowing x86 guest OS users to cause a denial of service or gain privileges because grant-table transfer requests are mishandled.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_28-22.64.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-17340",
"url": "https://www.suse.com/security/cve/CVE-2019-17340"
},
{
"category": "external",
"summary": "SUSE Bug 1126140 for CVE-2019-17340",
"url": "https://bugzilla.suse.com/1126140"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2019-17340",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_28-22.64.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_28-22.64.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-02-17T14:03:16Z",
"details": "moderate"
}
],
"title": "CVE-2019-17340"
},
{
"cve": "CVE-2019-17341",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-17341"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Xen through 4.11.x allowing x86 PV guest OS users to cause a denial of service or gain privileges by leveraging a page-writability race condition during addition of a passed-through PCI device.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_28-22.64.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-17341",
"url": "https://www.suse.com/security/cve/CVE-2019-17341"
},
{
"category": "external",
"summary": "SUSE Bug 1126141 for CVE-2019-17341",
"url": "https://bugzilla.suse.com/1126141"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2019-17341",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_28-22.64.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_28-22.64.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-02-17T14:03:16Z",
"details": "important"
}
],
"title": "CVE-2019-17341"
},
{
"cve": "CVE-2019-17342",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-17342"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Xen through 4.11.x allowing x86 PV guest OS users to cause a denial of service or gain privileges by leveraging a race condition that arose when XENMEM_exchange was introduced.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_28-22.64.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-17342",
"url": "https://www.suse.com/security/cve/CVE-2019-17342"
},
{
"category": "external",
"summary": "SUSE Bug 1126192 for CVE-2019-17342",
"url": "https://bugzilla.suse.com/1126192"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2019-17342",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_28-22.64.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_28-22.64.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-02-17T14:03:16Z",
"details": "important"
}
],
"title": "CVE-2019-17342"
},
{
"cve": "CVE-2019-17343",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-17343"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Xen through 4.11.x allowing x86 PV guest OS users to cause a denial of service or gain privileges by leveraging incorrect use of the HVM physmap concept for PV domains.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_28-22.64.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-17343",
"url": "https://www.suse.com/security/cve/CVE-2019-17343"
},
{
"category": "external",
"summary": "SUSE Bug 1126195 for CVE-2019-17343",
"url": "https://bugzilla.suse.com/1126195"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2019-17343",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_28-22.64.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_28-22.64.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-02-17T14:03:16Z",
"details": "important"
}
],
"title": "CVE-2019-17343"
},
{
"cve": "CVE-2019-17344",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-17344"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Xen through 4.11.x allowing x86 PV guest OS users to cause a denial of service by leveraging a long-running operation that exists to support restartability of PTE updates.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_28-22.64.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-17344",
"url": "https://www.suse.com/security/cve/CVE-2019-17344"
},
{
"category": "external",
"summary": "SUSE Bug 1126196 for CVE-2019-17344",
"url": "https://bugzilla.suse.com/1126196"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2019-17344",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_28-22.64.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_28-22.64.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-02-17T14:03:16Z",
"details": "important"
}
],
"title": "CVE-2019-17344"
},
{
"cve": "CVE-2019-17347",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-17347"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Xen through 4.11.x allowing x86 PV guest OS users to cause a denial of service or gain privileges because a guest can manipulate its virtualised %cr4 in a way that is incompatible with Linux (and possibly other guest kernels).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_28-22.64.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-17347",
"url": "https://www.suse.com/security/cve/CVE-2019-17347"
},
{
"category": "external",
"summary": "SUSE Bug 1126201 for CVE-2019-17347",
"url": "https://bugzilla.suse.com/1126201"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_28-22.64.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_28-22.64.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-02-17T14:03:16Z",
"details": "important"
}
],
"title": "CVE-2019-17347"
},
{
"cve": "CVE-2019-18420",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-18420"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Xen through 4.12.x allowing x86 PV guest OS users to cause a denial of service via a VCPUOP_initialise hypercall. hypercall_create_continuation() is a variadic function which uses a printf-like format string to interpret its parameters. Error handling for a bad format character was done using BUG(), which crashes Xen. One path, via the VCPUOP_initialise hypercall, has a bad format character. The BUG() can be hit if VCPUOP_initialise executes for a sufficiently long period of time for a continuation to be created. Malicious guests may cause a hypervisor crash, resulting in a Denial of Service (DoS). Xen versions 4.6 and newer are vulnerable. Xen versions 4.5 and earlier are not vulnerable. Only x86 PV guests can exploit the vulnerability. HVM and PVH guests, and guests on ARM systems, cannot exploit the vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_28-22.64.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-18420",
"url": "https://www.suse.com/security/cve/CVE-2019-18420"
},
{
"category": "external",
"summary": "SUSE Bug 1154448 for CVE-2019-18420",
"url": "https://bugzilla.suse.com/1154448"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_28-22.64.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_28-22.64.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-02-17T14:03:16Z",
"details": "important"
}
],
"title": "CVE-2019-18420"
},
{
"cve": "CVE-2019-18421",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-18421"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Xen through 4.12.x allowing x86 PV guest OS users to gain host OS privileges by leveraging race conditions in pagetable promotion and demotion operations. There are issues with restartable PV type change operations. To avoid using shadow pagetables for PV guests, Xen exposes the actual hardware pagetables to the guest. In order to prevent the guest from modifying these page tables directly, Xen keeps track of how pages are used using a type system; pages must be \"promoted\" before being used as a pagetable, and \"demoted\" before being used for any other type. Xen also allows for \"recursive\" promotions: i.e., an operating system promoting a page to an L4 pagetable may end up causing pages to be promoted to L3s, which may in turn cause pages to be promoted to L2s, and so on. These operations may take an arbitrarily large amount of time, and so must be re-startable. Unfortunately, making recursive pagetable promotion and demotion operations restartable is incredibly complicated, and the code contains several races which, if triggered, can cause Xen to drop or retain extra type counts, potentially allowing guests to get write access to in-use pagetables. A malicious PV guest administrator may be able to escalate their privilege to that of the host. All x86 systems with untrusted PV guests are vulnerable. HVM and PVH guests cannot exercise this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_28-22.64.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-18421",
"url": "https://www.suse.com/security/cve/CVE-2019-18421"
},
{
"category": "external",
"summary": "SUSE Bug 1154458 for CVE-2019-18421",
"url": "https://bugzilla.suse.com/1154458"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2019-18421",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_28-22.64.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_28-22.64.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-02-17T14:03:16Z",
"details": "important"
}
],
"title": "CVE-2019-18421"
},
{
"cve": "CVE-2019-18424",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-18424"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Xen through 4.12.x allowing attackers to gain host OS privileges via DMA in a situation where an untrusted domain has access to a physical device. This occurs because passed through PCI devices may corrupt host memory after deassignment. When a PCI device is assigned to an untrusted domain, it is possible for that domain to program the device to DMA to an arbitrary address. The IOMMU is used to protect the host from malicious DMA by making sure that the device addresses can only target memory assigned to the guest. However, when the guest domain is torn down, or the device is deassigned, the device is assigned back to dom0, thus allowing any in-flight DMA to potentially target critical host data. An untrusted domain with access to a physical device can DMA into host memory, leading to privilege escalation. Only systems where guests are given direct access to physical devices capable of DMA (PCI pass-through) are vulnerable. Systems which do not use PCI pass-through are not vulnerable.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_28-22.64.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-18424",
"url": "https://www.suse.com/security/cve/CVE-2019-18424"
},
{
"category": "external",
"summary": "SUSE Bug 1154461 for CVE-2019-18424",
"url": "https://bugzilla.suse.com/1154461"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_28-22.64.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.6,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_28-22.64.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-02-17T14:03:16Z",
"details": "important"
}
],
"title": "CVE-2019-18424"
},
{
"cve": "CVE-2019-18425",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-18425"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Xen through 4.12.x allowing 32-bit PV guest OS users to gain guest OS privileges by installing and using descriptors. There is missing descriptor table limit checking in x86 PV emulation. When emulating certain PV guest operations, descriptor table accesses are performed by the emulating code. Such accesses should respect the guest specified limits, unless otherwise guaranteed to fail in such a case. Without this, emulation of 32-bit guest user mode calls through call gates would allow guest user mode to install and then use descriptors of their choice, as long as the guest kernel did not itself install an LDT. (Most OSes don\u0027t install any LDT by default). 32-bit PV guest user mode can elevate its privileges to that of the guest kernel. Xen versions from at least 3.2 onwards are affected. Only 32-bit PV guest user mode can leverage this vulnerability. HVM, PVH, as well as 64-bit PV guests cannot leverage this vulnerability. Arm systems are unaffected.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_28-22.64.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-18425",
"url": "https://www.suse.com/security/cve/CVE-2019-18425"
},
{
"category": "external",
"summary": "SUSE Bug 1154456 for CVE-2019-18425",
"url": "https://bugzilla.suse.com/1154456"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2019-18425",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_28-22.64.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_28-22.64.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-02-17T14:03:16Z",
"details": "important"
}
],
"title": "CVE-2019-18425"
},
{
"cve": "CVE-2019-19577",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-19577"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Xen through 4.12.x allowing x86 AMD HVM guest OS users to cause a denial of service or possibly gain privileges by triggering data-structure access during pagetable-height updates. When running on AMD systems with an IOMMU, Xen attempted to dynamically adapt the number of levels of pagetables (the pagetable height) in the IOMMU according to the guest\u0027s address space size. The code to select and update the height had several bugs. Notably, the update was done without taking a lock which is necessary for safe operation. A malicious guest administrator can cause Xen to access data structures while they are being modified, causing Xen to crash. Privilege escalation is thought to be very difficult but cannot be ruled out. Additionally, there is a potential memory leak of 4kb per guest boot, under memory pressure. Only Xen on AMD CPUs is vulnerable. Xen running on Intel CPUs is not vulnerable. ARM systems are not vulnerable. Only systems where guests are given direct access to physical devices are vulnerable. Systems which do not use PCI pass-through are not vulnerable. Only HVM guests can exploit the vulnerability. PV and PVH guests cannot. All versions of Xen with IOMMU support are vulnerable.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_28-22.64.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-19577",
"url": "https://www.suse.com/security/cve/CVE-2019-19577"
},
{
"category": "external",
"summary": "SUSE Bug 1158007 for CVE-2019-19577",
"url": "https://bugzilla.suse.com/1158007"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_28-22.64.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_28-22.64.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-02-17T14:03:16Z",
"details": "important"
}
],
"title": "CVE-2019-19577"
},
{
"cve": "CVE-2019-19578",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-19578"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Xen through 4.12.x allowing x86 PV guest OS users to cause a denial of service via degenerate chains of linear pagetables, because of an incorrect fix for CVE-2017-15595. \"Linear pagetables\" is a technique which involves either pointing a pagetable at itself, or to another pagetable of the same or higher level. Xen has limited support for linear pagetables: A page may either point to itself, or point to another pagetable of the same level (i.e., L2 to L2, L3 to L3, and so on). XSA-240 introduced an additional restriction that limited the \"depth\" of such chains by allowing pages to either *point to* other pages of the same level, or *be pointed to* by other pages of the same level, but not both. To implement this, we keep track of the number of outstanding times a page points to or is pointed to another page table, to prevent both from happening at the same time. Unfortunately, the original commit introducing this reset this count when resuming validation of a partially-validated pagetable, incorrectly dropping some \"linear_pt_entry\" counts. If an attacker could engineer such a situation to occur, they might be able to make loops or other arbitrary chains of linear pagetables, as described in XSA-240. A malicious or buggy PV guest may cause the hypervisor to crash, resulting in Denial of Service (DoS) affecting the entire host. Privilege escalation and information leaks cannot be excluded. All versions of Xen are vulnerable. Only x86 systems are affected. Arm systems are not affected. Only x86 PV guests can leverage the vulnerability. x86 HVM and PVH guests cannot leverage the vulnerability. Only systems which have enabled linear pagetables are vulnerable. Systems which have disabled linear pagetables, either by selecting CONFIG_PV_LINEAR_PT=n when building the hypervisor, or adding pv-linear-pt=false on the command-line, are not vulnerable.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_28-22.64.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-19578",
"url": "https://www.suse.com/security/cve/CVE-2019-19578"
},
{
"category": "external",
"summary": "SUSE Bug 1158005 for CVE-2019-19578",
"url": "https://bugzilla.suse.com/1158005"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2019-19578",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_28-22.64.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_28-22.64.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-02-17T14:03:16Z",
"details": "important"
}
],
"title": "CVE-2019-19578"
},
{
"cve": "CVE-2019-19579",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-19579"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Xen through 4.12.x allowing attackers to gain host OS privileges via DMA in a situation where an untrusted domain has access to a physical device (and assignable-add is not used), because of an incomplete fix for CVE-2019-18424. XSA-302 relies on the use of libxl\u0027s \"assignable-add\" feature to prepare devices to be assigned to untrusted guests. Unfortunately, this is not considered a strictly required step for device assignment. The PCI passthrough documentation on the wiki describes alternate ways of preparing devices for assignment, and libvirt uses its own ways as well. Hosts where these \"alternate\" methods are used will still leave the system in a vulnerable state after the device comes back from a guest. An untrusted domain with access to a physical device can DMA into host memory, leading to privilege escalation. Only systems where guests are given direct access to physical devices capable of DMA (PCI pass-through) are vulnerable. Systems which do not use PCI pass-through are not vulnerable.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_28-22.64.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-19579",
"url": "https://www.suse.com/security/cve/CVE-2019-19579"
},
{
"category": "external",
"summary": "SUSE Bug 1157888 for CVE-2019-19579",
"url": "https://bugzilla.suse.com/1157888"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_28-22.64.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_28-22.64.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-02-17T14:03:16Z",
"details": "moderate"
}
],
"title": "CVE-2019-19579"
},
{
"cve": "CVE-2019-19580",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-19580"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Xen through 4.12.x allowing x86 PV guest OS users to gain host OS privileges by leveraging race conditions in pagetable promotion and demotion operations, because of an incomplete fix for CVE-2019-18421. XSA-299 addressed several critical issues in restartable PV type change operations. Despite extensive testing and auditing, some corner cases were missed. A malicious PV guest administrator may be able to escalate their privilege to that of the host. All security-supported versions of Xen are vulnerable. Only x86 systems are affected. Arm systems are not affected. Only x86 PV guests can leverage the vulnerability. x86 HVM and PVH guests cannot leverage the vulnerability. Note that these attacks require very precise timing, which may be difficult to exploit in practice.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_28-22.64.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-19580",
"url": "https://www.suse.com/security/cve/CVE-2019-19580"
},
{
"category": "external",
"summary": "SUSE Bug 1158006 for CVE-2019-19580",
"url": "https://bugzilla.suse.com/1158006"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2019-19580",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_28-22.64.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_28-22.64.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-02-17T14:03:16Z",
"details": "moderate"
}
],
"title": "CVE-2019-19580"
},
{
"cve": "CVE-2019-19581",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-19581"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Xen through 4.12.x allowing 32-bit Arm guest OS users to cause a denial of service (out-of-bounds access) because certain bit iteration is mishandled. In a number of places bitmaps are being used by the hypervisor to track certain state. Iteration over all bits involves functions which may misbehave in certain corner cases: On 32-bit Arm accesses to bitmaps with bit a count which is a multiple of 32, an out of bounds access may occur. A malicious guest may cause a hypervisor crash or hang, resulting in a Denial of Service (DoS). All versions of Xen are vulnerable. 32-bit Arm systems are vulnerable. 64-bit Arm systems are not vulnerable.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_28-22.64.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-19581",
"url": "https://www.suse.com/security/cve/CVE-2019-19581"
},
{
"category": "external",
"summary": "SUSE Bug 1158003 for CVE-2019-19581",
"url": "https://bugzilla.suse.com/1158003"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_28-22.64.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_28-22.64.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-02-17T14:03:16Z",
"details": "moderate"
}
],
"title": "CVE-2019-19581"
},
{
"cve": "CVE-2019-19583",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-19583"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Xen through 4.12.x allowing x86 HVM/PVH guest OS users to cause a denial of service (guest OS crash) because VMX VMEntry checks mishandle a certain case. Please see XSA-260 for background on the MovSS shadow. Please see XSA-156 for background on the need for #DB interception. The VMX VMEntry checks do not like the exact combination of state which occurs when #DB in intercepted, Single Stepping is active, and blocked by STI/MovSS is active, despite this being a legitimate state to be in. The resulting VMEntry failure is fatal to the guest. HVM/PVH guest userspace code may be able to crash the guest, resulting in a guest Denial of Service. All versions of Xen are affected. Only systems supporting VMX hardware virtual extensions (Intel, Cyrix, or Zhaoxin CPUs) are affected. Arm and AMD systems are unaffected. Only HVM/PVH guests are affected. PV guests cannot leverage the vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_28-22.64.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-19583",
"url": "https://www.suse.com/security/cve/CVE-2019-19583"
},
{
"category": "external",
"summary": "SUSE Bug 1158004 for CVE-2019-19583",
"url": "https://bugzilla.suse.com/1158004"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2019-19583",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_28-22.64.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_28-22.64.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-02-17T14:03:16Z",
"details": "important"
}
],
"title": "CVE-2019-19583"
},
{
"cve": "CVE-2020-7211",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-7211"
}
],
"notes": [
{
"category": "general",
"text": "tftp.c in libslirp 4.1.0, as used in QEMU 4.2.0, does not prevent ..\\ directory traversal on Windows.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_28-22.64.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-7211",
"url": "https://www.suse.com/security/cve/CVE-2020-7211"
},
{
"category": "external",
"summary": "SUSE Bug 1161180 for CVE-2020-7211",
"url": "https://bugzilla.suse.com/1161180"
},
{
"category": "external",
"summary": "SUSE Bug 1161181 for CVE-2020-7211",
"url": "https://bugzilla.suse.com/1161181"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2020-7211",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_28-22.64.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_28_k3.12.74_60.64.124-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_28-22.64.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_28-22.64.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-02-17T14:03:16Z",
"details": "moderate"
}
],
"title": "CVE-2020-7211"
}
]
}
suse-su-2019:2954-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for qemu",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for qemu fixes the following issues:\n\n- Patch queue updated from https://gitlab.suse.de/virtualization/qemu.git SLE15\n- Fix use-after-free in slirp (CVE-2018-20126 bsc#1119991)\n- Fix potential DOS in lsi scsi controller emulation (CVE-2019-12068 bsc#1146873)\n- Expose taa-no \u0027feature\u0027, indicating CPU does not have the\n TSX Async Abort vulnerability. (CVE-2019-11135 bsc#1152506)\n- Expose pschange-mc-no \u0027feature\u0027, indicating CPU does not have\n the page size change machine check vulnerability (CVE-2018-12207 bsc#1155812)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2019-2954,SUSE-SLE-Module-Basesystem-15-2019-2954,SUSE-SLE-Module-Development-Tools-OBS-15-2019-2954,SUSE-SLE-Module-Server-Applications-15-2019-2954",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_2954-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2019:2954-1",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192954-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2019:2954-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2019-November/006132.html"
},
{
"category": "self",
"summary": "SUSE Bug 1119991",
"url": "https://bugzilla.suse.com/1119991"
},
{
"category": "self",
"summary": "SUSE Bug 1146873",
"url": "https://bugzilla.suse.com/1146873"
},
{
"category": "self",
"summary": "SUSE Bug 1152506",
"url": "https://bugzilla.suse.com/1152506"
},
{
"category": "self",
"summary": "SUSE Bug 1155812",
"url": "https://bugzilla.suse.com/1155812"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-12207 page",
"url": "https://www.suse.com/security/cve/CVE-2018-12207/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-20126 page",
"url": "https://www.suse.com/security/cve/CVE-2018-20126/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11135 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11135/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-12068 page",
"url": "https://www.suse.com/security/cve/CVE-2019-12068/"
}
],
"title": "Security update for qemu",
"tracking": {
"current_release_date": "2019-11-12T18:14:28Z",
"generator": {
"date": "2019-11-12T18:14:28Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2019:2954-1",
"initial_release_date": "2019-11-12T18:14:28Z",
"revision_history": [
{
"date": "2019-11-12T18:14:28Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "qemu-2.11.2-9.33.1.aarch64",
"product": {
"name": "qemu-2.11.2-9.33.1.aarch64",
"product_id": "qemu-2.11.2-9.33.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-arm-2.11.2-9.33.1.aarch64",
"product": {
"name": "qemu-arm-2.11.2-9.33.1.aarch64",
"product_id": "qemu-arm-2.11.2-9.33.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-block-curl-2.11.2-9.33.1.aarch64",
"product": {
"name": "qemu-block-curl-2.11.2-9.33.1.aarch64",
"product_id": "qemu-block-curl-2.11.2-9.33.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-block-dmg-2.11.2-9.33.1.aarch64",
"product": {
"name": "qemu-block-dmg-2.11.2-9.33.1.aarch64",
"product_id": "qemu-block-dmg-2.11.2-9.33.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-block-iscsi-2.11.2-9.33.1.aarch64",
"product": {
"name": "qemu-block-iscsi-2.11.2-9.33.1.aarch64",
"product_id": "qemu-block-iscsi-2.11.2-9.33.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-block-rbd-2.11.2-9.33.1.aarch64",
"product": {
"name": "qemu-block-rbd-2.11.2-9.33.1.aarch64",
"product_id": "qemu-block-rbd-2.11.2-9.33.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-block-ssh-2.11.2-9.33.1.aarch64",
"product": {
"name": "qemu-block-ssh-2.11.2-9.33.1.aarch64",
"product_id": "qemu-block-ssh-2.11.2-9.33.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-extra-2.11.2-9.33.1.aarch64",
"product": {
"name": "qemu-extra-2.11.2-9.33.1.aarch64",
"product_id": "qemu-extra-2.11.2-9.33.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-guest-agent-2.11.2-9.33.1.aarch64",
"product": {
"name": "qemu-guest-agent-2.11.2-9.33.1.aarch64",
"product_id": "qemu-guest-agent-2.11.2-9.33.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-lang-2.11.2-9.33.1.aarch64",
"product": {
"name": "qemu-lang-2.11.2-9.33.1.aarch64",
"product_id": "qemu-lang-2.11.2-9.33.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-linux-user-2.11.2-9.33.1.aarch64",
"product": {
"name": "qemu-linux-user-2.11.2-9.33.1.aarch64",
"product_id": "qemu-linux-user-2.11.2-9.33.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-ppc-2.11.2-9.33.1.aarch64",
"product": {
"name": "qemu-ppc-2.11.2-9.33.1.aarch64",
"product_id": "qemu-ppc-2.11.2-9.33.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-s390-2.11.2-9.33.1.aarch64",
"product": {
"name": "qemu-s390-2.11.2-9.33.1.aarch64",
"product_id": "qemu-s390-2.11.2-9.33.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-testsuite-2.11.2-9.33.1.aarch64",
"product": {
"name": "qemu-testsuite-2.11.2-9.33.1.aarch64",
"product_id": "qemu-testsuite-2.11.2-9.33.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-tools-2.11.2-9.33.1.aarch64",
"product": {
"name": "qemu-tools-2.11.2-9.33.1.aarch64",
"product_id": "qemu-tools-2.11.2-9.33.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-x86-2.11.2-9.33.1.aarch64",
"product": {
"name": "qemu-x86-2.11.2-9.33.1.aarch64",
"product_id": "qemu-x86-2.11.2-9.33.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-2.11.2-9.33.1.i586",
"product": {
"name": "qemu-2.11.2-9.33.1.i586",
"product_id": "qemu-2.11.2-9.33.1.i586"
}
},
{
"category": "product_version",
"name": "qemu-arm-2.11.2-9.33.1.i586",
"product": {
"name": "qemu-arm-2.11.2-9.33.1.i586",
"product_id": "qemu-arm-2.11.2-9.33.1.i586"
}
},
{
"category": "product_version",
"name": "qemu-block-curl-2.11.2-9.33.1.i586",
"product": {
"name": "qemu-block-curl-2.11.2-9.33.1.i586",
"product_id": "qemu-block-curl-2.11.2-9.33.1.i586"
}
},
{
"category": "product_version",
"name": "qemu-block-dmg-2.11.2-9.33.1.i586",
"product": {
"name": "qemu-block-dmg-2.11.2-9.33.1.i586",
"product_id": "qemu-block-dmg-2.11.2-9.33.1.i586"
}
},
{
"category": "product_version",
"name": "qemu-block-iscsi-2.11.2-9.33.1.i586",
"product": {
"name": "qemu-block-iscsi-2.11.2-9.33.1.i586",
"product_id": "qemu-block-iscsi-2.11.2-9.33.1.i586"
}
},
{
"category": "product_version",
"name": "qemu-block-ssh-2.11.2-9.33.1.i586",
"product": {
"name": "qemu-block-ssh-2.11.2-9.33.1.i586",
"product_id": "qemu-block-ssh-2.11.2-9.33.1.i586"
}
},
{
"category": "product_version",
"name": "qemu-extra-2.11.2-9.33.1.i586",
"product": {
"name": "qemu-extra-2.11.2-9.33.1.i586",
"product_id": "qemu-extra-2.11.2-9.33.1.i586"
}
},
{
"category": "product_version",
"name": "qemu-guest-agent-2.11.2-9.33.1.i586",
"product": {
"name": "qemu-guest-agent-2.11.2-9.33.1.i586",
"product_id": "qemu-guest-agent-2.11.2-9.33.1.i586"
}
},
{
"category": "product_version",
"name": "qemu-kvm-2.11.2-9.33.1.i586",
"product": {
"name": "qemu-kvm-2.11.2-9.33.1.i586",
"product_id": "qemu-kvm-2.11.2-9.33.1.i586"
}
},
{
"category": "product_version",
"name": "qemu-lang-2.11.2-9.33.1.i586",
"product": {
"name": "qemu-lang-2.11.2-9.33.1.i586",
"product_id": "qemu-lang-2.11.2-9.33.1.i586"
}
},
{
"category": "product_version",
"name": "qemu-linux-user-2.11.2-9.33.1.i586",
"product": {
"name": "qemu-linux-user-2.11.2-9.33.1.i586",
"product_id": "qemu-linux-user-2.11.2-9.33.1.i586"
}
},
{
"category": "product_version",
"name": "qemu-ppc-2.11.2-9.33.1.i586",
"product": {
"name": "qemu-ppc-2.11.2-9.33.1.i586",
"product_id": "qemu-ppc-2.11.2-9.33.1.i586"
}
},
{
"category": "product_version",
"name": "qemu-s390-2.11.2-9.33.1.i586",
"product": {
"name": "qemu-s390-2.11.2-9.33.1.i586",
"product_id": "qemu-s390-2.11.2-9.33.1.i586"
}
},
{
"category": "product_version",
"name": "qemu-testsuite-2.11.2-9.33.1.i586",
"product": {
"name": "qemu-testsuite-2.11.2-9.33.1.i586",
"product_id": "qemu-testsuite-2.11.2-9.33.1.i586"
}
},
{
"category": "product_version",
"name": "qemu-tools-2.11.2-9.33.1.i586",
"product": {
"name": "qemu-tools-2.11.2-9.33.1.i586",
"product_id": "qemu-tools-2.11.2-9.33.1.i586"
}
},
{
"category": "product_version",
"name": "qemu-x86-2.11.2-9.33.1.i586",
"product": {
"name": "qemu-x86-2.11.2-9.33.1.i586",
"product_id": "qemu-x86-2.11.2-9.33.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-ipxe-1.0.0+-9.33.1.noarch",
"product": {
"name": "qemu-ipxe-1.0.0+-9.33.1.noarch",
"product_id": "qemu-ipxe-1.0.0+-9.33.1.noarch"
}
},
{
"category": "product_version",
"name": "qemu-seabios-1.11.0-9.33.1.noarch",
"product": {
"name": "qemu-seabios-1.11.0-9.33.1.noarch",
"product_id": "qemu-seabios-1.11.0-9.33.1.noarch"
}
},
{
"category": "product_version",
"name": "qemu-sgabios-8-9.33.1.noarch",
"product": {
"name": "qemu-sgabios-8-9.33.1.noarch",
"product_id": "qemu-sgabios-8-9.33.1.noarch"
}
},
{
"category": "product_version",
"name": "qemu-vgabios-1.11.0-9.33.1.noarch",
"product": {
"name": "qemu-vgabios-1.11.0-9.33.1.noarch",
"product_id": "qemu-vgabios-1.11.0-9.33.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-2.11.2-9.33.1.ppc64le",
"product": {
"name": "qemu-2.11.2-9.33.1.ppc64le",
"product_id": "qemu-2.11.2-9.33.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-arm-2.11.2-9.33.1.ppc64le",
"product": {
"name": "qemu-arm-2.11.2-9.33.1.ppc64le",
"product_id": "qemu-arm-2.11.2-9.33.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-block-curl-2.11.2-9.33.1.ppc64le",
"product": {
"name": "qemu-block-curl-2.11.2-9.33.1.ppc64le",
"product_id": "qemu-block-curl-2.11.2-9.33.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-block-dmg-2.11.2-9.33.1.ppc64le",
"product": {
"name": "qemu-block-dmg-2.11.2-9.33.1.ppc64le",
"product_id": "qemu-block-dmg-2.11.2-9.33.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-block-iscsi-2.11.2-9.33.1.ppc64le",
"product": {
"name": "qemu-block-iscsi-2.11.2-9.33.1.ppc64le",
"product_id": "qemu-block-iscsi-2.11.2-9.33.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-block-rbd-2.11.2-9.33.1.ppc64le",
"product": {
"name": "qemu-block-rbd-2.11.2-9.33.1.ppc64le",
"product_id": "qemu-block-rbd-2.11.2-9.33.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-block-ssh-2.11.2-9.33.1.ppc64le",
"product": {
"name": "qemu-block-ssh-2.11.2-9.33.1.ppc64le",
"product_id": "qemu-block-ssh-2.11.2-9.33.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-extra-2.11.2-9.33.1.ppc64le",
"product": {
"name": "qemu-extra-2.11.2-9.33.1.ppc64le",
"product_id": "qemu-extra-2.11.2-9.33.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-guest-agent-2.11.2-9.33.1.ppc64le",
"product": {
"name": "qemu-guest-agent-2.11.2-9.33.1.ppc64le",
"product_id": "qemu-guest-agent-2.11.2-9.33.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-lang-2.11.2-9.33.1.ppc64le",
"product": {
"name": "qemu-lang-2.11.2-9.33.1.ppc64le",
"product_id": "qemu-lang-2.11.2-9.33.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-linux-user-2.11.2-9.33.1.ppc64le",
"product": {
"name": "qemu-linux-user-2.11.2-9.33.1.ppc64le",
"product_id": "qemu-linux-user-2.11.2-9.33.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-ppc-2.11.2-9.33.1.ppc64le",
"product": {
"name": "qemu-ppc-2.11.2-9.33.1.ppc64le",
"product_id": "qemu-ppc-2.11.2-9.33.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-s390-2.11.2-9.33.1.ppc64le",
"product": {
"name": "qemu-s390-2.11.2-9.33.1.ppc64le",
"product_id": "qemu-s390-2.11.2-9.33.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-testsuite-2.11.2-9.33.1.ppc64le",
"product": {
"name": "qemu-testsuite-2.11.2-9.33.1.ppc64le",
"product_id": "qemu-testsuite-2.11.2-9.33.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-tools-2.11.2-9.33.1.ppc64le",
"product": {
"name": "qemu-tools-2.11.2-9.33.1.ppc64le",
"product_id": "qemu-tools-2.11.2-9.33.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-x86-2.11.2-9.33.1.ppc64le",
"product": {
"name": "qemu-x86-2.11.2-9.33.1.ppc64le",
"product_id": "qemu-x86-2.11.2-9.33.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-2.11.2-9.33.1.s390x",
"product": {
"name": "qemu-2.11.2-9.33.1.s390x",
"product_id": "qemu-2.11.2-9.33.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-arm-2.11.2-9.33.1.s390x",
"product": {
"name": "qemu-arm-2.11.2-9.33.1.s390x",
"product_id": "qemu-arm-2.11.2-9.33.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-block-curl-2.11.2-9.33.1.s390x",
"product": {
"name": "qemu-block-curl-2.11.2-9.33.1.s390x",
"product_id": "qemu-block-curl-2.11.2-9.33.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-block-dmg-2.11.2-9.33.1.s390x",
"product": {
"name": "qemu-block-dmg-2.11.2-9.33.1.s390x",
"product_id": "qemu-block-dmg-2.11.2-9.33.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-block-iscsi-2.11.2-9.33.1.s390x",
"product": {
"name": "qemu-block-iscsi-2.11.2-9.33.1.s390x",
"product_id": "qemu-block-iscsi-2.11.2-9.33.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-block-rbd-2.11.2-9.33.1.s390x",
"product": {
"name": "qemu-block-rbd-2.11.2-9.33.1.s390x",
"product_id": "qemu-block-rbd-2.11.2-9.33.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-block-ssh-2.11.2-9.33.1.s390x",
"product": {
"name": "qemu-block-ssh-2.11.2-9.33.1.s390x",
"product_id": "qemu-block-ssh-2.11.2-9.33.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-extra-2.11.2-9.33.1.s390x",
"product": {
"name": "qemu-extra-2.11.2-9.33.1.s390x",
"product_id": "qemu-extra-2.11.2-9.33.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-guest-agent-2.11.2-9.33.1.s390x",
"product": {
"name": "qemu-guest-agent-2.11.2-9.33.1.s390x",
"product_id": "qemu-guest-agent-2.11.2-9.33.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-kvm-2.11.2-9.33.1.s390x",
"product": {
"name": "qemu-kvm-2.11.2-9.33.1.s390x",
"product_id": "qemu-kvm-2.11.2-9.33.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-lang-2.11.2-9.33.1.s390x",
"product": {
"name": "qemu-lang-2.11.2-9.33.1.s390x",
"product_id": "qemu-lang-2.11.2-9.33.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-linux-user-2.11.2-9.33.1.s390x",
"product": {
"name": "qemu-linux-user-2.11.2-9.33.1.s390x",
"product_id": "qemu-linux-user-2.11.2-9.33.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-ppc-2.11.2-9.33.1.s390x",
"product": {
"name": "qemu-ppc-2.11.2-9.33.1.s390x",
"product_id": "qemu-ppc-2.11.2-9.33.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-s390-2.11.2-9.33.1.s390x",
"product": {
"name": "qemu-s390-2.11.2-9.33.1.s390x",
"product_id": "qemu-s390-2.11.2-9.33.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-tools-2.11.2-9.33.1.s390x",
"product": {
"name": "qemu-tools-2.11.2-9.33.1.s390x",
"product_id": "qemu-tools-2.11.2-9.33.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-x86-2.11.2-9.33.1.s390x",
"product": {
"name": "qemu-x86-2.11.2-9.33.1.s390x",
"product_id": "qemu-x86-2.11.2-9.33.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-2.11.2-9.33.1.x86_64",
"product": {
"name": "qemu-2.11.2-9.33.1.x86_64",
"product_id": "qemu-2.11.2-9.33.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-arm-2.11.2-9.33.1.x86_64",
"product": {
"name": "qemu-arm-2.11.2-9.33.1.x86_64",
"product_id": "qemu-arm-2.11.2-9.33.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-block-curl-2.11.2-9.33.1.x86_64",
"product": {
"name": "qemu-block-curl-2.11.2-9.33.1.x86_64",
"product_id": "qemu-block-curl-2.11.2-9.33.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-block-dmg-2.11.2-9.33.1.x86_64",
"product": {
"name": "qemu-block-dmg-2.11.2-9.33.1.x86_64",
"product_id": "qemu-block-dmg-2.11.2-9.33.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-block-iscsi-2.11.2-9.33.1.x86_64",
"product": {
"name": "qemu-block-iscsi-2.11.2-9.33.1.x86_64",
"product_id": "qemu-block-iscsi-2.11.2-9.33.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-block-rbd-2.11.2-9.33.1.x86_64",
"product": {
"name": "qemu-block-rbd-2.11.2-9.33.1.x86_64",
"product_id": "qemu-block-rbd-2.11.2-9.33.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-block-ssh-2.11.2-9.33.1.x86_64",
"product": {
"name": "qemu-block-ssh-2.11.2-9.33.1.x86_64",
"product_id": "qemu-block-ssh-2.11.2-9.33.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-extra-2.11.2-9.33.1.x86_64",
"product": {
"name": "qemu-extra-2.11.2-9.33.1.x86_64",
"product_id": "qemu-extra-2.11.2-9.33.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-guest-agent-2.11.2-9.33.1.x86_64",
"product": {
"name": "qemu-guest-agent-2.11.2-9.33.1.x86_64",
"product_id": "qemu-guest-agent-2.11.2-9.33.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-kvm-2.11.2-9.33.1.x86_64",
"product": {
"name": "qemu-kvm-2.11.2-9.33.1.x86_64",
"product_id": "qemu-kvm-2.11.2-9.33.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-lang-2.11.2-9.33.1.x86_64",
"product": {
"name": "qemu-lang-2.11.2-9.33.1.x86_64",
"product_id": "qemu-lang-2.11.2-9.33.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-linux-user-2.11.2-9.33.1.x86_64",
"product": {
"name": "qemu-linux-user-2.11.2-9.33.1.x86_64",
"product_id": "qemu-linux-user-2.11.2-9.33.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-ppc-2.11.2-9.33.1.x86_64",
"product": {
"name": "qemu-ppc-2.11.2-9.33.1.x86_64",
"product_id": "qemu-ppc-2.11.2-9.33.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-s390-2.11.2-9.33.1.x86_64",
"product": {
"name": "qemu-s390-2.11.2-9.33.1.x86_64",
"product_id": "qemu-s390-2.11.2-9.33.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-testsuite-2.11.2-9.33.1.x86_64",
"product": {
"name": "qemu-testsuite-2.11.2-9.33.1.x86_64",
"product_id": "qemu-testsuite-2.11.2-9.33.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-tools-2.11.2-9.33.1.x86_64",
"product": {
"name": "qemu-tools-2.11.2-9.33.1.x86_64",
"product_id": "qemu-tools-2.11.2-9.33.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-x86-2.11.2-9.33.1.x86_64",
"product": {
"name": "qemu-x86-2.11.2-9.33.1.x86_64",
"product_id": "qemu-x86-2.11.2-9.33.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Basesystem 15",
"product": {
"name": "SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-basesystem:15"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Server Applications 15",
"product": {
"name": "SUSE Linux Enterprise Module for Server Applications 15",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-server-applications:15"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-2.11.2-9.33.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:qemu-tools-2.11.2-9.33.1.aarch64"
},
"product_reference": "qemu-tools-2.11.2-9.33.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-2.11.2-9.33.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:qemu-tools-2.11.2-9.33.1.ppc64le"
},
"product_reference": "qemu-tools-2.11.2-9.33.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-2.11.2-9.33.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:qemu-tools-2.11.2-9.33.1.s390x"
},
"product_reference": "qemu-tools-2.11.2-9.33.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-2.11.2-9.33.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:qemu-tools-2.11.2-9.33.1.x86_64"
},
"product_reference": "qemu-tools-2.11.2-9.33.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-2.11.2-9.33.1.aarch64 as component of SUSE Linux Enterprise Module for Server Applications 15",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15:qemu-2.11.2-9.33.1.aarch64"
},
"product_reference": "qemu-2.11.2-9.33.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-2.11.2-9.33.1.ppc64le as component of SUSE Linux Enterprise Module for Server Applications 15",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15:qemu-2.11.2-9.33.1.ppc64le"
},
"product_reference": "qemu-2.11.2-9.33.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-2.11.2-9.33.1.s390x as component of SUSE Linux Enterprise Module for Server Applications 15",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15:qemu-2.11.2-9.33.1.s390x"
},
"product_reference": "qemu-2.11.2-9.33.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-2.11.2-9.33.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15:qemu-2.11.2-9.33.1.x86_64"
},
"product_reference": "qemu-2.11.2-9.33.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-arm-2.11.2-9.33.1.aarch64 as component of SUSE Linux Enterprise Module for Server Applications 15",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15:qemu-arm-2.11.2-9.33.1.aarch64"
},
"product_reference": "qemu-arm-2.11.2-9.33.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-2.11.2-9.33.1.aarch64 as component of SUSE Linux Enterprise Module for Server Applications 15",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15:qemu-block-curl-2.11.2-9.33.1.aarch64"
},
"product_reference": "qemu-block-curl-2.11.2-9.33.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-2.11.2-9.33.1.ppc64le as component of SUSE Linux Enterprise Module for Server Applications 15",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15:qemu-block-curl-2.11.2-9.33.1.ppc64le"
},
"product_reference": "qemu-block-curl-2.11.2-9.33.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-2.11.2-9.33.1.s390x as component of SUSE Linux Enterprise Module for Server Applications 15",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15:qemu-block-curl-2.11.2-9.33.1.s390x"
},
"product_reference": "qemu-block-curl-2.11.2-9.33.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-2.11.2-9.33.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15:qemu-block-curl-2.11.2-9.33.1.x86_64"
},
"product_reference": "qemu-block-curl-2.11.2-9.33.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-iscsi-2.11.2-9.33.1.aarch64 as component of SUSE Linux Enterprise Module for Server Applications 15",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15:qemu-block-iscsi-2.11.2-9.33.1.aarch64"
},
"product_reference": "qemu-block-iscsi-2.11.2-9.33.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-iscsi-2.11.2-9.33.1.ppc64le as component of SUSE Linux Enterprise Module for Server Applications 15",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15:qemu-block-iscsi-2.11.2-9.33.1.ppc64le"
},
"product_reference": "qemu-block-iscsi-2.11.2-9.33.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-iscsi-2.11.2-9.33.1.s390x as component of SUSE Linux Enterprise Module for Server Applications 15",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15:qemu-block-iscsi-2.11.2-9.33.1.s390x"
},
"product_reference": "qemu-block-iscsi-2.11.2-9.33.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-iscsi-2.11.2-9.33.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15:qemu-block-iscsi-2.11.2-9.33.1.x86_64"
},
"product_reference": "qemu-block-iscsi-2.11.2-9.33.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-rbd-2.11.2-9.33.1.aarch64 as component of SUSE Linux Enterprise Module for Server Applications 15",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15:qemu-block-rbd-2.11.2-9.33.1.aarch64"
},
"product_reference": "qemu-block-rbd-2.11.2-9.33.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-rbd-2.11.2-9.33.1.ppc64le as component of SUSE Linux Enterprise Module for Server Applications 15",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15:qemu-block-rbd-2.11.2-9.33.1.ppc64le"
},
"product_reference": "qemu-block-rbd-2.11.2-9.33.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-rbd-2.11.2-9.33.1.s390x as component of SUSE Linux Enterprise Module for Server Applications 15",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15:qemu-block-rbd-2.11.2-9.33.1.s390x"
},
"product_reference": "qemu-block-rbd-2.11.2-9.33.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-rbd-2.11.2-9.33.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15:qemu-block-rbd-2.11.2-9.33.1.x86_64"
},
"product_reference": "qemu-block-rbd-2.11.2-9.33.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-ssh-2.11.2-9.33.1.aarch64 as component of SUSE Linux Enterprise Module for Server Applications 15",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15:qemu-block-ssh-2.11.2-9.33.1.aarch64"
},
"product_reference": "qemu-block-ssh-2.11.2-9.33.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-ssh-2.11.2-9.33.1.ppc64le as component of SUSE Linux Enterprise Module for Server Applications 15",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15:qemu-block-ssh-2.11.2-9.33.1.ppc64le"
},
"product_reference": "qemu-block-ssh-2.11.2-9.33.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-ssh-2.11.2-9.33.1.s390x as component of SUSE Linux Enterprise Module for Server Applications 15",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15:qemu-block-ssh-2.11.2-9.33.1.s390x"
},
"product_reference": "qemu-block-ssh-2.11.2-9.33.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-ssh-2.11.2-9.33.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15:qemu-block-ssh-2.11.2-9.33.1.x86_64"
},
"product_reference": "qemu-block-ssh-2.11.2-9.33.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2.11.2-9.33.1.aarch64 as component of SUSE Linux Enterprise Module for Server Applications 15",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15:qemu-guest-agent-2.11.2-9.33.1.aarch64"
},
"product_reference": "qemu-guest-agent-2.11.2-9.33.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2.11.2-9.33.1.ppc64le as component of SUSE Linux Enterprise Module for Server Applications 15",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15:qemu-guest-agent-2.11.2-9.33.1.ppc64le"
},
"product_reference": "qemu-guest-agent-2.11.2-9.33.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2.11.2-9.33.1.s390x as component of SUSE Linux Enterprise Module for Server Applications 15",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15:qemu-guest-agent-2.11.2-9.33.1.s390x"
},
"product_reference": "qemu-guest-agent-2.11.2-9.33.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2.11.2-9.33.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15:qemu-guest-agent-2.11.2-9.33.1.x86_64"
},
"product_reference": "qemu-guest-agent-2.11.2-9.33.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ipxe-1.0.0+-9.33.1.noarch as component of SUSE Linux Enterprise Module for Server Applications 15",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15:qemu-ipxe-1.0.0+-9.33.1.noarch"
},
"product_reference": "qemu-ipxe-1.0.0+-9.33.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-2.11.2-9.33.1.s390x as component of SUSE Linux Enterprise Module for Server Applications 15",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15:qemu-kvm-2.11.2-9.33.1.s390x"
},
"product_reference": "qemu-kvm-2.11.2-9.33.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-2.11.2-9.33.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15:qemu-kvm-2.11.2-9.33.1.x86_64"
},
"product_reference": "qemu-kvm-2.11.2-9.33.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-2.11.2-9.33.1.aarch64 as component of SUSE Linux Enterprise Module for Server Applications 15",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15:qemu-lang-2.11.2-9.33.1.aarch64"
},
"product_reference": "qemu-lang-2.11.2-9.33.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-2.11.2-9.33.1.ppc64le as component of SUSE Linux Enterprise Module for Server Applications 15",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15:qemu-lang-2.11.2-9.33.1.ppc64le"
},
"product_reference": "qemu-lang-2.11.2-9.33.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-2.11.2-9.33.1.s390x as component of SUSE Linux Enterprise Module for Server Applications 15",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15:qemu-lang-2.11.2-9.33.1.s390x"
},
"product_reference": "qemu-lang-2.11.2-9.33.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-2.11.2-9.33.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15:qemu-lang-2.11.2-9.33.1.x86_64"
},
"product_reference": "qemu-lang-2.11.2-9.33.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ppc-2.11.2-9.33.1.ppc64le as component of SUSE Linux Enterprise Module for Server Applications 15",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15:qemu-ppc-2.11.2-9.33.1.ppc64le"
},
"product_reference": "qemu-ppc-2.11.2-9.33.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-s390-2.11.2-9.33.1.s390x as component of SUSE Linux Enterprise Module for Server Applications 15",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15:qemu-s390-2.11.2-9.33.1.s390x"
},
"product_reference": "qemu-s390-2.11.2-9.33.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-seabios-1.11.0-9.33.1.noarch as component of SUSE Linux Enterprise Module for Server Applications 15",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15:qemu-seabios-1.11.0-9.33.1.noarch"
},
"product_reference": "qemu-seabios-1.11.0-9.33.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-sgabios-8-9.33.1.noarch as component of SUSE Linux Enterprise Module for Server Applications 15",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15:qemu-sgabios-8-9.33.1.noarch"
},
"product_reference": "qemu-sgabios-8-9.33.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-vgabios-1.11.0-9.33.1.noarch as component of SUSE Linux Enterprise Module for Server Applications 15",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15:qemu-vgabios-1.11.0-9.33.1.noarch"
},
"product_reference": "qemu-vgabios-1.11.0-9.33.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-x86-2.11.2-9.33.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15:qemu-x86-2.11.2-9.33.1.x86_64"
},
"product_reference": "qemu-x86-2.11.2-9.33.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-12207",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-12207"
}
],
"notes": [
{
"category": "general",
"text": "Improper invalidation for page table updates by a virtual guest operating system for multiple Intel(R) Processors may allow an authenticated user to potentially enable denial of service of the host system via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15:qemu-tools-2.11.2-9.33.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:qemu-tools-2.11.2-9.33.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:qemu-tools-2.11.2-9.33.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:qemu-tools-2.11.2-9.33.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-2.11.2-9.33.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-2.11.2-9.33.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-2.11.2-9.33.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-2.11.2-9.33.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-arm-2.11.2-9.33.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-curl-2.11.2-9.33.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-curl-2.11.2-9.33.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-curl-2.11.2-9.33.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-curl-2.11.2-9.33.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-iscsi-2.11.2-9.33.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-iscsi-2.11.2-9.33.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-iscsi-2.11.2-9.33.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-iscsi-2.11.2-9.33.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-rbd-2.11.2-9.33.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-rbd-2.11.2-9.33.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-rbd-2.11.2-9.33.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-rbd-2.11.2-9.33.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-ssh-2.11.2-9.33.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-ssh-2.11.2-9.33.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-ssh-2.11.2-9.33.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-ssh-2.11.2-9.33.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-guest-agent-2.11.2-9.33.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-guest-agent-2.11.2-9.33.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-guest-agent-2.11.2-9.33.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-guest-agent-2.11.2-9.33.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-ipxe-1.0.0+-9.33.1.noarch",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-kvm-2.11.2-9.33.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-kvm-2.11.2-9.33.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-lang-2.11.2-9.33.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-lang-2.11.2-9.33.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-lang-2.11.2-9.33.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-lang-2.11.2-9.33.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-ppc-2.11.2-9.33.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-s390-2.11.2-9.33.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-seabios-1.11.0-9.33.1.noarch",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-sgabios-8-9.33.1.noarch",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-vgabios-1.11.0-9.33.1.noarch",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-x86-2.11.2-9.33.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-12207",
"url": "https://www.suse.com/security/cve/CVE-2018-12207"
},
{
"category": "external",
"summary": "SUSE Bug 1117665 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1117665"
},
{
"category": "external",
"summary": "SUSE Bug 1139073 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1139073"
},
{
"category": "external",
"summary": "SUSE Bug 1152505 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1152505"
},
{
"category": "external",
"summary": "SUSE Bug 1155812 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1155812"
},
{
"category": "external",
"summary": "SUSE Bug 1155817 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1155817"
},
{
"category": "external",
"summary": "SUSE Bug 1155945 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1155945"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1201877"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15:qemu-tools-2.11.2-9.33.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:qemu-tools-2.11.2-9.33.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:qemu-tools-2.11.2-9.33.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:qemu-tools-2.11.2-9.33.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-2.11.2-9.33.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-2.11.2-9.33.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-2.11.2-9.33.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-2.11.2-9.33.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-arm-2.11.2-9.33.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-curl-2.11.2-9.33.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-curl-2.11.2-9.33.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-curl-2.11.2-9.33.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-curl-2.11.2-9.33.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-iscsi-2.11.2-9.33.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-iscsi-2.11.2-9.33.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-iscsi-2.11.2-9.33.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-iscsi-2.11.2-9.33.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-rbd-2.11.2-9.33.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-rbd-2.11.2-9.33.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-rbd-2.11.2-9.33.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-rbd-2.11.2-9.33.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-ssh-2.11.2-9.33.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-ssh-2.11.2-9.33.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-ssh-2.11.2-9.33.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-ssh-2.11.2-9.33.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-guest-agent-2.11.2-9.33.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-guest-agent-2.11.2-9.33.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-guest-agent-2.11.2-9.33.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-guest-agent-2.11.2-9.33.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-ipxe-1.0.0+-9.33.1.noarch",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-kvm-2.11.2-9.33.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-kvm-2.11.2-9.33.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-lang-2.11.2-9.33.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-lang-2.11.2-9.33.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-lang-2.11.2-9.33.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-lang-2.11.2-9.33.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-ppc-2.11.2-9.33.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-s390-2.11.2-9.33.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-seabios-1.11.0-9.33.1.noarch",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-sgabios-8-9.33.1.noarch",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-vgabios-1.11.0-9.33.1.noarch",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-x86-2.11.2-9.33.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15:qemu-tools-2.11.2-9.33.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:qemu-tools-2.11.2-9.33.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:qemu-tools-2.11.2-9.33.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:qemu-tools-2.11.2-9.33.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-2.11.2-9.33.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-2.11.2-9.33.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-2.11.2-9.33.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-2.11.2-9.33.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-arm-2.11.2-9.33.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-curl-2.11.2-9.33.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-curl-2.11.2-9.33.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-curl-2.11.2-9.33.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-curl-2.11.2-9.33.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-iscsi-2.11.2-9.33.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-iscsi-2.11.2-9.33.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-iscsi-2.11.2-9.33.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-iscsi-2.11.2-9.33.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-rbd-2.11.2-9.33.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-rbd-2.11.2-9.33.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-rbd-2.11.2-9.33.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-rbd-2.11.2-9.33.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-ssh-2.11.2-9.33.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-ssh-2.11.2-9.33.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-ssh-2.11.2-9.33.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-ssh-2.11.2-9.33.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-guest-agent-2.11.2-9.33.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-guest-agent-2.11.2-9.33.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-guest-agent-2.11.2-9.33.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-guest-agent-2.11.2-9.33.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-ipxe-1.0.0+-9.33.1.noarch",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-kvm-2.11.2-9.33.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-kvm-2.11.2-9.33.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-lang-2.11.2-9.33.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-lang-2.11.2-9.33.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-lang-2.11.2-9.33.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-lang-2.11.2-9.33.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-ppc-2.11.2-9.33.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-s390-2.11.2-9.33.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-seabios-1.11.0-9.33.1.noarch",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-sgabios-8-9.33.1.noarch",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-vgabios-1.11.0-9.33.1.noarch",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-x86-2.11.2-9.33.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:14:28Z",
"details": "moderate"
}
],
"title": "CVE-2018-12207"
},
{
"cve": "CVE-2018-20126",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-20126"
}
],
"notes": [
{
"category": "general",
"text": "hw/rdma/vmw/pvrdma_cmd.c in QEMU allows create_cq and create_qp memory leaks because errors are mishandled.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15:qemu-tools-2.11.2-9.33.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:qemu-tools-2.11.2-9.33.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:qemu-tools-2.11.2-9.33.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:qemu-tools-2.11.2-9.33.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-2.11.2-9.33.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-2.11.2-9.33.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-2.11.2-9.33.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-2.11.2-9.33.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-arm-2.11.2-9.33.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-curl-2.11.2-9.33.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-curl-2.11.2-9.33.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-curl-2.11.2-9.33.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-curl-2.11.2-9.33.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-iscsi-2.11.2-9.33.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-iscsi-2.11.2-9.33.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-iscsi-2.11.2-9.33.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-iscsi-2.11.2-9.33.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-rbd-2.11.2-9.33.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-rbd-2.11.2-9.33.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-rbd-2.11.2-9.33.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-rbd-2.11.2-9.33.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-ssh-2.11.2-9.33.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-ssh-2.11.2-9.33.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-ssh-2.11.2-9.33.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-ssh-2.11.2-9.33.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-guest-agent-2.11.2-9.33.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-guest-agent-2.11.2-9.33.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-guest-agent-2.11.2-9.33.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-guest-agent-2.11.2-9.33.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-ipxe-1.0.0+-9.33.1.noarch",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-kvm-2.11.2-9.33.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-kvm-2.11.2-9.33.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-lang-2.11.2-9.33.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-lang-2.11.2-9.33.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-lang-2.11.2-9.33.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-lang-2.11.2-9.33.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-ppc-2.11.2-9.33.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-s390-2.11.2-9.33.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-seabios-1.11.0-9.33.1.noarch",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-sgabios-8-9.33.1.noarch",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-vgabios-1.11.0-9.33.1.noarch",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-x86-2.11.2-9.33.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-20126",
"url": "https://www.suse.com/security/cve/CVE-2018-20126"
},
{
"category": "external",
"summary": "SUSE Bug 1119991 for CVE-2018-20126",
"url": "https://bugzilla.suse.com/1119991"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15:qemu-tools-2.11.2-9.33.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:qemu-tools-2.11.2-9.33.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:qemu-tools-2.11.2-9.33.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:qemu-tools-2.11.2-9.33.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-2.11.2-9.33.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-2.11.2-9.33.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-2.11.2-9.33.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-2.11.2-9.33.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-arm-2.11.2-9.33.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-curl-2.11.2-9.33.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-curl-2.11.2-9.33.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-curl-2.11.2-9.33.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-curl-2.11.2-9.33.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-iscsi-2.11.2-9.33.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-iscsi-2.11.2-9.33.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-iscsi-2.11.2-9.33.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-iscsi-2.11.2-9.33.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-rbd-2.11.2-9.33.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-rbd-2.11.2-9.33.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-rbd-2.11.2-9.33.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-rbd-2.11.2-9.33.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-ssh-2.11.2-9.33.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-ssh-2.11.2-9.33.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-ssh-2.11.2-9.33.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-ssh-2.11.2-9.33.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-guest-agent-2.11.2-9.33.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-guest-agent-2.11.2-9.33.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-guest-agent-2.11.2-9.33.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-guest-agent-2.11.2-9.33.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-ipxe-1.0.0+-9.33.1.noarch",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-kvm-2.11.2-9.33.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-kvm-2.11.2-9.33.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-lang-2.11.2-9.33.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-lang-2.11.2-9.33.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-lang-2.11.2-9.33.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-lang-2.11.2-9.33.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-ppc-2.11.2-9.33.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-s390-2.11.2-9.33.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-seabios-1.11.0-9.33.1.noarch",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-sgabios-8-9.33.1.noarch",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-vgabios-1.11.0-9.33.1.noarch",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-x86-2.11.2-9.33.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.8,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15:qemu-tools-2.11.2-9.33.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:qemu-tools-2.11.2-9.33.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:qemu-tools-2.11.2-9.33.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:qemu-tools-2.11.2-9.33.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-2.11.2-9.33.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-2.11.2-9.33.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-2.11.2-9.33.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-2.11.2-9.33.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-arm-2.11.2-9.33.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-curl-2.11.2-9.33.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-curl-2.11.2-9.33.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-curl-2.11.2-9.33.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-curl-2.11.2-9.33.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-iscsi-2.11.2-9.33.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-iscsi-2.11.2-9.33.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-iscsi-2.11.2-9.33.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-iscsi-2.11.2-9.33.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-rbd-2.11.2-9.33.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-rbd-2.11.2-9.33.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-rbd-2.11.2-9.33.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-rbd-2.11.2-9.33.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-ssh-2.11.2-9.33.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-ssh-2.11.2-9.33.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-ssh-2.11.2-9.33.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-ssh-2.11.2-9.33.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-guest-agent-2.11.2-9.33.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-guest-agent-2.11.2-9.33.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-guest-agent-2.11.2-9.33.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-guest-agent-2.11.2-9.33.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-ipxe-1.0.0+-9.33.1.noarch",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-kvm-2.11.2-9.33.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-kvm-2.11.2-9.33.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-lang-2.11.2-9.33.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-lang-2.11.2-9.33.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-lang-2.11.2-9.33.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-lang-2.11.2-9.33.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-ppc-2.11.2-9.33.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-s390-2.11.2-9.33.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-seabios-1.11.0-9.33.1.noarch",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-sgabios-8-9.33.1.noarch",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-vgabios-1.11.0-9.33.1.noarch",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-x86-2.11.2-9.33.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:14:28Z",
"details": "low"
}
],
"title": "CVE-2018-20126"
},
{
"cve": "CVE-2019-11135",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11135"
}
],
"notes": [
{
"category": "general",
"text": "TSX Asynchronous Abort condition on some CPUs utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15:qemu-tools-2.11.2-9.33.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:qemu-tools-2.11.2-9.33.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:qemu-tools-2.11.2-9.33.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:qemu-tools-2.11.2-9.33.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-2.11.2-9.33.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-2.11.2-9.33.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-2.11.2-9.33.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-2.11.2-9.33.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-arm-2.11.2-9.33.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-curl-2.11.2-9.33.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-curl-2.11.2-9.33.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-curl-2.11.2-9.33.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-curl-2.11.2-9.33.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-iscsi-2.11.2-9.33.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-iscsi-2.11.2-9.33.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-iscsi-2.11.2-9.33.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-iscsi-2.11.2-9.33.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-rbd-2.11.2-9.33.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-rbd-2.11.2-9.33.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-rbd-2.11.2-9.33.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-rbd-2.11.2-9.33.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-ssh-2.11.2-9.33.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-ssh-2.11.2-9.33.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-ssh-2.11.2-9.33.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-ssh-2.11.2-9.33.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-guest-agent-2.11.2-9.33.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-guest-agent-2.11.2-9.33.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-guest-agent-2.11.2-9.33.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-guest-agent-2.11.2-9.33.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-ipxe-1.0.0+-9.33.1.noarch",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-kvm-2.11.2-9.33.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-kvm-2.11.2-9.33.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-lang-2.11.2-9.33.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-lang-2.11.2-9.33.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-lang-2.11.2-9.33.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-lang-2.11.2-9.33.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-ppc-2.11.2-9.33.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-s390-2.11.2-9.33.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-seabios-1.11.0-9.33.1.noarch",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-sgabios-8-9.33.1.noarch",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-vgabios-1.11.0-9.33.1.noarch",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-x86-2.11.2-9.33.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11135",
"url": "https://www.suse.com/security/cve/CVE-2019-11135"
},
{
"category": "external",
"summary": "SUSE Bug 1139073 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1139073"
},
{
"category": "external",
"summary": "SUSE Bug 1152497 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1152497"
},
{
"category": "external",
"summary": "SUSE Bug 1152505 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1152505"
},
{
"category": "external",
"summary": "SUSE Bug 1152506 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1152506"
},
{
"category": "external",
"summary": "SUSE Bug 1160120 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1160120"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1201877"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15:qemu-tools-2.11.2-9.33.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:qemu-tools-2.11.2-9.33.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:qemu-tools-2.11.2-9.33.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:qemu-tools-2.11.2-9.33.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-2.11.2-9.33.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-2.11.2-9.33.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-2.11.2-9.33.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-2.11.2-9.33.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-arm-2.11.2-9.33.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-curl-2.11.2-9.33.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-curl-2.11.2-9.33.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-curl-2.11.2-9.33.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-curl-2.11.2-9.33.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-iscsi-2.11.2-9.33.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-iscsi-2.11.2-9.33.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-iscsi-2.11.2-9.33.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-iscsi-2.11.2-9.33.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-rbd-2.11.2-9.33.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-rbd-2.11.2-9.33.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-rbd-2.11.2-9.33.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-rbd-2.11.2-9.33.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-ssh-2.11.2-9.33.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-ssh-2.11.2-9.33.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-ssh-2.11.2-9.33.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-ssh-2.11.2-9.33.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-guest-agent-2.11.2-9.33.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-guest-agent-2.11.2-9.33.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-guest-agent-2.11.2-9.33.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-guest-agent-2.11.2-9.33.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-ipxe-1.0.0+-9.33.1.noarch",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-kvm-2.11.2-9.33.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-kvm-2.11.2-9.33.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-lang-2.11.2-9.33.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-lang-2.11.2-9.33.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-lang-2.11.2-9.33.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-lang-2.11.2-9.33.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-ppc-2.11.2-9.33.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-s390-2.11.2-9.33.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-seabios-1.11.0-9.33.1.noarch",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-sgabios-8-9.33.1.noarch",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-vgabios-1.11.0-9.33.1.noarch",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-x86-2.11.2-9.33.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15:qemu-tools-2.11.2-9.33.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:qemu-tools-2.11.2-9.33.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:qemu-tools-2.11.2-9.33.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:qemu-tools-2.11.2-9.33.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-2.11.2-9.33.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-2.11.2-9.33.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-2.11.2-9.33.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-2.11.2-9.33.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-arm-2.11.2-9.33.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-curl-2.11.2-9.33.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-curl-2.11.2-9.33.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-curl-2.11.2-9.33.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-curl-2.11.2-9.33.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-iscsi-2.11.2-9.33.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-iscsi-2.11.2-9.33.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-iscsi-2.11.2-9.33.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-iscsi-2.11.2-9.33.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-rbd-2.11.2-9.33.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-rbd-2.11.2-9.33.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-rbd-2.11.2-9.33.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-rbd-2.11.2-9.33.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-ssh-2.11.2-9.33.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-ssh-2.11.2-9.33.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-ssh-2.11.2-9.33.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-ssh-2.11.2-9.33.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-guest-agent-2.11.2-9.33.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-guest-agent-2.11.2-9.33.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-guest-agent-2.11.2-9.33.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-guest-agent-2.11.2-9.33.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-ipxe-1.0.0+-9.33.1.noarch",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-kvm-2.11.2-9.33.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-kvm-2.11.2-9.33.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-lang-2.11.2-9.33.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-lang-2.11.2-9.33.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-lang-2.11.2-9.33.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-lang-2.11.2-9.33.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-ppc-2.11.2-9.33.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-s390-2.11.2-9.33.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-seabios-1.11.0-9.33.1.noarch",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-sgabios-8-9.33.1.noarch",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-vgabios-1.11.0-9.33.1.noarch",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-x86-2.11.2-9.33.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:14:28Z",
"details": "moderate"
}
],
"title": "CVE-2019-11135"
},
{
"cve": "CVE-2019-12068",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-12068"
}
],
"notes": [
{
"category": "general",
"text": "In QEMU 1:4.1-1, 1:2.1+dfsg-12+deb8u6, 1:2.8+dfsg-6+deb9u8, 1:3.1+dfsg-8~deb10u1, 1:3.1+dfsg-8+deb10u2, and 1:2.1+dfsg-12+deb8u12 (fixed), when executing script in lsi_execute_script(), the LSI scsi adapter emulator advances \u0027s-\u003edsp\u0027 index to read next opcode. This can lead to an infinite loop if the next opcode is empty. Move the existing loop exit after 10k iterations so that it covers no-op opcodes as well.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15:qemu-tools-2.11.2-9.33.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:qemu-tools-2.11.2-9.33.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:qemu-tools-2.11.2-9.33.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:qemu-tools-2.11.2-9.33.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-2.11.2-9.33.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-2.11.2-9.33.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-2.11.2-9.33.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-2.11.2-9.33.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-arm-2.11.2-9.33.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-curl-2.11.2-9.33.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-curl-2.11.2-9.33.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-curl-2.11.2-9.33.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-curl-2.11.2-9.33.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-iscsi-2.11.2-9.33.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-iscsi-2.11.2-9.33.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-iscsi-2.11.2-9.33.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-iscsi-2.11.2-9.33.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-rbd-2.11.2-9.33.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-rbd-2.11.2-9.33.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-rbd-2.11.2-9.33.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-rbd-2.11.2-9.33.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-ssh-2.11.2-9.33.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-ssh-2.11.2-9.33.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-ssh-2.11.2-9.33.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-ssh-2.11.2-9.33.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-guest-agent-2.11.2-9.33.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-guest-agent-2.11.2-9.33.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-guest-agent-2.11.2-9.33.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-guest-agent-2.11.2-9.33.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-ipxe-1.0.0+-9.33.1.noarch",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-kvm-2.11.2-9.33.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-kvm-2.11.2-9.33.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-lang-2.11.2-9.33.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-lang-2.11.2-9.33.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-lang-2.11.2-9.33.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-lang-2.11.2-9.33.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-ppc-2.11.2-9.33.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-s390-2.11.2-9.33.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-seabios-1.11.0-9.33.1.noarch",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-sgabios-8-9.33.1.noarch",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-vgabios-1.11.0-9.33.1.noarch",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-x86-2.11.2-9.33.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-12068",
"url": "https://www.suse.com/security/cve/CVE-2019-12068"
},
{
"category": "external",
"summary": "SUSE Bug 1146873 for CVE-2019-12068",
"url": "https://bugzilla.suse.com/1146873"
},
{
"category": "external",
"summary": "SUSE Bug 1146874 for CVE-2019-12068",
"url": "https://bugzilla.suse.com/1146874"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2019-12068",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15:qemu-tools-2.11.2-9.33.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:qemu-tools-2.11.2-9.33.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:qemu-tools-2.11.2-9.33.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:qemu-tools-2.11.2-9.33.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-2.11.2-9.33.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-2.11.2-9.33.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-2.11.2-9.33.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-2.11.2-9.33.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-arm-2.11.2-9.33.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-curl-2.11.2-9.33.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-curl-2.11.2-9.33.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-curl-2.11.2-9.33.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-curl-2.11.2-9.33.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-iscsi-2.11.2-9.33.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-iscsi-2.11.2-9.33.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-iscsi-2.11.2-9.33.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-iscsi-2.11.2-9.33.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-rbd-2.11.2-9.33.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-rbd-2.11.2-9.33.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-rbd-2.11.2-9.33.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-rbd-2.11.2-9.33.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-ssh-2.11.2-9.33.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-ssh-2.11.2-9.33.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-ssh-2.11.2-9.33.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-ssh-2.11.2-9.33.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-guest-agent-2.11.2-9.33.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-guest-agent-2.11.2-9.33.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-guest-agent-2.11.2-9.33.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-guest-agent-2.11.2-9.33.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-ipxe-1.0.0+-9.33.1.noarch",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-kvm-2.11.2-9.33.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-kvm-2.11.2-9.33.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-lang-2.11.2-9.33.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-lang-2.11.2-9.33.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-lang-2.11.2-9.33.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-lang-2.11.2-9.33.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-ppc-2.11.2-9.33.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-s390-2.11.2-9.33.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-seabios-1.11.0-9.33.1.noarch",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-sgabios-8-9.33.1.noarch",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-vgabios-1.11.0-9.33.1.noarch",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-x86-2.11.2-9.33.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15:qemu-tools-2.11.2-9.33.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:qemu-tools-2.11.2-9.33.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:qemu-tools-2.11.2-9.33.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:qemu-tools-2.11.2-9.33.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-2.11.2-9.33.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-2.11.2-9.33.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-2.11.2-9.33.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-2.11.2-9.33.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-arm-2.11.2-9.33.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-curl-2.11.2-9.33.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-curl-2.11.2-9.33.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-curl-2.11.2-9.33.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-curl-2.11.2-9.33.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-iscsi-2.11.2-9.33.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-iscsi-2.11.2-9.33.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-iscsi-2.11.2-9.33.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-iscsi-2.11.2-9.33.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-rbd-2.11.2-9.33.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-rbd-2.11.2-9.33.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-rbd-2.11.2-9.33.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-rbd-2.11.2-9.33.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-ssh-2.11.2-9.33.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-ssh-2.11.2-9.33.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-ssh-2.11.2-9.33.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-block-ssh-2.11.2-9.33.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-guest-agent-2.11.2-9.33.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-guest-agent-2.11.2-9.33.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-guest-agent-2.11.2-9.33.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-guest-agent-2.11.2-9.33.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-ipxe-1.0.0+-9.33.1.noarch",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-kvm-2.11.2-9.33.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-kvm-2.11.2-9.33.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-lang-2.11.2-9.33.1.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-lang-2.11.2-9.33.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-lang-2.11.2-9.33.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-lang-2.11.2-9.33.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-ppc-2.11.2-9.33.1.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-s390-2.11.2-9.33.1.s390x",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-seabios-1.11.0-9.33.1.noarch",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-sgabios-8-9.33.1.noarch",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-vgabios-1.11.0-9.33.1.noarch",
"SUSE Linux Enterprise Module for Server Applications 15:qemu-x86-2.11.2-9.33.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:14:28Z",
"details": "moderate"
}
],
"title": "CVE-2019-12068"
}
]
}
suse-su-2019:2961-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for xen",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for xen fixes the following issues:\n\n- CVE-2018-12207: Untrusted virtual machines on Intel CPUs could exploit a race\n condition in the Instruction Fetch Unit of the Intel CPU to cause a Machine\n Exception during Page Size Change, causing the CPU core to be non-functional.\n (bsc#1155945)\n- CVE-2019-11135: Aborting an asynchronous TSX operation on Intel CPUs with\n Transactional Memory support could be used to facilitate sidechannel\n information leaks out of microarchitectural buffers, similar to the\n previously described \u0027Microarchitectural Data Sampling\u0027 attack. (bsc#1152497).\n- CVE-2019-18423: A malicious guest administrator may cause a hypervisor crash,\n resulting in a Denial of Service (DoS). (bsc#1154460).\n- CVE-2019-18422: A malicious ARM guest might contrive to arrange for critical \n Xen code to run with interrupts erroneously enabled. This could lead to data\n corruption, denial of service, or possibly even privilege escalation. However\n a precise attack technique has not been identified. (bsc#1154464)\n- CVE-2019-18424: An untrusted domain with access to a physical device can DMA \n into host memory, leading to privilege escalation. (bsc#1154461).\n- CVE-2019-18421: A malicious PV guest administrator may have been able to\n escalate their privilege to that of the host. (bsc#1154458).\n- CVE-2019-18425: 32-bit PV guest user mode could elevate its privileges to that \n of the guest kernel. (bsc#1154456).\n- CVE-2019-18420: Malicious x86 PV guests may have caused a hypervisor crash, \n resulting in a Denial of Service (Dos). (bsc#1154448)\n- Upstream bug fixes (bsc#1027519)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2019-2961,SUSE-SLE-Module-Basesystem-15-SP1-2019-2961,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-2961,SUSE-SLE-Module-Server-Applications-15-SP1-2019-2961",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_2961-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2019:2961-1",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192961-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2019:2961-1",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192961-1.html"
},
{
"category": "self",
"summary": "SUSE Bug 1027519",
"url": "https://bugzilla.suse.com/1027519"
},
{
"category": "self",
"summary": "SUSE Bug 1152497",
"url": "https://bugzilla.suse.com/1152497"
},
{
"category": "self",
"summary": "SUSE Bug 1154448",
"url": "https://bugzilla.suse.com/1154448"
},
{
"category": "self",
"summary": "SUSE Bug 1154456",
"url": "https://bugzilla.suse.com/1154456"
},
{
"category": "self",
"summary": "SUSE Bug 1154458",
"url": "https://bugzilla.suse.com/1154458"
},
{
"category": "self",
"summary": "SUSE Bug 1154460",
"url": "https://bugzilla.suse.com/1154460"
},
{
"category": "self",
"summary": "SUSE Bug 1154461",
"url": "https://bugzilla.suse.com/1154461"
},
{
"category": "self",
"summary": "SUSE Bug 1154464",
"url": "https://bugzilla.suse.com/1154464"
},
{
"category": "self",
"summary": "SUSE Bug 1155945",
"url": "https://bugzilla.suse.com/1155945"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-12207 page",
"url": "https://www.suse.com/security/cve/CVE-2018-12207/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11135 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11135/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-18420 page",
"url": "https://www.suse.com/security/cve/CVE-2019-18420/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-18421 page",
"url": "https://www.suse.com/security/cve/CVE-2019-18421/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-18422 page",
"url": "https://www.suse.com/security/cve/CVE-2019-18422/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-18423 page",
"url": "https://www.suse.com/security/cve/CVE-2019-18423/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-18424 page",
"url": "https://www.suse.com/security/cve/CVE-2019-18424/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-18425 page",
"url": "https://www.suse.com/security/cve/CVE-2019-18425/"
}
],
"title": "Security update for xen",
"tracking": {
"current_release_date": "2019-11-12T18:17:44Z",
"generator": {
"date": "2019-11-12T18:17:44Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2019:2961-1",
"initial_release_date": "2019-11-12T18:17:44Z",
"revision_history": [
{
"date": "2019-11-12T18:17:44Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "xen-4.12.1_04-3.6.1.aarch64",
"product": {
"name": "xen-4.12.1_04-3.6.1.aarch64",
"product_id": "xen-4.12.1_04-3.6.1.aarch64"
}
},
{
"category": "product_version",
"name": "xen-devel-4.12.1_04-3.6.1.aarch64",
"product": {
"name": "xen-devel-4.12.1_04-3.6.1.aarch64",
"product_id": "xen-devel-4.12.1_04-3.6.1.aarch64"
}
},
{
"category": "product_version",
"name": "xen-doc-html-4.12.1_04-3.6.1.aarch64",
"product": {
"name": "xen-doc-html-4.12.1_04-3.6.1.aarch64",
"product_id": "xen-doc-html-4.12.1_04-3.6.1.aarch64"
}
},
{
"category": "product_version",
"name": "xen-libs-4.12.1_04-3.6.1.aarch64",
"product": {
"name": "xen-libs-4.12.1_04-3.6.1.aarch64",
"product_id": "xen-libs-4.12.1_04-3.6.1.aarch64"
}
},
{
"category": "product_version",
"name": "xen-tools-4.12.1_04-3.6.1.aarch64",
"product": {
"name": "xen-tools-4.12.1_04-3.6.1.aarch64",
"product_id": "xen-tools-4.12.1_04-3.6.1.aarch64"
}
},
{
"category": "product_version",
"name": "xen-tools-domU-4.12.1_04-3.6.1.aarch64",
"product": {
"name": "xen-tools-domU-4.12.1_04-3.6.1.aarch64",
"product_id": "xen-tools-domU-4.12.1_04-3.6.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "xen-libs-64bit-4.12.1_04-3.6.1.aarch64_ilp32",
"product": {
"name": "xen-libs-64bit-4.12.1_04-3.6.1.aarch64_ilp32",
"product_id": "xen-libs-64bit-4.12.1_04-3.6.1.aarch64_ilp32"
}
}
],
"category": "architecture",
"name": "aarch64_ilp32"
},
{
"branches": [
{
"category": "product_version",
"name": "xen-devel-4.12.1_04-3.6.1.i586",
"product": {
"name": "xen-devel-4.12.1_04-3.6.1.i586",
"product_id": "xen-devel-4.12.1_04-3.6.1.i586"
}
},
{
"category": "product_version",
"name": "xen-libs-4.12.1_04-3.6.1.i586",
"product": {
"name": "xen-libs-4.12.1_04-3.6.1.i586",
"product_id": "xen-libs-4.12.1_04-3.6.1.i586"
}
},
{
"category": "product_version",
"name": "xen-tools-domU-4.12.1_04-3.6.1.i586",
"product": {
"name": "xen-tools-domU-4.12.1_04-3.6.1.i586",
"product_id": "xen-tools-domU-4.12.1_04-3.6.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "xen-4.12.1_04-3.6.1.x86_64",
"product": {
"name": "xen-4.12.1_04-3.6.1.x86_64",
"product_id": "xen-4.12.1_04-3.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-devel-4.12.1_04-3.6.1.x86_64",
"product": {
"name": "xen-devel-4.12.1_04-3.6.1.x86_64",
"product_id": "xen-devel-4.12.1_04-3.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-doc-html-4.12.1_04-3.6.1.x86_64",
"product": {
"name": "xen-doc-html-4.12.1_04-3.6.1.x86_64",
"product_id": "xen-doc-html-4.12.1_04-3.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-libs-4.12.1_04-3.6.1.x86_64",
"product": {
"name": "xen-libs-4.12.1_04-3.6.1.x86_64",
"product_id": "xen-libs-4.12.1_04-3.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-libs-32bit-4.12.1_04-3.6.1.x86_64",
"product": {
"name": "xen-libs-32bit-4.12.1_04-3.6.1.x86_64",
"product_id": "xen-libs-32bit-4.12.1_04-3.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-tools-4.12.1_04-3.6.1.x86_64",
"product": {
"name": "xen-tools-4.12.1_04-3.6.1.x86_64",
"product_id": "xen-tools-4.12.1_04-3.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-tools-domU-4.12.1_04-3.6.1.x86_64",
"product": {
"name": "xen-tools-domU-4.12.1_04-3.6.1.x86_64",
"product_id": "xen-tools-domU-4.12.1_04-3.6.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product": {
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-basesystem:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Server Applications 15 SP1",
"product": {
"name": "SUSE Linux Enterprise Module for Server Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-server-applications:15:sp1"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.12.1_04-3.6.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:xen-libs-4.12.1_04-3.6.1.x86_64"
},
"product_reference": "xen-libs-4.12.1_04-3.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-domU-4.12.1_04-3.6.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:xen-tools-domU-4.12.1_04-3.6.1.x86_64"
},
"product_reference": "xen-tools-domU-4.12.1_04-3.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-4.12.1_04-3.6.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP1:xen-4.12.1_04-3.6.1.x86_64"
},
"product_reference": "xen-4.12.1_04-3.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-devel-4.12.1_04-3.6.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP1:xen-devel-4.12.1_04-3.6.1.x86_64"
},
"product_reference": "xen-devel-4.12.1_04-3.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-4.12.1_04-3.6.1.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP1:xen-tools-4.12.1_04-3.6.1.x86_64"
},
"product_reference": "xen-tools-4.12.1_04-3.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-12207",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-12207"
}
],
"notes": [
{
"category": "general",
"text": "Improper invalidation for page table updates by a virtual guest operating system for multiple Intel(R) Processors may allow an authenticated user to potentially enable denial of service of the host system via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:xen-libs-4.12.1_04-3.6.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:xen-tools-domU-4.12.1_04-3.6.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:xen-4.12.1_04-3.6.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:xen-devel-4.12.1_04-3.6.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:xen-tools-4.12.1_04-3.6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-12207",
"url": "https://www.suse.com/security/cve/CVE-2018-12207"
},
{
"category": "external",
"summary": "SUSE Bug 1117665 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1117665"
},
{
"category": "external",
"summary": "SUSE Bug 1139073 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1139073"
},
{
"category": "external",
"summary": "SUSE Bug 1152505 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1152505"
},
{
"category": "external",
"summary": "SUSE Bug 1155812 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1155812"
},
{
"category": "external",
"summary": "SUSE Bug 1155817 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1155817"
},
{
"category": "external",
"summary": "SUSE Bug 1155945 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1155945"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1201877"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:xen-libs-4.12.1_04-3.6.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:xen-tools-domU-4.12.1_04-3.6.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:xen-4.12.1_04-3.6.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:xen-devel-4.12.1_04-3.6.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:xen-tools-4.12.1_04-3.6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:xen-libs-4.12.1_04-3.6.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:xen-tools-domU-4.12.1_04-3.6.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:xen-4.12.1_04-3.6.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:xen-devel-4.12.1_04-3.6.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:xen-tools-4.12.1_04-3.6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:17:44Z",
"details": "moderate"
}
],
"title": "CVE-2018-12207"
},
{
"cve": "CVE-2019-11135",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11135"
}
],
"notes": [
{
"category": "general",
"text": "TSX Asynchronous Abort condition on some CPUs utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:xen-libs-4.12.1_04-3.6.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:xen-tools-domU-4.12.1_04-3.6.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:xen-4.12.1_04-3.6.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:xen-devel-4.12.1_04-3.6.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:xen-tools-4.12.1_04-3.6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11135",
"url": "https://www.suse.com/security/cve/CVE-2019-11135"
},
{
"category": "external",
"summary": "SUSE Bug 1139073 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1139073"
},
{
"category": "external",
"summary": "SUSE Bug 1152497 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1152497"
},
{
"category": "external",
"summary": "SUSE Bug 1152505 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1152505"
},
{
"category": "external",
"summary": "SUSE Bug 1152506 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1152506"
},
{
"category": "external",
"summary": "SUSE Bug 1160120 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1160120"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1201877"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:xen-libs-4.12.1_04-3.6.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:xen-tools-domU-4.12.1_04-3.6.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:xen-4.12.1_04-3.6.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:xen-devel-4.12.1_04-3.6.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:xen-tools-4.12.1_04-3.6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:xen-libs-4.12.1_04-3.6.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:xen-tools-domU-4.12.1_04-3.6.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:xen-4.12.1_04-3.6.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:xen-devel-4.12.1_04-3.6.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:xen-tools-4.12.1_04-3.6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:17:44Z",
"details": "moderate"
}
],
"title": "CVE-2019-11135"
},
{
"cve": "CVE-2019-18420",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-18420"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Xen through 4.12.x allowing x86 PV guest OS users to cause a denial of service via a VCPUOP_initialise hypercall. hypercall_create_continuation() is a variadic function which uses a printf-like format string to interpret its parameters. Error handling for a bad format character was done using BUG(), which crashes Xen. One path, via the VCPUOP_initialise hypercall, has a bad format character. The BUG() can be hit if VCPUOP_initialise executes for a sufficiently long period of time for a continuation to be created. Malicious guests may cause a hypervisor crash, resulting in a Denial of Service (DoS). Xen versions 4.6 and newer are vulnerable. Xen versions 4.5 and earlier are not vulnerable. Only x86 PV guests can exploit the vulnerability. HVM and PVH guests, and guests on ARM systems, cannot exploit the vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:xen-libs-4.12.1_04-3.6.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:xen-tools-domU-4.12.1_04-3.6.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:xen-4.12.1_04-3.6.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:xen-devel-4.12.1_04-3.6.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:xen-tools-4.12.1_04-3.6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-18420",
"url": "https://www.suse.com/security/cve/CVE-2019-18420"
},
{
"category": "external",
"summary": "SUSE Bug 1154448 for CVE-2019-18420",
"url": "https://bugzilla.suse.com/1154448"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:xen-libs-4.12.1_04-3.6.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:xen-tools-domU-4.12.1_04-3.6.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:xen-4.12.1_04-3.6.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:xen-devel-4.12.1_04-3.6.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:xen-tools-4.12.1_04-3.6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:xen-libs-4.12.1_04-3.6.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:xen-tools-domU-4.12.1_04-3.6.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:xen-4.12.1_04-3.6.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:xen-devel-4.12.1_04-3.6.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:xen-tools-4.12.1_04-3.6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:17:44Z",
"details": "important"
}
],
"title": "CVE-2019-18420"
},
{
"cve": "CVE-2019-18421",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-18421"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Xen through 4.12.x allowing x86 PV guest OS users to gain host OS privileges by leveraging race conditions in pagetable promotion and demotion operations. There are issues with restartable PV type change operations. To avoid using shadow pagetables for PV guests, Xen exposes the actual hardware pagetables to the guest. In order to prevent the guest from modifying these page tables directly, Xen keeps track of how pages are used using a type system; pages must be \"promoted\" before being used as a pagetable, and \"demoted\" before being used for any other type. Xen also allows for \"recursive\" promotions: i.e., an operating system promoting a page to an L4 pagetable may end up causing pages to be promoted to L3s, which may in turn cause pages to be promoted to L2s, and so on. These operations may take an arbitrarily large amount of time, and so must be re-startable. Unfortunately, making recursive pagetable promotion and demotion operations restartable is incredibly complicated, and the code contains several races which, if triggered, can cause Xen to drop or retain extra type counts, potentially allowing guests to get write access to in-use pagetables. A malicious PV guest administrator may be able to escalate their privilege to that of the host. All x86 systems with untrusted PV guests are vulnerable. HVM and PVH guests cannot exercise this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:xen-libs-4.12.1_04-3.6.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:xen-tools-domU-4.12.1_04-3.6.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:xen-4.12.1_04-3.6.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:xen-devel-4.12.1_04-3.6.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:xen-tools-4.12.1_04-3.6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-18421",
"url": "https://www.suse.com/security/cve/CVE-2019-18421"
},
{
"category": "external",
"summary": "SUSE Bug 1154458 for CVE-2019-18421",
"url": "https://bugzilla.suse.com/1154458"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2019-18421",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:xen-libs-4.12.1_04-3.6.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:xen-tools-domU-4.12.1_04-3.6.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:xen-4.12.1_04-3.6.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:xen-devel-4.12.1_04-3.6.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:xen-tools-4.12.1_04-3.6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:xen-libs-4.12.1_04-3.6.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:xen-tools-domU-4.12.1_04-3.6.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:xen-4.12.1_04-3.6.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:xen-devel-4.12.1_04-3.6.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:xen-tools-4.12.1_04-3.6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:17:44Z",
"details": "important"
}
],
"title": "CVE-2019-18421"
},
{
"cve": "CVE-2019-18422",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-18422"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Xen through 4.12.x allowing ARM guest OS users to cause a denial of service or gain privileges by leveraging the erroneous enabling of interrupts. Interrupts are unconditionally unmasked in exception handlers. When an exception occurs on an ARM system which is handled without changing processor level, some interrupts are unconditionally enabled during exception entry. So exceptions which occur when interrupts are masked will effectively unmask the interrupts. A malicious guest might contrive to arrange for critical Xen code to run with interrupts erroneously enabled. This could lead to data corruption, denial of service, or possibly even privilege escalation. However a precise attack technique has not been identified.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:xen-libs-4.12.1_04-3.6.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:xen-tools-domU-4.12.1_04-3.6.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:xen-4.12.1_04-3.6.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:xen-devel-4.12.1_04-3.6.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:xen-tools-4.12.1_04-3.6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-18422",
"url": "https://www.suse.com/security/cve/CVE-2019-18422"
},
{
"category": "external",
"summary": "SUSE Bug 1154464 for CVE-2019-18422",
"url": "https://bugzilla.suse.com/1154464"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:xen-libs-4.12.1_04-3.6.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:xen-tools-domU-4.12.1_04-3.6.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:xen-4.12.1_04-3.6.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:xen-devel-4.12.1_04-3.6.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:xen-tools-4.12.1_04-3.6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:xen-libs-4.12.1_04-3.6.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:xen-tools-domU-4.12.1_04-3.6.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:xen-4.12.1_04-3.6.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:xen-devel-4.12.1_04-3.6.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:xen-tools-4.12.1_04-3.6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:17:44Z",
"details": "important"
}
],
"title": "CVE-2019-18422"
},
{
"cve": "CVE-2019-18423",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-18423"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Xen through 4.12.x allowing ARM guest OS users to cause a denial of service via a XENMEM_add_to_physmap hypercall. p2m-\u003emax_mapped_gfn is used by the functions p2m_resolve_translation_fault() and p2m_get_entry() to sanity check guest physical frame. The rest of the code in the two functions will assume that there is a valid root table and check that with BUG_ON(). The function p2m_get_root_pointer() will ignore the unused top bits of a guest physical frame. This means that the function p2m_set_entry() will alias the frame. However, p2m-\u003emax_mapped_gfn will be updated using the original frame. It would be possible to set p2m-\u003emax_mapped_gfn high enough to cover a frame that would lead p2m_get_root_pointer() to return NULL in p2m_get_entry() and p2m_resolve_translation_fault(). Additionally, the sanity check on p2m-\u003emax_mapped_gfn is off-by-one allowing \"highest mapped + 1\" to be considered valid. However, p2m_get_root_pointer() will return NULL. The problem could be triggered with a specially crafted hypercall XENMEM_add_to_physmap{, _batch} followed by an access to an address (via hypercall or direct access) that passes the sanity check but cause p2m_get_root_pointer() to return NULL. A malicious guest administrator may cause a hypervisor crash, resulting in a Denial of Service (DoS). Xen version 4.8 and newer are vulnerable. Only Arm systems are vulnerable. x86 systems are not affected.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:xen-libs-4.12.1_04-3.6.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:xen-tools-domU-4.12.1_04-3.6.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:xen-4.12.1_04-3.6.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:xen-devel-4.12.1_04-3.6.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:xen-tools-4.12.1_04-3.6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-18423",
"url": "https://www.suse.com/security/cve/CVE-2019-18423"
},
{
"category": "external",
"summary": "SUSE Bug 1154460 for CVE-2019-18423",
"url": "https://bugzilla.suse.com/1154460"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:xen-libs-4.12.1_04-3.6.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:xen-tools-domU-4.12.1_04-3.6.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:xen-4.12.1_04-3.6.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:xen-devel-4.12.1_04-3.6.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:xen-tools-4.12.1_04-3.6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:xen-libs-4.12.1_04-3.6.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:xen-tools-domU-4.12.1_04-3.6.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:xen-4.12.1_04-3.6.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:xen-devel-4.12.1_04-3.6.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:xen-tools-4.12.1_04-3.6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:17:44Z",
"details": "important"
}
],
"title": "CVE-2019-18423"
},
{
"cve": "CVE-2019-18424",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-18424"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Xen through 4.12.x allowing attackers to gain host OS privileges via DMA in a situation where an untrusted domain has access to a physical device. This occurs because passed through PCI devices may corrupt host memory after deassignment. When a PCI device is assigned to an untrusted domain, it is possible for that domain to program the device to DMA to an arbitrary address. The IOMMU is used to protect the host from malicious DMA by making sure that the device addresses can only target memory assigned to the guest. However, when the guest domain is torn down, or the device is deassigned, the device is assigned back to dom0, thus allowing any in-flight DMA to potentially target critical host data. An untrusted domain with access to a physical device can DMA into host memory, leading to privilege escalation. Only systems where guests are given direct access to physical devices capable of DMA (PCI pass-through) are vulnerable. Systems which do not use PCI pass-through are not vulnerable.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:xen-libs-4.12.1_04-3.6.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:xen-tools-domU-4.12.1_04-3.6.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:xen-4.12.1_04-3.6.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:xen-devel-4.12.1_04-3.6.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:xen-tools-4.12.1_04-3.6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-18424",
"url": "https://www.suse.com/security/cve/CVE-2019-18424"
},
{
"category": "external",
"summary": "SUSE Bug 1154461 for CVE-2019-18424",
"url": "https://bugzilla.suse.com/1154461"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:xen-libs-4.12.1_04-3.6.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:xen-tools-domU-4.12.1_04-3.6.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:xen-4.12.1_04-3.6.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:xen-devel-4.12.1_04-3.6.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:xen-tools-4.12.1_04-3.6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.6,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:xen-libs-4.12.1_04-3.6.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:xen-tools-domU-4.12.1_04-3.6.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:xen-4.12.1_04-3.6.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:xen-devel-4.12.1_04-3.6.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:xen-tools-4.12.1_04-3.6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:17:44Z",
"details": "important"
}
],
"title": "CVE-2019-18424"
},
{
"cve": "CVE-2019-18425",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-18425"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Xen through 4.12.x allowing 32-bit PV guest OS users to gain guest OS privileges by installing and using descriptors. There is missing descriptor table limit checking in x86 PV emulation. When emulating certain PV guest operations, descriptor table accesses are performed by the emulating code. Such accesses should respect the guest specified limits, unless otherwise guaranteed to fail in such a case. Without this, emulation of 32-bit guest user mode calls through call gates would allow guest user mode to install and then use descriptors of their choice, as long as the guest kernel did not itself install an LDT. (Most OSes don\u0027t install any LDT by default). 32-bit PV guest user mode can elevate its privileges to that of the guest kernel. Xen versions from at least 3.2 onwards are affected. Only 32-bit PV guest user mode can leverage this vulnerability. HVM, PVH, as well as 64-bit PV guests cannot leverage this vulnerability. Arm systems are unaffected.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:xen-libs-4.12.1_04-3.6.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:xen-tools-domU-4.12.1_04-3.6.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:xen-4.12.1_04-3.6.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:xen-devel-4.12.1_04-3.6.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:xen-tools-4.12.1_04-3.6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-18425",
"url": "https://www.suse.com/security/cve/CVE-2019-18425"
},
{
"category": "external",
"summary": "SUSE Bug 1154456 for CVE-2019-18425",
"url": "https://bugzilla.suse.com/1154456"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2019-18425",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:xen-libs-4.12.1_04-3.6.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:xen-tools-domU-4.12.1_04-3.6.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:xen-4.12.1_04-3.6.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:xen-devel-4.12.1_04-3.6.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:xen-tools-4.12.1_04-3.6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:xen-libs-4.12.1_04-3.6.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:xen-tools-domU-4.12.1_04-3.6.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:xen-4.12.1_04-3.6.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:xen-devel-4.12.1_04-3.6.1.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:xen-tools-4.12.1_04-3.6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:17:44Z",
"details": "important"
}
],
"title": "CVE-2019-18425"
}
]
}
suse-su-2019:3295-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "The SUSE Linux Enterprise 15 SP1 RT kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2019-15916: Fixed a memory leak in register_queue_kobjects() which might \n have led denial of service (bsc#1149448).\n- CVE-2019-0154: Fixed an improper access control in subsystem for Intel (R) \n processor graphics whichs may have allowed an authenticated user to potentially \n enable denial of service via local access (bsc#1135966).\n- CVE-2019-0155: Fixed an improper access control in subsystem for Intel (R) \n processor graphics whichs may have allowed an authenticated user to potentially \n enable escalation of privilege via local access (bsc#1135967).\n- CVE-2019-16231: Fixed a NULL pointer dereference due to lack of checking the \n alloc_workqueue return value (bsc#1150466).\n- CVE-2019-18805: Fixed an integer overflow in tcp_ack_update_rtt() leading to \n a denial of service or possibly unspecified other impact (bsc#1156187).\n- CVE-2019-17055: Enforced CAP_NET_RAW in the AF_ISDN network module to restrict \n unprivileged users to create a raw socket (bsc#1152782).\n- CVE-2019-16995: Fixed a memory leak in hsr_dev_finalize() which may have caused \n denial of service (bsc#1152685).\n- CVE-2019-11135: Aborting an asynchronous TSX operation on Intel CPUs with\n Transactional Memory support could be used to facilitate sidechannel\n information leaks out of microarchitectural buffers, similar to the\n previously described \u0027Microarchitectural Data Sampling\u0027 attack.(bsc#1139073).\n The Linux kernel was supplemented with the option to disable TSX operation\n altogether (requiring CPU Microcode updates on older systems) and better\n flushing of microarchitectural buffers (VERW).\n The set of options available is described in our TID at https://www.suse.com/support/kb/doc/?id=7024251\n- CVE-2019-16233: drivers/scsi/qla2xxx/qla_os.c did not check the\n alloc_workqueue return value, leading to a NULL pointer dereference.\n (bsc#1150457).\n- CVE-2018-12207: Untrusted virtual machines on Intel CPUs could exploit a race\n condition in the Instruction Fetch Unit of the Intel CPU to cause a Machine\n Exception during Page Size Change, causing the CPU core to be non-functional.\n- CVE-2019-10220: Added sanity checks on the pathnames passed to the user\n space. (bsc#1144903)\n- CVE-2019-17666: rtlwifi: Fix potential overflow in P2P code (bsc#1154372).\n- CVE-2019-16232: Fix a potential NULL pointer dereference in the Marwell\n libertas driver (bsc#1150465).\n- CVE-2019-16234: iwlwifi pcie driver did not check the alloc_workqueue return\n value, leading to a NULL pointer dereference. (bsc#1150452).\n- CVE-2019-17133: cfg80211 wireless extension did not reject a long SSID IE,\n leading to a Buffer Overflow (bsc#1153158).\n- CVE-2019-17056: The AF_NFC network module did not enforce CAP_NET_RAW, which\n meant that unprivileged users could create a raw socket (bsc#1152788).\n- CVE-2019-15291: Fixed a NULL pointer dereference caused by a malicious USB device \n in the flexcop_usb_probe function (bsc#1146519).\n- CVE-2019-14821: Fixed an out-of-bounds access resulting in a denial of service \n or potentially escalating privileges on the system (bnc#1151350).\n- CVE-2017-18595: Fixed a double free which caused by the function allocate_trace_buffer \n (bsc#1149555).\n- CVE-2019-9506: Fixed an issue with Bluetooth which permited low encryption key \n length and did not prevent an attacker from influencing the key length negotiation \n allowing brute-force attacks (bsc#1137865).\n\nThe following non-security bugs were fixed:\n\n- 9p: avoid attaching writeback_fid on mmap with type PRIVATE (bsc#1051510).\n- ACPI / CPPC: do not require the _PSD method (bsc#1051510).\n- ACPI: CPPC: Set pcc_data[pcc_ss_id] to NULL in acpi_cppc_processor_exit() (bsc#1051510).\n- ACPI: custom_method: fix memory leaks (bsc#1051510).\n- ACPI / PCI: fix acpi_pci_irq_enable() memory leak (bsc#1051510).\n- ACPI / processor: do not print errors for processorIDs == 0xff (bsc#1051510).\n- ACPI / property: Fix acpi_graph_get_remote_endpoint() name in kerneldoc (bsc#1051510).\n- act_mirred: Fix mirred_init_module error handling (bsc#1051510).\n- Add Acer Aspire Ethos 8951G model quirk (bsc#1051510).\n- Add kernel module compression support (bsc#1135854) For enabling the kernel module compress, add the item COMPRESS_MODULES=\u0027xz\u0027 in config.sh, then mkspec will pass it to the spec file.\n- alarmtimer: Use EOPNOTSUPP instead of ENOTSUPP (bsc#1151680).\n- ALSA: aoa: onyx: always initialize register read value (bsc#1051510).\n- ALSA: bebob: Fix prototype of helper function to return negative value (bsc#1051510).\n- ALSA: bebob: fix to detect configured source of sampling clock for Focusrite Saffire Pro i/o series (git-fixes).\n- ALSA: firewire-motu: add support for MOTU 4pre (bsc#1111666).\n- ALSA: firewire-tascam: check intermediate state of clock status and retry (bsc#1051510).\n- ALSA: firewire-tascam: handle error code when getting current source of clock (bsc#1051510).\n- ALSA: hda - Add a quirk model for fixing Huawei Matebook X right speaker (bsc#1051510).\n- ALSA: hda: Add Cometlake-S PCI ID (git-fixes).\n- ALSA: hda: Add Elkhart Lake PCI ID (bsc#1051510).\n- ALSA: hda - Add laptop imic fixup for ASUS M9V laptop (bsc#1051510).\n- ALSA: hda: Add support of Zhaoxin controller (bsc#1051510).\n- ALSA: hda: Add Tigerlake/Jasperlake PCI ID (bsc#1051510).\n- ALSA: hda - Apply AMD controller workaround for Raven platform (bsc#1051510).\n- ALSA: hda/ca0132 - Fix possible workqueue stall (bsc#1155836).\n- ALSA: hda - Define a fallback_pin_fixup_tbl for alc269 family (bsc#1051510).\n- ALSA: hda - Drop unsol event handler for Intel HDMI codecs (bsc#1051510).\n- ALSA: hda - Expand pin_match function to match upcoming new tbls (bsc#1051510).\n- ALSA: hda: Flush interrupts on disabling (bsc#1051510).\n- ALSA: hda - Force runtime PM on Nvidia HDMI codecs (bsc#1051510).\n- ALSA: hda/hdmi - Do not report spurious jack state changes (bsc#1051510).\n- ALSA: hda/hdmi: remove redundant assignment to variable pcm_idx (bsc#1051510).\n- ALSA: hda - Inform too slow responses (bsc#1051510).\n- ALSA: hda/intel: add CometLake PCI IDs (bsc#1156729).\n- ALSA: hda/realtek - Add support for ALC623 (bsc#1051510).\n- ALSA: hda/realtek - Add support for ALC711 (bsc#1051510).\n- ALSA: hda/realtek - Blacklist PC beep for Lenovo ThinkCentre M73/93 (bsc#1051510).\n- ALSA: hda/realtek - Check beep whitelist before assigning in all codecs (bsc#1051510).\n- ALSA: hda/realtek - Enable headset mic on Asus MJ401TA (bsc#1051510).\n- ALSA: hda/realtek - Fix 2 front mics of codec 0x623 (bsc#1051510).\n- ALSA: hda/realtek - Fix alienware headset mic (bsc#1051510).\n- ALSA: hda/realtek - PCI quirk for Medion E4254 (bsc#1051510).\n- ALSA: hda/realtek: Reduce the Headphone static noise on XPS 9350/9360 (bsc#1051510).\n- ALSA: hda: Set fifo_size for both playback and capture streams (bsc#1051510).\n- ALSA: hda - Show the fatal CORB/RIRB error more clearly (bsc#1051510).\n- ALSA: hda/sigmatel - remove unused variable \u0027stac9200_core_init\u0027 (bsc#1051510).\n- ALSA: i2c: ak4xxx-adda: Fix a possible null pointer dereference in build_adc_controls() (bsc#1051510).\n- ALSA: line6: sizeof (byte) is always 1, use that fact (bsc#1051510).\n- ALSA: pcm: Fix stream lock usage in snd_pcm_period_elapsed() (git-fixes).\n- ALSA: timer: Fix incorrectly assigned timer instance (git-fixes).\n- ALSA: timer: Fix mutex deadlock at releasing card (bsc#1051510).\n- ALSA: usb-audio: Add DSD support for EVGA NU Audio (bsc#1051510).\n- ALSA: usb-audio: Add DSD support for Gustard U16/X26 USB Interface (bsc#1051510).\n- ALSA: usb-audio: Add Hiby device family to quirks for native DSD support (bsc#1051510).\n- ALSA: usb-audio: Add Pioneer DDJ-SX3 PCM quirck (bsc#1051510).\n- ALSA: usb-audio: Clean up check_input_term() (bsc#1051510).\n- ALSA: usb-audio: Disable quirks for BOSS Katana amplifiers (bsc#1051510).\n- ALSA: usb-audio: Disable quirks for BOSS Katana amplifiers (bsc#1111666).\n- ALSA: usb-audio: DSD auto-detection for Playback Designs (bsc#1051510).\n- ALSA: usb-audio: Fix copy\u0026paste error in the validator (bsc#1111666).\n- ALSA: usb-audio: Fix missing error check at mixer resolution test (git-fixes).\n- ALSA: usb-audio: fix PCM device order (bsc#1051510).\n- ALSA: usb-audio: Fix possible NULL dereference at create_yamaha_midi_quirk() (bsc#1051510).\n- ALSA: usb-audio: More validations of descriptor units (bsc#1051510).\n- ALSA: usb-audio: not submit urb for stopped endpoint (git-fixes).\n- ALSA: usb-audio: remove some dead code (bsc#1051510).\n- ALSA: usb-audio: Remove superfluous bLength checks (bsc#1051510).\n- ALSA: usb-audio: Simplify parse_audio_unit() (bsc#1051510).\n- ALSA: usb-audio: Skip bSynchAddress endpoint check if it is invalid (bsc#1051510).\n- ALSA: usb-audio: Unify audioformat release code (bsc#1051510).\n- ALSA: usb-audio: Unify the release of usb_mixer_elem_info objects (bsc#1051510).\n- ALSA: usb-audio: Update DSD support quirks for Oppo and Rotel (bsc#1051510).\n- appletalk: enforce CAP_NET_RAW for raw sockets (bsc#1051510).\n- arcnet: provide a buffer big enough to actually receive packets (networking-stable-19_09_30).\n- arm64: Add decoding macros for CP15_32 and CP15_64 traps (jsc#ECO-561).\n- arm64: Add part number for Neoverse N1 (jsc#ECO-561).\n- arm64: Add silicon-errata.txt entry for ARM erratum 1188873 (jsc#ECO-561).\n- arm64: Add support for new control bits CTR_EL0.DIC and CTR_EL0.IDC (jsc#ECO-561,jsc#SLE-10671). \n- arm64: Apply ARM64_ERRATUM_1188873 to Neoverse-N1 (jsc#ECO-561).\n- arm64: arch_timer: Add workaround for ARM erratum 1188873 (jsc#ECO-561). \n- arm64: arch_timer: avoid unused function warning (jsc#ECO-561).\n- arm64: compat: Add CNTFRQ trap handler (jsc#ECO-561).\n- arm64: compat: Add CNTVCT trap handler (jsc#ECO-561).\n- arm64: compat: Add condition code checks and IT advance (jsc#ECO-561).\n- arm64: compat: Add cp15_32 and cp15_64 handler arrays (jsc#ECO-561).\n- arm64: compat: Add separate CP15 trapping hook (jsc#ECO-561).\n- arm64: compat: Workaround Neoverse-N1 #1542419 for compat user-space (jsc#ECO-561,jsc#SLE-10671).\n- arm64: cpu_errata: Remove ARM64_MISMATCHED_CACHE_LINE_SIZE (jsc#ECO-561,jsc#SLE-10671).\n- arm64/cpufeature: Convert hook_lock to raw_spin_lock_t in cpu_enable_ssbs() (jsc#ECO-561).\n- arm64: cpufeature: ctr: Fix cpu capability check for late CPUs (jsc#ECO-561,jsc#SLE-10671).\n- arm64: cpufeature: Detect SSBS and advertise to userspace (jsc#ECO-561). \n- arm64: cpufeature: Fix handling of CTR_EL0.IDC field (jsc#ECO-561,jsc#SLE-10671).\n- arm64: cpufeature: Trap CTR_EL0 access only where it is necessary (jsc#ECO-561,jsc#SLE-10671).\n- arm64: cpu: Move errata and feature enable callbacks closer to callers (jsc#ECO-561).\n- arm64: entry: Allow handling of undefined instructions from EL1 (jsc#ECO-561).\n- arm64: errata: Hide CTR_EL0.DIC on systems affected by Neoverse-N1 #1542419 (jsc#ECO-561,jsc#SLE-10671).\n- arm64: Fake the IminLine size on systems affected by Neoverse-N1 #1542419 (jsc#ECO-561,jsc#SLE-10671).\n- arm64: Fix mismatched cache line size detection (jsc#ECO-561,jsc#SLE-10671).\n- arm64: Fix silly typo in comment (jsc#ECO-561).\n- arm64: fix SSBS sanitization (jsc#ECO-561).\n- arm64: force_signal_inject: WARN if called from kernel context (jsc#ECO-561).\n- arm64: Force SSBS on context switch (jsc#ECO-561).\n- arm64: Handle erratum 1418040 as a superset of erratum 1188873 (jsc#ECO-561). \n- arm64: Introduce sysreg_clear_set() (jsc#ECO-561).\n- arm64: kill change_cpacr() (jsc#ECO-561).\n- arm64: kill config_sctlr_el1() (jsc#ECO-561).\n- arm64: KVM: Add invalidate_icache_range helper (jsc#ECO-561,jsc#SLE-10671).\n- arm64: KVM: PTE/PMD S2 XN bit definition (jsc#ECO-561,jsc#SLE-10671).\n- arm64: Make ARM64_ERRATUM_1188873 depend on COMPAT (jsc#ECO-561).\n- arm64: move SCTLR_EL{1,2} assertions to \u003casm/sysreg.h\u003e (jsc#ECO-561).\n- arm64: Restrict ARM64_ERRATUM_1188873 mitigation to AArch32 (jsc#ECO-561).\n- arm64: ssbd: Add support for PSTATE.SSBS rather than trapping to EL3 (jsc#ECO-561). \n- arm64: ssbd: Drop #ifdefs for PR_SPEC_STORE_BYPASS (jsc#ECO-561).\n- arm64: Update config files. (bsc#1156466) Enable HW_RANDOM_OMAP driver and mark driver omap-rng as supported.\n- arm: KVM: Add optimized PIPT icache flushing (jsc#ECO-561,jsc#SLE-10671).\n- ASoC: Define a set of DAPM pre/post-up events (bsc#1051510).\n- ASoC: dmaengine: Make the pcm-\u003ename equal to pcm-\u003eid if the name is not set (bsc#1051510).\n- ASoC: es8328: Fix copy-paste error in es8328_right_line_controls (bsc#1051510).\n- ASoC: Intel: Baytrail: Fix implicit fallthrough warning (bsc#1051510).\n- ASoC: Intel: Fix use of potentially uninitialized variable (bsc#1051510).\n- ASoC: Intel: NHLT: Fix debug print format (bsc#1051510).\n- ASoc: rockchip: i2s: Fix RPM imbalance (bsc#1051510).\n- ASoC: rsnd: Reinitialize bit clock inversion flag for every format setting (bsc#1051510).\n- ASoC: sgtl5000: Fix charge pump source assignment (bsc#1051510).\n- ASoC: sun4i-i2s: RX and TX counter registers are swapped (bsc#1051510).\n- ASoC: wm8737: Fix copy-paste error in wm8737_snd_controls (bsc#1051510).\n- ASoC: wm8988: fix typo in wm8988_right_line_controls (bsc#1051510).\n- ath10k: adjust skb length in ath10k_sdio_mbox_rx_packet (bsc#1111666).\n- ath10k: assign \u0027n_cipher_suites = 11\u0027 for WCN3990 to enable WPA3 (bsc#1111666).\n- ath9k: dynack: fix possible deadlock in ath_dynack_node_{de}init (bsc#1051510).\n- atm: iphase: Fix Spectre v1 vulnerability (networking-stable-19_08_08).\n- auxdisplay: panel: need to delete scan_timer when misc_register fails in panel_attach (bsc#1051510).\n- ax25: enforce CAP_NET_RAW for raw sockets (bsc#1051510).\n- bcma: fix incorrect update of BCMA_CORE_PCI_MDIO_DATA (bsc#1051510).\n- blk-flush: do not run queue for requests bypassing flush (bsc#1137959).\n- blk-flush: use blk_mq_request_bypass_insert() (bsc#1137959).\n- blk-mq: do not allocate driver tag upfront for flush rq (bsc#1137959).\n- blk-mq: Fix memory leak in blk_mq_init_allocated_queue error handling (bsc#1151610).\n- blk-mq: insert rq with DONTPREP to hctx dispatch list when requeue (bsc#1137959).\n- blk-mq: introduce blk_mq_request_completed() (bsc#1149446).\n- blk-mq: introduce blk_mq_tagset_wait_completed_request() (bsc#1149446).\n- blk-mq: kABI fixes for blk-mq.h (bsc#1137959).\n- blk-mq: move blk_mq_put_driver_tag*() into blk-mq.h (bsc#1137959).\n- blk-mq: punt failed direct issue to dispatch list (bsc#1137959).\n- blk-mq: put the driver tag of nxt rq before first one is requeued (bsc#1137959).\n- blk-mq-sched: decide how to handle flush rq via RQF_FLUSH_SEQ (bsc#1137959).\n- blk-wbt: abstract out end IO completion handler (bsc#1135873).\n- blk-wbt: fix has-sleeper queueing check (bsc#1135873).\n- blk-wbt: improve waking of tasks (bsc#1135873).\n- blk-wbt: move disable check into get_limit() (bsc#1135873).\n- blk-wbt: use wq_has_sleeper() for wq active check (bsc#1135873).\n- block: add io timeout to sysfs (bsc#1148410).\n- block: add io timeout to sysfs (bsc#1148410).\n- block: do not show io_timeout if driver has no timeout handler (bsc#1148410).\n- block: do not show io_timeout if driver has no timeout handler (bsc#1148410).\n- block: fix timeout changes for legacy request drivers (bsc#1149446).\n- block: kABI fixes for BLK_EH_DONE renaming (bsc#1142076).\n- block: rename BLK_EH_NOT_HANDLED to BLK_EH_DONE (bsc#1142076).\n- Bluetooth: btrtl: Additional Realtek 8822CE Bluetooth devices (bsc#1051510).\n- bnx2x: Disable multi-cos feature (networking-stable-19_08_08).\n- bnx2x: Fix VF\u0027s VLAN reconfiguration in reload (bsc#1086323 ).\n- bnxt_en: Add PCI IDs for 57500 series NPAR devices (bsc#1153607).\n- bonding/802.3ad: fix link_failure_count tracking (bsc#1137069 bsc#1141013).\n- bonding/802.3ad: fix slave link initialization transition states (bsc#1137069 bsc#1141013).\n- bonding: Add vlan tx offload to hw_enc_features (networking-stable-19_08_21).\n- bonding: set default miimon value for non-arp modes if not set (bsc#1137069 bsc#1141013).\n- bonding: speed/duplex update at NETDEV_UP event (bsc#1137069 bsc#1141013).\n- bpf: fix use after free in prog symbol exposure (bsc#1083647).\n- brcmfmac: sdio: Disable auto-tuning around commands expected to fail (bsc#1111666).\n- brcmfmac: sdio: Do not tune while the card is off (bsc#1111666).\n- bridge/mdb: remove wrong use of NLM_F_MULTI (networking-stable-19_09_15).\n- btrfs: bail out gracefully rather than BUG_ON (bsc#1153646).\n- btrfs: block-group: Fix a memory leak due to missing btrfs_put_block_group() (bsc#1155178).\n- btrfs: check for the full sync flag while holding the inode lock during fsync (bsc#1153713).\n- btrfs: Ensure btrfs_init_dev_replace_tgtdev sees up to date values (bsc#1154651).\n- btrfs: Ensure replaced device does not have pending chunk allocation (bsc#1154607).\n- btrfs: fix log context list corruption after rename exchange operation (bsc#1156494).\n- btrfs: fix use-after-free when using the tree modification log (bsc#1151891).\n- btrfs: qgroup: Always free PREALLOC META reserve in btrfs_delalloc_release_extents() (bsc#1155179).\n- btrfs: qgroup: Fix reserved data space leak if we have multiple reserve calls (bsc#1152975).\n- btrfs: qgroup: Fix the wrong target io_tree when freeing reserved data space (bsc#1152974).\n- btrfs: relocation: fix use-after-free on dead relocation roots (bsc#1152972).\n- btrfs: remove wrong use of volume_mutex from btrfs_dev_replace_start (bsc#1154651).\n- btrfs: tracepoints: Fix bad entry members of qgroup events (bsc#1155186).\n- btrfs: tracepoints: Fix wrong parameter order for qgroup events (bsc#1155184).\n- can: dev: call netif_carrier_off() in register_candev() (bsc#1051510).\n- can: mcp251x: mcp251x_hw_reset(): allow more time after a reset (bsc#1051510).\n- can: xilinx_can: xcan_probe(): skip error message on deferred probe (bsc#1051510).\n- cdc_ether: fix rndis support for Mediatek based smartphones (networking-stable-19_09_15).\n- cdc_ncm: fix divide-by-zero caused by invalid wMaxPacketSize (bsc#1051510).\n- ceph: fix directories inode i_blkbits initialization (bsc#1153717).\n- ceph: reconnect connection if session hang in opening state (bsc#1153718).\n- ceph: update the mtime when truncating up (bsc#1153719).\n- ceph: use ceph_evict_inode to cleanup inode\u0027s resource (bsc#1148133).\n- cfg80211: add and use strongly typed element iteration macros (bsc#1051510).\n- cfg80211: Purge frame registrations on iftype change (bsc#1051510).\n- clk: at91: fix update bit maps on CFG_MOR write (bsc#1051510).\n- clk: at91: select parent if main oscillator or bypass is enabled (bsc#1051510).\n- clk: qoriq: Fix -Wunused-const-variable (bsc#1051510).\n- clk: sirf: Do not reference clk_init_data after registration (bsc#1051510).\n- clk: sunxi-ng: v3s: add missing clock slices for MMC2 module clocks (bsc#1051510).\n- clk: sunxi-ng: v3s: add the missing PLL_DDR1 (bsc#1051510).\n- clk: zx296718: Do not reference clk_init_data after registration (bsc#1051510).\n- Compile nvme.ko as module (bsc#1150846)\n- config: arm64: enable erratum 1418040 and 1542419\n- crypto: af_alg - consolidation of duplicate code (bsc#1154737).\n- crypto: af_alg - fix race accessing cipher request (bsc#1154737).\n- crypto: af_alg - Fix race around ctx-\u003ercvused by making it atomic_t (bsc#1154737).\n- crypto: af_alg - Initialize sg_num_bytes in error code path (bsc#1051510).\n- crypto: af_alg - remove locking in async callback (bsc#1154737).\n- crypto: af_alg - update correct dst SGL entry (bsc#1051510).\n- crypto: af_alg - wait for data at beginning of recvmsg (bsc#1154737).\n- crypto: algif_aead - copy AAD from src to dst (bsc#1154737).\n- crypto: algif_aead - fix reference counting of null skcipher (bsc#1154737).\n- crypto: algif_aead - overhaul memory management (bsc#1154737).\n- crypto: algif_aead - skip SGL entries with NULL page (bsc#1154737).\n- crypto: algif - return error code when no data was processed (bsc#1154737).\n- crypto: algif_skcipher - overhaul memory management (bsc#1154737).\n- crypto: caam - fix concurrency issue in givencrypt descriptor (bsc#1051510).\n- crypto: caam - free resources in case caam_rng registration failed (bsc#1051510).\n- crypto: caam/qi - fix error handling in ERN handler (bsc#1111666).\n- crypto: cavium/zip - Add missing single_release() (bsc#1051510).\n- crypto: ccp - Reduce maximum stack usage (bsc#1051510).\n- crypto: qat - Silence smp_processor_id() warning (bsc#1051510).\n- crypto: skcipher - Unmap pages after an external error (bsc#1051510).\n- crypto: talitos - fix missing break in switch statement (bsc#1142635).\n- cxgb4: do not dma memory off of the stack (bsc#1152790).\n- cxgb4: fix endianness for vlan value in cxgb4_tc_flower (bsc#1064802 bsc#1066129).\n- cxgb4:Fix out-of-bounds MSI-X info array access (networking-stable-19_10_05).\n- cxgb4: offload VLAN flows regardless of VLAN ethtype (bsc#1064802 bsc#1066129).\n- cxgb4: reduce kernel stack usage in cudbg_collect_mem_region() (bsc#1073513).\n- cxgb4: Signedness bug in init_one() (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).\n- cxgb4: smt: Add lock for atomic_dec_and_test (bsc#1064802 bsc#1066129).\n- dasd_fba: Display \u002700000000\u0027 for zero page when dumping sense (bsc#1123080).\n- /dev/mem: Bail out upon SIGKILL (git-fixes).\n- dma-buf/sw_sync: Synchronize signal vs syncpt free (bsc#1111666).\n- dmaengine: bcm2835: Print error in case setting DMA mask fails (bsc#1051510).\n- dmaengine: dw: platform: Switch to acpi_dma_controller_register() (bsc#1051510).\n- dmaengine: imx-sdma: fix size check for sdma script_number (bsc#1051510).\n- dmaengine: iop-adma.c: fix printk format warning (bsc#1051510).\n- drivers: thermal: int340x_thermal: Fix sysfs race condition (bsc#1051510).\n- drm: add __user attribute to ptr_to_compat() (bsc#1111666).\n- drm/amd/display: fix issue where 252-255 values are clipped (bsc#1111666).\n- drm/amd/display: fix odm combine pipe reset (bsc#1111666).\n- drm/amd/display: reprogram VM config when system resume (bsc#1111666).\n- drm/amd/display: Restore backlight brightness after system resume (bsc#1112178)\n- drm/amd/display: support spdif (bsc#1111666).\n- drm/amd/dm: Understand why attaching path/tile properties are needed (bsc#1111666).\n- drm/amdgpu: Check for valid number of registers to read (bsc#1051510).\n- drm/amdgpu: Fix KFD-related kernel oops on Hawaii (bsc#1111666).\n- drm/amdgpu: fix memory leak (bsc#1111666).\n- drm/amdgpu/gfx9: Update gfx9 golden settings (bsc#1111666).\n- drm/amdgpu/powerplay/vega10: allow undervolting in p7 (bsc#1111666).\n- drm/amdgpu/si: fix ASIC tests (git-fixes).\n- drm/amdgpu: Update gc_9_0 golden settings (bsc#1111666).\n- drm/amdkfd: Add missing Polaris10 ID (bsc#1111666).\n- drm/amd/powerplay/smu7: enforce minimal VBITimeout (v2) (bsc#1051510).\n- drm/amd/pp: Fix truncated clock value when set watermark (bsc#1111666).\n- drm/ast: Fixed reboot test may cause system hanged (bsc#1051510).\n- drm/atomic_helper: Allow DPMS On\u003c-\u003eOff changes for unregistered connectors (bsc#1111666).\n- drm/atomic_helper: Disallow new modesets on unregistered connectors (bsc#1111666).\n- drm/atomic_helper: Stop modesets on unregistered connectors harder (bsc#1111666).\n- drm/bridge: tc358767: Increase AUX transfer length limit (bsc#1051510).\n- drm/bridge: tfp410: fix memleak in get_modes() (bsc#1111666).\n- drm/edid: Add 6 bpc quirk for SDC panel in Lenovo G50 (bsc#1051510).\n- drm: Flush output polling on shutdown (bsc#1051510).\n- drm/i915: Add gen9 BCS cmdparsing (bsc#1135967)\n- drm/i915: Add gen9 BCS cmdparsing (bsc#1135967)\n- drm/i915: Add support for mandatory cmdparsing (bsc#1135967)\n- drm/i915: Add support for mandatory cmdparsing (bsc#1135967)\n- drm/i915: Allow parsing of unsized batches (bsc#1135967)\n- drm/i915: Allow parsing of unsized batches (bsc#1135967)\n- drm/i915: Cleanup gt powerstate from gem (bsc#1111666).\n- drm/i915/cmdparser: Add support for backward jumps (bsc#1135967)\n- drm/i915/cmdparser: Add support for backward jumps (bsc#1135967)\n- drm/i915/cmdparser: Ignore Length operands during (bsc#1135967)\n- drm/i915/cmdparser: Ignore Length operands during command matching (bsc#1135967)\n- drm/i915/cmdparser: Use explicit goto for error paths (bsc#1135967)\n- drm/i915/cmdparser: Use explicit goto for error paths (bsc#1135967)\n- drm/i915/cml: Add second PCH ID for CMP (bsc#1111666).\n- drm/i915: Disable Secure Batches for gen6+\n- drm/i915: Disable Secure Batches for gen6+ (bsc#1135967)\n- drm/i915: Fix intel_dp_mst_best_encoder() (bsc#1111666).\n- drm/i915: Fix various tracepoints for gen2 (bsc#1113722)\n- drm/i915/gen8+: Add RC6 CTX corruption WA (bsc#1135967)\n- drm/i915/gen8+: Add RC6 CTX corruption WA (bsc#1135967)\n- drm/i915/gtt: Add read only pages to gen8_pte_encode (bsc#1135967)\n- drm/i915/gtt: Disable read-only support under GVT (bsc#1135967)\n- drm/i915/gtt: Read-only pages for insert_entries on bdw (bsc#1135967)\n- drm/i915/gvt: update vgpu workload head pointer correctly (bsc#1112178)\n- drm/i915/ilk: Fix warning when reading emon_status with no output (bsc#1111666).\n- drm/i915: Lower RM timeout to avoid DSI hard hangs (bsc#1135967)\n- drm/i915: Lower RM timeout to avoid DSI hard hangs (bsc#1135967)\n- drm/i915: Prevent writing into a read-only object via a GGTT mmap (bsc#1135967)\n- drm/i915: Remove Master tables from cmdparser\n- drm/i915: Remove Master tables from cmdparser (bsc#1135967)\n- drm/i915: Rename gen7 cmdparser tables (bsc#1135967)\n- drm/i915: Rename gen7 cmdparser tables (bsc#1135967)\n- drm/i915: Restore sane defaults for KMS on GEM error load (bsc#1111666).\n- drm/i915: Support ro ppgtt mapped cmdparser shadow (bsc#1135967)\n- drm/i915: Support ro ppgtt mapped cmdparser shadow buffers (bsc#1135967)\n- drm/imx: Drop unused imx-ipuv3-crtc.o build (bsc#1113722)\n- drm/mediatek: set DMA max segment size (bsc#1111666).\n- drm/msm/dpu: handle failures while initializing displays (bsc#1111666).\n- drm/msm/dsi: Fix return value check for clk_get_parent (bsc#1111666).\n- drm/msm/dsi: Implement reset correctly (bsc#1051510).\n- drm/nouveau/disp/nv50-: fix center/aspect-corrected scaling (bsc#1111666).\n- drm/nouveau/kms/nv50-: Do not create MSTMs for eDP connectors (bsc#1112178)\n- drm/nouveau/volt: Fix for some cards having 0 maximum voltage (bsc#1111666).\n- drm/omap: fix max fclk divider for omap36xx (bsc#1111666).\n- drm/panel: check failure cases in the probe func (bsc#1111666).\n- drm/panel: make drm_panel.h self-contained (bsc#1111666).\n- drm: panel-orientation-quirks: Add extra quirk table entry for GPD MicroPC (bsc#1111666).\n- drm/panel: simple: fix AUO g185han01 horizontal blanking (bsc#1051510).\n- drm/radeon: Bail earlier when radeon.cik_/si_support=0 is passed (bsc#1111666).\n- drm/radeon: Fix EEH during kexec (bsc#1051510).\n- drm: rcar-du: lvds: Fix bridge_to_rcar_lvds (bsc#1111666).\n- drm/rockchip: Check for fast link training before enabling psr (bsc#1111666).\n- drm/stm: attach gem fence to atomic state (bsc#1111666).\n- drm/tilcdc: Register cpufreq notifier after we have initialized crtc (bsc#1051510).\n- drm/vmwgfx: Fix double free in vmw_recv_msg() (bsc#1051510).\n- e1000e: add workaround for possible stalled packet (bsc#1051510).\n- EDAC/amd64: Decode syndrome before translating address (bsc#1114279).\n- eeprom: at24: make spd world-readable again (git-fixes).\n- efi/arm: Show SMBIOS bank/device location in CPER and GHES error logs (bsc#1152033).\n- efi: cper: print AER info of PCIe fatal error (bsc#1051510).\n- efi/memattr: Do not bail on zero VA if it equals the region\u0027s PA (bsc#1051510).\n- efivar/ssdt: Do not iterate over EFI vars if no SSDT override was specified (bsc#1051510).\n- ext4: fix warning inside ext4_convert_unwritten_extents_endio (bsc#1152025).\n- ext4: set error return correctly when ext4_htree_store_dirent fails (bsc#1152024).\n- firmware: dmi: Fix unlikely out-of-bounds read in save_mem_devices (git-fixes).\n- Fix AMD IOMMU kABI (bsc#1154610).\n- Fix kabi for: NFSv4: Fix OPEN / CLOSE race (git-fixes).\n- Fix KVM kABI after x86 mmu backports (bsc#1117665).\n- Fix NULL pointer dereference in fc_lookup_rport (bsc#1098291)\n- floppy: fix usercopy direction (bsc#1111666).\n- gpio: fix line flag validation in lineevent_create (bsc#1051510).\n- gpio: fix line flag validation in linehandle_create (bsc#1051510).\n- gpiolib: acpi: Add gpiolib_acpi_run_edge_events_on_boot option and blacklist (bsc#1051510).\n- gpiolib: only check line handle flags once (bsc#1051510).\n- gpio: Move gpiochip_lock/unlock_as_irq to gpio/driver.h (bsc#1051510).\n- gpu: drm: radeon: Fix a possible null-pointer dereference in radeon_connector_set_property() (bsc#1051510).\n- HID: apple: Fix stuck function keys when using FN (bsc#1051510).\n- HID: fix error message in hid_open_report() (bsc#1051510).\n- HID: hidraw: Fix invalid read in hidraw_ioctl (bsc#1051510).\n- HID: logitech: Fix general protection fault caused by Logitech driver (bsc#1051510).\n- HID: logitech-hidpp: do all FF cleanup in hidpp_ff_destroy() (bsc#1051510).\n- HID: prodikeys: Fix general protection fault during probe (bsc#1051510).\n- HID: sony: Fix memory corruption issue on cleanup (bsc#1051510).\n- hso: fix NULL-deref on tty open (bsc#1051510).\n- hwmon: (acpi_power_meter) Change log level for \u0027unsafe software power cap\u0027 (bsc#1051510).\n- hwmon: (lm75) Fix write operations for negative temperatures (bsc#1051510).\n- hwmon: (shtc1) fix shtc1 and shtw1 id mask (bsc#1051510).\n- hwrng: core - do not wait on add_early_randomness() (git-fixes).\n- hyperv: set nvme msi interrupts to unmanaged (jsc#SLE-8953, jsc#SLE-9221, jsc#SLE-4941, bsc#1119461, bsc#1119465, bsc#1138190, bsc#1154905).\n- i2c: designware: Synchronize IRQs when unregistering slave client (bsc#1111666).\n- i2c: riic: Clear NACK in tend isr (bsc#1051510).\n- i40e: Add support for X710 device (bsc#1151067).\n- IB/core: Add mitigation for Spectre V1 (bsc#1155671)\n- IB/core, ipoib: Do not overreact to SM LID change event (bsc#1154108)\n- IB/hfi1: Remove overly conservative VM_EXEC flag check (bsc#1144449).\n- IB/mlx5: Consolidate use_umr checks into single function (bsc#1093205).\n- IB/mlx5: Fix MR re-registration flow to use UMR properly (bsc#1093205).\n- IB/mlx5: Report correctly tag matching rendezvous capability (bsc#1046305).\n- ieee802154: atusb: fix use-after-free at disconnect (bsc#1051510).\n- ieee802154: ca8210: prevent memory leak (bsc#1051510).\n- ieee802154: enforce CAP_NET_RAW for raw sockets (bsc#1051510).\n- ife: error out when nla attributes are empty (networking-stable-19_08_08).\n- iio: adc: ad799x: fix probe error handling (bsc#1051510).\n- iio: dac: ad5380: fix incorrect assignment to val (bsc#1051510).\n- iio: light: opt3001: fix mutex unlock race (bsc#1051510).\n- ima: always return negative code for error (bsc#1051510).\n- Input: da9063 - fix capability and drop KEY_SLEEP (bsc#1051510).\n- Input: elan_i2c - remove Lenovo Legion Y7000 PnpID (bsc#1051510).\n- Input: synaptics-rmi4 - avoid processing unknown IRQs (bsc#1051510).\n- integrity: prevent deadlock during digsig verification (bsc#1090631).\n- iommu/amd: Apply the same IVRS IOAPIC workaround to Acer Aspire A315-41 (bsc#1137799).\n- iommu/amd: Check PM_LEVEL_SIZE() condition in locked section (bsc#1154608).\n- iommu/amd: Override wrong IVRS IOAPIC on Raven Ridge systems (bsc#1137799).\n- iommu/amd: Remove domain-\u003eupdated (bsc#1154610).\n- iommu/amd: Wait for completion of IOTLB flush in attach_device (bsc#1154611).\n- iommu/dma: Fix for dereferencing before null checking (bsc#1151667).\n- iommu: Do not use sme_active() in generic code (bsc#1151661).\n- iommu/iova: Avoid false sharing on fq_timer_on (bsc#1151662).\n- ip6_tunnel: fix possible use-after-free on xmit (networking-stable-19_08_08).\n- ipmi_si: Only schedule continuously in the thread in maintenance mode (bsc#1051510).\n- ipv6/addrconf: allow adding multicast addr if IFA_F_MCAUTOJOIN is set (networking-stable-19_08_28).\n- ipv6: drop incoming packets having a v4mapped source address (networking-stable-19_10_05).\n- ipv6: Fix the link time qualifier of \u0027ping_v6_proc_exit_net()\u0027 (networking-stable-19_09_15).\n- ipv6: Handle missing host route in __ipv6_ifa_notify (networking-stable-19_10_05).\n- irqchip/gic-v3-its: Fix command queue pointer comparison bug (jsc#ECO-561).\n- irqchip/gic-v3-its: Fix LPI release for Multi-MSI devices (jsc#ECO-561).\n- irqchip/gic-v3-its: Fix misuse of GENMASK macro (jsc#ECO-561).\n- isdn/capi: check message length in capi_write() (bsc#1051510).\n- iwlwifi: do not panic in error path on non-msix systems (bsc#1155692).\n- iwlwifi: exclude GEO SAR support for 3168 (bsc#1111666).\n- iwlwifi: exclude GEO SAR support for 3168 (git-fixes).\n- iwlwifi: fw: do not send GEO_TX_POWER_LIMIT command to FW version 36 (bsc#1111666).\n- iwlwifi: pcie: fix memory leaks in iwl_pcie_ctxt_info_gen3_init (bsc#1111666).\n- ixgbe: Fix secpath usage for IPsec TX offload (bsc#1113994 bsc#1151807).\n- ixgbe: Prevent u8 wrapping of ITR value to something less than 10us (bsc#1101674).\n- ixgbe: sync the first fragment unconditionally (bsc#1133140).\n- kABI: media: em28xx: fix handler for vidioc_s_input() (bsc#1051510). fixes kABI\n- kABI: media: em28xx: stop rewriting device\u0027s struct (bsc#1051510). fixes kABI\n- kABI: net: sched: act_sample: fix psample group handling on overwrite (networking-stable-19_09_05).\n- kABI protect enum RDMA_DRIVER_EFA (jsc#SLE-4805)\n- kABI protect struct vmem_altmap (bsc#1150305).\n- kABI/severities: Whitelist a couple of xive functions xive_cleanup_irq_data and xive_native_populate_irq_data are exported by the xive interupt controller driver and used by KVM. I do not expect any out-of-tree driver can sanely use these.\n- kABI/severities: Whitelist functions internal to radix mm. To call these functions you have to first detect if you are running in radix mm mode which can\u0027t be expected of OOT code.\n- kABI workaround for crypto/af_alg changes (bsc#1154737).\n- kABI workaround for drm_connector.registered type changes (bsc#1111666).\n- kABI workaround for drm_vma_offset_node readonly field addition (bsc#1135967)\n- kABI workaround for mmc_host retune_crc_disable flag addition (bsc#1111666).\n- kABI workaround for snd_hda_pick_pin_fixup() changes (bsc#1051510).\n- kernel-binary: check also bzImage on s390/s390x Starting with 4.19-rc1, uncompressed image is no longer built on s390x. If file \u0027image\u0027 is not found in arch/s390/boot after the build, try bzImage instead. For now, install bzImage under the name image-* until we know grub2 and our grub2 scripts can handle correct name.\n- kernel-binary.spec.in: Fix build of non-modular kernels (boo#1154578).\n- kernel-binary.spec.in: Obsolete kgraft packages only when not building them.\n- kernel-subpackage-build: create zero size ghost for uncompressed vmlinux (bsc#1154354). It is not strictly necessary to uncompress it so maybe the ghost file can be 0 size in this case.\n- kernel/sysctl.c: do not override max_threads provided by userspace (bnc#1150875).\n- ksm: cleanup stable_node chain collapse case (bnc#1144338).\n- ksm: fix use after free with merge_across_nodes = 0 (bnc#1144338).\n- ksm: introduce ksm_max_page_sharing per page deduplication limit (bnc#1144338).\n- ksm: optimize refile of stable_node_dup at the head of the chain (bnc#1144338).\n- ksm: swap the two output parameters of chain/chain_prune (bnc#1144338).\n- KVM: arm64: Set SCTLR_EL2.DSSBS if SSBD is forcefully disabled and !vhe (jsc#ECO-561).\n- KVM: arm/arm64: Clean dcache to PoC when changing PTE due to CoW (jsc#ECO-561,jsc#SLE-10671).\n- KVM: arm/arm64: Detangle kvm_mmu.h from kvm_hyp.h (jsc#ECO-561,jsc#SLE-10671).\n- KVM: arm/arm64: Drop vcpu parameter from guest cache maintenance operartions (jsc#ECO-561,jsc#SLE-10671).\n- KVM: arm/arm64: Limit icache invalidation to prefetch aborts (jsc#ECO-561,jsc#SLE-10671).\n- KVM: arm/arm64: Only clean the dcache on translation fault (jsc#ECO-561,jsc#SLE-10671).\n- KVM: arm/arm64: Preserve Exec permission across R/W permission faults (jsc#ECO-561,jsc#SLE-10671).\n- KVM: arm/arm64: Split dcache/icache flushing (jsc#ECO-561,jsc#SLE-10671).\n- KVM: Convert kvm_lock to a mutex (bsc#1117665).\n- KVM: MMU: drop vcpu param in gpte_access (bsc#1117665).\n- KVM: PPC: Book3S: Fix incorrect guest-to-user-translation error handling (bsc#1061840).\n- KVM: PPC: Book3S HV: Check for MMU ready on piggybacked virtual cores (bsc#1061840).\n- KVM: PPC: Book3S HV: Do not lose pending doorbell request on migration on P9 (bsc#1061840).\n- KVM: PPC: Book3S HV: Do not push XIVE context when not using XIVE device (bsc#1061840).\n- KVM: PPC: Book3S HV: Fix lockdep warning when entering the guest (bsc#1061840).\n- KVM: PPC: Book3S HV: Fix race in re-enabling XIVE escalation interrupts (bsc#1061840).\n- KVM: PPC: Book3S HV: Handle virtual mode in XIVE VCPU push code (bsc#1061840).\n- KVM: PPC: Book3S HV: use smp_mb() when setting/clearing host_ipi flag (bsc#1061840).\n- KVM: PPC: Book3S HV: XIVE: Free escalation interrupts before disabling the VP (bsc#1061840).\n- KVM: vmx, svm: always run with EFER.NXE=1 when shadow paging is active (bsc#1117665).\n- KVM: x86: add tracepoints around __direct_map and FNAME(fetch) (bsc#1117665).\n- KVM: x86: adjust kvm_mmu_page member to save 8 bytes (bsc#1117665).\n- KVM: x86: change kvm_mmu_page_get_gfn BUG_ON to WARN_ON (bsc#1117665).\n- KVM: x86: Do not release the page inside mmu_set_spte() (bsc#1117665).\n- KVM: x86: make FNAME(fetch) and __direct_map more similar (bsc#1117665).\n- KVM: x86, powerpc: do not allow clearing largepages debugfs entry (bsc#1117665).\n- KVM: x86: remove now unneeded hugepage gfn adjustment (bsc#1117665).\n- leds: leds-lp5562 allow firmware files up to the maximum length (bsc#1051510).\n- leds: trigger: gpio: GPIO 0 is valid (bsc#1051510).\n- libertas: Add missing sentinel at end of if_usb.c fw_table (bsc#1051510).\n- libertas_tf: Use correct channel range in lbtf_geo_init (bsc#1051510).\n- libiscsi: do not try to bypass SCSI EH (bsc#1142076).\n- lib/mpi: Fix karactx leak in mpi_powm (bsc#1051510).\n- libnvdimm/altmap: Track namespace boundaries in altmap (bsc#1150305).\n- libnvdimm: prevent nvdimm from requesting key when security is disabled (bsc#1137982).\n- libnvdimm/security: provide fix for secure-erase to use zero-key (bsc#1149853).\n- lib/scatterlist: Fix chaining support in sgl_alloc_order() (git-fixes).\n- lib/scatterlist: Introduce sgl_alloc() and sgl_free() (git-fixes).\n- lightnvm: remove dependencies on BLK_DEV_NVME and PCI (bsc#1150846).\n- livepatch: Nullify obj-\u003emod in klp_module_coming()\u0027s error path (bsc#1071995).\n- lpfc: Add additional discovery log messages (bsc#1154521).\n- lpfc: Add FA-WWN Async Event reporting (bsc#1154521).\n- lpfc: Add FC-AL support to lpe32000 models (bsc#1154521).\n- lpfc: Add log macros to allow print by serverity or verbocity setting (bsc#1154521).\n- lpfc: Fix bad ndlp ptr in xri aborted handling (bsc#1154521).\n- lpfc: fix coverity error of dereference after null check (bsc#1154521).\n- lpfc: Fix hardlockup in lpfc_abort_handler (bsc#1154521).\n- lpfc: Fix lockdep errors in sli_ringtx_put (bsc#1154521).\n- lpfc: fix lpfc_nvmet_mrq to be bound by hdw queue count (bsc#1154521).\n- lpfc: Fix reporting of read-only fw error errors (bsc#1154521).\n- lpfc: Fix SLI3 hba in loop mode not discovering devices (bsc#1154521).\n- lpfc: Make FW logging dynamically configurable (bsc#1154521).\n- lpfc: Remove lock contention target write path (bsc#1154521).\n- lpfc: Revise interrupt coalescing for missing scenarios (bsc#1154521).\n- lpfc: Slight fast-path Performance optimizations (bsc#1154521).\n- lpfc: Update lpfc version to 12.6.0.0 (bsc#1154521).\n- mac80211: accept deauth frames in IBSS mode (bsc#1051510).\n- mac80211: fix txq null pointer dereference (bsc#1051510).\n- mac80211: minstrel_ht: fix per-group max throughput rate initialization (bsc#1051510).\n- mac80211: Reject malformed SSID elements (bsc#1051510).\n- macsec: drop skb sk before calling gro_cells_receive (bsc#1051510).\n- md: do not report active array_state until after revalidate_disk() completes (git-fixes).\n- md: only call set_in_sync() when it is expected to succeed (git-fixes).\n- md/raid0: avoid RAID0 data corruption due to layout confusion (bsc#1140090).\n- md/raid0: fix warning message for parameter default_layout (bsc#1140090).\n- md/raid6: Set R5_ReadError when there is read failure on parity disk (git-fixes).\n- media: atmel: atmel-isc: fix asd memory allocation (bsc#1135642).\n- media: atmel: atmel-isi: fix timeout value for stop streaming (bsc#1051510).\n- media: cpia2_usb: fix memory leaks (bsc#1051510).\n- media: dib0700: fix link error for dibx000_i2c_set_speed (bsc#1051510).\n- media: dvb-core: fix a memory leak bug (bsc#1051510).\n- media: em28xx: fix handler for vidioc_s_input() (bsc#1051510).\n- media: em28xx: stop rewriting device\u0027s struct (bsc#1051510).\n- media: exynos4-is: fix leaked of_node references (bsc#1051510).\n- media: fdp1: Reduce FCP not found message level to debug (bsc#1051510).\n- media: gspca: zero usb_buf on error (bsc#1051510).\n- media: hdpvr: Add device num check and handling (bsc#1051510).\n- media: hdpvr: add terminating 0 at end of string (bsc#1051510).\n- media: i2c: ov5645: Fix power sequence (bsc#1051510).\n- media: iguanair: add sanity checks (bsc#1051510).\n- media: marvell-ccic: do not generate EOF on parallel bus (bsc#1051510).\n- media: mc-device.c: do not memset __user pointer contents (bsc#1051510).\n- media: omap3isp: Do not set streaming state on random subdevs (bsc#1051510).\n- media: omap3isp: Set device on omap3isp subdevs (bsc#1051510).\n- media: ov6650: Fix sensor possibly not detected on probe (bsc#1051510).\n- media: ov6650: Move v4l2_clk_get() to ov6650_video_probe() helper (bsc#1051510).\n- media: ov9650: add a sanity check (bsc#1051510).\n- media: radio/si470x: kill urb on error (bsc#1051510).\n- media: replace strcpy() by strscpy() (bsc#1051510).\n- media: Revert \u0027[media] marvell-ccic: reset ccic phy when stop streaming for stability\u0027 (bsc#1051510).\n- media: saa7134: fix terminology around saa7134_i2c_eeprom_md7134_gate() (bsc#1051510).\n- media: saa7146: add cleanup in hexium_attach() (bsc#1051510).\n- media: sn9c20x: Add MSI MS-1039 laptop to flip_dmi_table (bsc#1051510).\n- media: stkwebcam: fix runtime PM after driver unbind (bsc#1051510).\n- media: technisat-usb2: break out of loop at end of buffer (bsc#1051510).\n- media: tm6000: double free if usb disconnect while streaming (bsc#1051510).\n- media: ttusb-dec: Fix info-leak in ttusb_dec_send_command() (bsc#1051510).\n- media: vb2: Fix videobuf2 to map correct area (bsc#1051510).\n- memstick: jmb38x_ms: Fix an error handling path in \u0027jmb38x_ms_probe()\u0027 (bsc#1051510).\n- mfd: intel-lpss: Remove D3cold delay (bsc#1051510).\n- mic: avoid statically declaring a \u0027struct device\u0027 (bsc#1051510).\n- mISDN: enforce CAP_NET_RAW for raw sockets (bsc#1051510).\n- mld: fix memory leak in mld_del_delrec() (networking-stable-19_09_05).\n- mmc: core: Add sdio_retune_hold_now() and sdio_retune_release() (bsc#1111666).\n- mmc: core: API to temporarily disable retuning for SDIO CRC errors (bsc#1111666).\n- mmc: sdhci-esdhc-imx: correct the fix of ERR004536 (git-fixes).\n- mmc: sdhci: Fix incorrect switch to HS mode (bsc#1051510).\n- mmc: sdhci: improve ADMA error reporting (bsc#1051510).\n- mmc: sdhci-msm: fix mutex while in spinlock (bsc#1142635).\n- mmc: sdhci-of-arasan: Do now show error message in case of deffered probe (bsc#1119086).\n- mmc: sdhci-of-esdhc: set DMA snooping based on DMA coherence (bsc#1051510).\n- mtd: nand: mtk: fix incorrect register setting order about ecc irq.\n- mtd: spi-nor: Fix Cadence QSPI RCU Schedule Stall (bsc#1051510).\n- mvpp2: refactor MTU change code (networking-stable-19_08_08).\n- net: bridge: delete local fdb on device init failure (networking-stable-19_08_08).\n- net: bridge: mcast: do not delete permanent entries when fast leave is enabled (networking-stable-19_08_08).\n- netfilter: nf_nat: do not bug when mapping already exists (bsc#1146612).\n- net: fix ifindex collision during namespace removal (networking-stable-19_08_08).\n- net: Fix null de-reference of device refcount (networking-stable-19_09_15).\n- net: fix skb use after free in netpoll (networking-stable-19_09_05).\n- net: gso: Fix skb_segment splat when splitting gso_size mangled skb having linear-headed frag_list (networking-stable-19_09_15).\n- net/ibmvnic: Fix EOI when running in XIVE mode (bsc#1089644, ltc#166495, ltc#165544, git-fixes).\n- net/ibmvnic: prevent more than one thread from running in reset (bsc#1152457 ltc#174432).\n- net/ibmvnic: unlock rtnl_lock in reset so linkwatch_event can run (bsc#1152457 ltc#174432).\n- net/mlx4_en: fix a memory leak bug (bsc#1046299).\n- net/mlx5: Add device ID of upcoming BlueField-2 (bsc#1046303 ).\n- net/mlx5e: Only support tx/rx pause setting for port owner (networking-stable-19_08_21).\n- net/mlx5e: Prevent encap flow counter update async to user query (networking-stable-19_08_08).\n- net/mlx5e: Use flow keys dissector to parse packets for ARFS (networking-stable-19_08_21).\n- net/mlx5: Fix error handling in mlx5_load() (bsc#1046305 ).\n- net/mlx5: Use reversed order when unregister devices (networking-stable-19_08_08).\n- net: openvswitch: free vport unless register_netdevice() succeeds (git-fixes).\n- net/packet: fix race in tpacket_snd() (networking-stable-19_08_21).\n- net/phy: fix DP83865 10 Mbps HDX loopback disable function (networking-stable-19_09_30).\n- net: qlogic: Fix memory leak in ql_alloc_large_buffers (networking-stable-19_10_05).\n- net: qrtr: Stop rx_worker before freeing node (networking-stable-19_09_30).\n- net/rds: Fix error handling in rds_ib_add_one() (networking-stable-19_10_05).\n- net/rds: fix warn in rds_message_alloc_sgs (bsc#1154848).\n- net/rds: remove user triggered WARN_ON in rds_sendmsg (bsc#1154848).\n- net: Replace NF_CT_ASSERT() with WARN_ON() (bsc#1146612).\n- net/sched: act_sample: do not push mac header on ip6gre ingress (networking-stable-19_09_30).\n- net: sched: act_sample: fix psample group handling on overwrite (networking-stable-19_09_05).\n- net_sched: add policy validation for action attributes (networking-stable-19_09_30).\n- net: sched: Fix a possible null-pointer dereference in dequeue_func() (networking-stable-19_08_08).\n- net_sched: fix backward compatibility for TCA_ACT_KIND (git-fixes).\n- net/smc: make sure EPOLLOUT is raised (networking-stable-19_08_28).\n- net: stmmac: dwmac-rk: Do not fail if phy regulator is absent (networking-stable-19_09_05).\n- net: Unpublish sk from sk_reuseport_cb before call_rcu (networking-stable-19_10_05).\n- NFC: fix attrs checks in netlink interface (bsc#1051510).\n- NFC: fix memory leak in llcp_sock_bind() (bsc#1051510).\n- NFC: pn533: fix use-after-free and memleaks (bsc#1051510).\n- NFS4: Fix v4.0 client state corruption when mount (git-fixes).\n- nfsd: degraded slot-count more gracefully as allocation nears exhaustion (bsc#1150381).\n- nfsd: Do not release the callback slot unless it was actually held (git-fixes).\n- nfsd: Fix overflow causing non-working mounts on 1 TB machines (bsc#1150381).\n- nfsd: fix performance-limiting session calculation (bsc#1150381).\n- nfsd: give out fewer session slots as limit approaches (bsc#1150381).\n- nfsd: handle drc over-allocation gracefully (bsc#1150381).\n- nfsd: increase DRC cache limit (bsc#1150381).\n- NFS: Do not interrupt file writeout due to fatal errors (git-fixes).\n- NFS: Do not open code clearing of delegation state (git-fixes).\n- NFS: Ensure O_DIRECT reports an error if the bytes read/written is 0 (git-fixes).\n- NFS: Fix regression whereby fscache errors are appearing on \u0027nofsc\u0027 mounts (git-fixes).\n- NFS: Forbid setting AF_INET6 to \u0027struct sockaddr_in\u0027-\u003esin_family (git-fixes).\n- NFS: Refactor nfs_lookup_revalidate() (git-fixes).\n- NFS: Remove redundant semicolon (git-fixes).\n- NFSv4.1: Again fix a race where CB_NOTIFY_LOCK fails to wake a waiter (git-fixes).\n- NFSv4.1 - backchannel request should hold ref on xprt (bsc#1152624).\n- NFSv4.1: Fix open stateid recovery (git-fixes).\n- NFSv4.1: Only reap expired delegations (git-fixes).\n- NFSv4: Fix an Oops in nfs4_do_setattr (git-fixes).\n- NFSv4: Fix a potential sleep while atomic in nfs4_do_reclaim() (git-fixes).\n- NFSv4: Fix delegation state recovery (git-fixes).\n- NFSv4: Fix lookup revalidate of regular files (git-fixes).\n- NFSv4: Fix OPEN / CLOSE race (git-fixes).\n- NFSv4: Handle the special Linux file open access mode (git-fixes).\n- NFSv4: Only pass the delegation to setattr if we\u0027re sending a truncate (git-fixes).\n- NFSv4/pnfs: Fix a page lock leak in nfs_pageio_resend() (git-fixes).\n- nl80211: fix null pointer dereference (bsc#1051510).\n- nl80211: Fix possible Spectre-v1 for CQM RSSI thresholds (bsc#1051510).\n- null_blk: complete requests from -\u003etimeout (bsc#1149446).\n- null_blk: wire up timeouts (bsc#1149446).\n- nvme: do not abort completed request in nvme_cancel_request (bsc#1149446).\n- nvme: fix multipath crash when ANA is deactivated (bsc#1149446).\n- nvme: fix multipath crash when ANA is deactivated (bsc#1149446).\n- nvmem: Use the same permissions for eeprom as for nvmem (git-fixes).\n- nvme-rdma: Allow DELETING state change failure in (bsc#1104967,).\n- nvme-rdma: centralize admin/io queue teardown sequence (bsc#1142076).\n- nvme-rdma: centralize controller setup sequence (bsc#1142076).\n- nvme-rdma: fix a NULL deref when an admin connect times out (bsc#1149446).\n- nvme-rdma: fix a NULL deref when an admin connect times out (bsc#1149446).\n- nvme-rdma: fix timeout handler (bsc#1149446).\n- nvme-rdma: fix timeout handler (bsc#1149446).\n- nvme-rdma: remove redundant reference between ib_device and tagset (bsc#1149446).\n- nvme-rdma: stop admin queue before freeing it (bsc#1140155).\n- nvme-rdma: support up to 4 segments of inline data (bsc#1142076).\n- nvme-rdma: unquiesce queues when deleting the controller (bsc#1142076).\n- nvme-rdma: use dynamic dma mapping per command (bsc#1149446).\n- nvme: remove ns sibling before clearing path (bsc#1140155).\n- nvme: return BLK_EH_DONE from -\u003etimeout (bsc#1142076).\n- nvme-tcp: fix a NULL deref when an admin connect times out (bsc#1149446).\n- nvme-tcp: fix timeout handler (bsc#1149446).\n- nvme: wait until all completed request\u0027s complete fn is called (bsc#1149446).\n- objtool: Clobber user CFLAGS variable (bsc#1153236).\n- openvswitch: change type of UPCALL_PID attribute to NLA_UNSPEC (networking-stable-19_09_30).\n- packaging: add support for riscv64\n- PCI: Add ACS quirk for Amazon Annapurna Labs root ports (bsc#1152187,bsc#1152525).\n- PCI: Add Amazon\u0027s Annapurna Labs vendor ID (bsc#1152187,bsc#1152525).\n- PCI: Add quirk to disable MSI-X support for Amazon\u0027s Annapurna Labs Root Port (bsc#1152187,bsc#1152525).\n- PCI: Correct pci=resource_alignment parameter example (bsc#1051510).\n- PCI: dra7xx: Fix legacy INTD IRQ handling (bsc#1087092).\n- PCI: hv: Detect and fix Hyper-V PCI domain number collision (bsc#1150423).\n- PCI: hv: Use bytes 4 and 5 from instance ID as the PCI domain numbers (bsc#1153263).\n- PCI: PM: Fix pci_power_up() (bsc#1051510).\n- PCI/VPD: Prevent VPD access for Amazon\u0027s Annapurna Labs Root Port (bsc#1152187,bsc#1152525).\n- phylink: fix kernel-doc warnings (bsc#1111666).\n- phy: renesas: rcar-gen3-usb2: Disable clearing VBUS in over-current (bsc#1051510).\n- pinctrl: cherryview: restore Strago DMI workaround for all versions (bsc#1111666).\n- pinctrl: tegra: Fix write barrier placement in pmx_writel (bsc#1051510).\n- platform/x86: classmate-laptop: remove unused variable (bsc#1051510).\n- platform/x86: i2c-multi-instantiate: Derive the device name from parent (bsc#1111666).\n- platform/x86: i2c-multi-instantiate: Fail the probe if no IRQ provided (bsc#1111666).\n- platform/x86: pmc_atom: Add Siemens SIMATIC IPC227E to critclk_systems DMI table (bsc#1051510).\n- platform/x86: pmc_atom: Add Siemens SIMATIC IPC277E to critclk_systems DMI table (bsc#1051510).\n- PM: sleep: Fix possible overflow in pm_system_cancel_wakeup() (bsc#1051510).\n- Pnfs fallback to MDS if no deviceid found (git-fixes).\n- pnfs/flexfiles: Fix PTR_ERR() dereferences in ff_layout_track_ds_error (git-fixes).\n- pnfs/flexfiles: Turn off soft RPC calls (git-fixes).\n- powerpc/64: Make meltdown reporting Book3S 64 specific (bsc#1091041).\n- powerpc/64: Make sys_switch_endian() traceable (bsc#1065729).\n- powerpc/64s/pseries: radix flush translations before MMU is enabled at boot (bsc#1055186).\n- powerpc/64s/radix: Fix MADV_[FREE|DONTNEED] TLB flush miss problem with THP (bsc#1152161 ltc#181664).\n- powerpc/64s/radix: Fix memory hotplug section page table creation (bsc#1065729).\n- powerpc/64s/radix: Fix memory hot-unplug page table split (bsc#1065729).\n- powerpc/64s/radix: Implement _tlbie(l)_va_range flush functions (bsc#1152161 ltc#181664).\n- powerpc/64s/radix: Improve preempt handling in TLB code (bsc#1152161 ltc#181664).\n- powerpc/64s/radix: Improve TLB flushing for page table freeing (bsc#1152161 ltc#181664).\n- powerpc/64s/radix: Introduce local single page ceiling for TLB range flush (bsc#1055117 bsc#1152161 ltc#181664).\n- powerpc/64s/radix: keep kernel ERAT over local process/guest invalidates (bsc#1055186).\n- powerpc/64s/radix: Optimize flush_tlb_range (bsc#1152161 ltc#181664).\n- powerpc/64s/radix: tidy up TLB flushing code (bsc#1055186).\n- powerpc/64s: Rename PPC_INVALIDATE_ERAT to PPC_ISA_3_0_INVALIDATE_ERAT (bsc#1055186).\n- powerpc/book3s64/mm: Do not do tlbie fixup for some hardware revisions (bsc#1152161 ltc#181664).\n- powerpc/book3s64/radix: Rename CPU_FTR_P9_TLBIE_BUG feature flag (bsc#1152161 ltc#181664).\n- powerpc: bpf: Fix generation of load/store DW instructions (bsc#1065729).\n- powerpc/bpf: use unsigned division instruction for 64-bit operations (bsc#1065729).\n- powerpc: Drop page_is_ram() and walk_system_ram_range() (bsc#1065729).\n- powerpc/irq: Do not WARN continuously in arch_local_irq_restore() (bsc#1065729).\n- powerpc/irq: drop arch_early_irq_init() (bsc#1065729).\n- powerpc/mm/book3s64: Move book3s64 code to pgtable-book3s64 (bsc#1055186).\n- powerpc/mm: Fixup tlbie vs mtpidr/mtlpidr ordering issue on POWER9 (bsc#1152161 ltc#181664).\n- powerpc/mm: mark more tlb functions as __always_inline (bsc#1055186).\n- powerpc/mm: Properly invalidate when setting process table base (bsc#1055186).\n- powerpc/mm/radix: Drop unneeded NULL check (bsc#1152161 ltc#181664).\n- powerpc/mm/radix: implement LPID based TLB flushes to be used by KVM (bsc#1152161 ltc#181664).\n- powerpc/mm/radix: mark as __tlbie_pid() and friends as__always_inline (bsc#1055186).\n- powerpc/mm/radix: mark __radix__flush_tlb_range_psize() as __always_inline (bsc#1055186).\n- powerpc/mm: Simplify page_is_ram by using memblock_is_memory (bsc#1065729).\n- powerpc/mm: Use memblock API for PPC32 page_is_ram (bsc#1065729).\n- powerpc/module64: Fix comment in R_PPC64_ENTRY handling (bsc#1065729).\n- powerpc/papr_scm: Fix an off-by-one check in papr_scm_meta_{get, set} (bsc#1152243 ltc#181472).\n- powerpc/powernv: Fix compile without CONFIG_TRACEPOINTS (bsc#1065729).\n- powerpc/powernv/ioda2: Allocate TCE table levels on demand for default DMA window (bsc#1061840).\n- powerpc/powernv/ioda: Fix race in TCE level allocation (bsc#1061840).\n- powerpc/powernv: move OPAL call wrapper tracing and interrupt handling to C (bsc#1065729).\n- powerpc/powernv/npu: Remove obsolete comment about TCE_KILL_INVAL_ALL (bsc#1065729).\n- powerpc/pseries: address checkpatch warnings in dlpar_offline_cpu (bsc#1156700 ltc#182459).\n- powerpc/pseries: Call H_BLOCK_REMOVE when supported (bsc#1109158).\n- powerpc/pseries: Fix cpu_hotplug_lock acquisition in resize_hpt() (bsc#1065729).\n- powerpc/pseries/memory-hotplug: Fix return value type of find_aa_index (bsc#1065729).\n- powerpc/pseries/mobility: use cond_resched when updating device tree (bsc#1153112 ltc#181778).\n- powerpc/pseries: Read TLB Block Invalidate Characteristics (bsc#1109158).\n- powerpc/pseries: Remove confusing warning message (bsc#1109158).\n- powerpc/pseries: safely roll back failed DLPAR cpu add (bsc#1156700 ltc#182459).\n- powerpc/ptrace: Simplify vr_get/set() to avoid GCC warning (bsc#1148868).\n- powerpc/rtas: allow rescheduling while changing cpu states (bsc#1153112 ltc#181778).\n- powerpc/security/book3s64: Report L1TF status in sysfs (bsc#1091041).\n- powerpc/security: Fix wrong message when RFI Flush is disable (bsc#1131107).\n- powerpc/xive: Fix bogus error code returned by OPAL (bsc#1065729).\n- powerpc/xive: Implement get_irqchip_state method for XIVE to fix shutdown race (bsc#1065729).\n- powerpc/xive: Prevent page fault issues in the machine crash handler (bsc#1156882 ltc#182435).\n- powerpc/xmon: Fix opcode being uninitialized in print_insn_powerpc (bsc#1065729).\n- powerplay: Respect units on max dcfclk watermark (bsc#1111666).\n- power: reset: gpio-restart: Fix typo when gpio reset is not found (bsc#1051510).\n- power: supply: Init device wakeup after device_add() (bsc#1051510).\n- power: supply: max14656: fix potential use-after-free (bsc#1051510).\n- power: supply: sysfs: ratelimit property read error message (bsc#1051510).\n- ppp: Fix memory leak in ppp_write (git-fixes).\n- printk: Do not lose last line in kmsg buffer dump (bsc#1152460).\n- printk: fix printk_time race (bsc#1152466).\n- printk/panic: Avoid deadlock in printk() after stopping CPUs by NMI (bsc#1148712).\n- qed: iWARP - Fix default window size to be based on chip (bsc#1050536 bsc#1050545).\n- qed: iWARP - Fix tc for MPA ll2 connection (bsc#1050536 bsc#1050545).\n- qed: iWARP - fix uninitialized callback (bsc#1050536 bsc#1050545).\n- qed: iWARP - Use READ_ONCE and smp_store_release to access ep-\u003estate (bsc#1050536 bsc#1050545).\n- qla2xxx: kABI fixes for v10.01.00.18-k (bsc#1123034 bsc#1131304 bsc#1127988).\n- qla2xxx: remove SGI SN2 support (bsc#1123034 bsc#1131304 bsc#1127988).\n- qmi_wwan: add support for Cinterion CLS8 devices (networking-stable-19_10_05).\n- quota: fix wrong condition in is_quota_modification() (bsc#1152026).\n- r8152: Set macpassthru in reset_resume callback (bsc#1051510).\n- r8152: Set memory to all 0xFFs on failed reg reads (bsc#1051510).\n- RDMA/bnxt_re: Fix spelling mistake \u0027missin_resp\u0027 -\u003e \u0027missing_resp\u0027 (bsc#1050244).\n- RDMA/efa: Add Amazon EFA driver (jsc#SLE-4805)\n- RDMA: Fix goto target to release the allocated memory (bsc#1050244).\n- RDMA/hns: Add reset process for function-clear (bsc#1155061).\n- RDMA/hns: Remove the some magic number (bsc#1155061).\n- RDMA/restrack: Track driver QP types in resource tracker (jsc#SLE-4805)\n- rds: Fix warning (bsc#1154848).\n- regulator: lm363x: Fix off-by-one n_voltages for lm3632 ldo_vpos/ldo_vneg (bsc#1051510).\n- rtlwifi: Fix file release memory leak (bsc#1111666).\n- rtlwifi: rtl8192cu: Fix value set in descriptor (bsc#1142635).\n- s390: add support for IBM z15 machines (bsc#1152696 LTC#181731).\n- s390/cmf: set_schib_wait add timeout (bsc#1153509, bsc#1153476).\n- s390/cpumsf: Check for CPU Measurement sampling (bsc#1153681 LTC#181855).\n- s390/crypto: fix gcm-aes-s390 selftest failures (bsc#1137861 LTC#178091).\n- s390: fix setting of mio addressing control (bsc#1152665 LTC#181729).\n- s390/pci: add mio_enabled attribute (bsc#1152665 LTC#181729).\n- s390/pci: correctly handle MIO opt-out (bsc#1152665 LTC#181729).\n- s390/pci: deal with devices that have no support for MIO instructions (bsc#1152665 LTC#181729).\n- s390/pci: fix MSI message data (bsc#1152697 LTC#181730).\n- sc16is7xx: Fix for \u0027Unexpected interrupt: 8\u0027 (bsc#1051510).\n- sch_cbq: validate TCA_CBQ_WRROPT to avoid crash (networking-stable-19_10_05).\n- sch_dsmark: fix potential NULL deref in dsmark_init() (networking-stable-19_10_05).\n- sched/fair: Avoid divide by zero when rebalancing domains (bsc#1096254).\n- sch_hhf: ensure quantum and hhf_non_hh_weight are non-zero (networking-stable-19_09_15).\n- sch_netem: fix a divide by zero in tabledist() (networking-stable-19_09_30).\n- scripts/arch-symbols: add missing link.\n- scsi: lpfc: Add enablement of multiple adapter dumps (bsc#1154601).\n- scsi: lpfc: Add registration for CPU Offline/Online events (bsc#1154601).\n- scsi: lpfc: Change default IRQ model on AMD architectures (bsc#1154601).\n- scsi: lpfc: Check queue pointer before use (bsc#1154242).\n- scsi: lpfc: Clarify FAWNN error message (bsc#1154601).\n- scsi: lpfc: cleanup: remove unused fcp_txcmlpq_cnt (bsc#1154521).\n- scsi: lpfc: Complete removal of FCoE T10 PI support on SLI-4 adapters (bsc#1154521).\n- scsi: lpfc: Convert existing %pf users to %ps (bsc#1154521).\n- scsi: lpfc: Fix a kernel warning triggered by lpfc_get_sgl_per_hdwq() (bsc#1154601).\n- scsi: lpfc: Fix a kernel warning triggered by lpfc_sli4_enable_intr() (bsc#1154601).\n- scsi: lpfc: fix build error of lpfc_debugfs.c for vfree/vmalloc (bsc#1154601).\n- scsi: lpfc: Fix configuration of BB credit recovery in service parameters (bsc#1154601).\n- scsi: lpfc: Fix coverity errors on NULL pointer checks (bsc#1154521).\n- scsi: lpfc: fix: Coverity: lpfc_cmpl_els_rsp(): Null pointer dereferences (bsc#1154601).\n- scsi: lpfc: fix: Coverity: lpfc_get_scsi_buf_s3(): Null pointer dereferences (bsc#1154601).\n- scsi: lpfc: Fix device recovery errors after PLOGI failures (bsc#1154521).\n- scsi: lpfc: Fix devices that do not return after devloss followed by rediscovery (bsc#1137040).\n- scsi: lpfc: Fix discovery failures when target device connectivity bounces (bsc#1154521).\n- scsi: lpfc: Fix duplicate unreg_rpi error in port offline flow (bsc#1154601).\n- scsi: lpfc: Fix dynamic fw log enablement check (bsc#1154601).\n- scsi: lpfc: Fix GPF on scsi command completion (bsc#1154521).\n- scsi: lpfc: Fix hdwq sgl locks and irq handling (bsc#1154521).\n- scsi: lpfc: Fix host hang at boot or slow boot (bsc#1154521).\n- scsi: lpfc: fix inlining of lpfc_sli4_cleanup_poll_list() (bsc#1154601).\n- scsi: lpfc: Fix kernel crash at lpfc_nvme_info_show during remote port bounce (bsc#1154601).\n- scsi: lpfc: Fix list corruption detected in lpfc_put_sgl_per_hdwq (bsc#1154521).\n- scsi: lpfc: Fix list corruption in lpfc_sli_get_iocbq (bsc#1154521).\n- scsi: lpfc: Fix locking on mailbox command completion (bsc#1154521).\n- scsi: lpfc: Fix lpfc_cpumask_of_node_init() (bsc#1154601).\n- scsi: lpfc: Fix miss of register read failure check (bsc#1154521).\n- scsi: lpfc: Fix NULL check before mempool_destroy is not needed (bsc#1154601).\n- scsi: lpfc: Fix null ptr oops updating lpfc_devloss_tmo via sysfs attribute (bsc#1140845).\n- scsi: lpfc: Fix NVMe ABTS in response to receiving an ABTS (bsc#1154521).\n- scsi: lpfc: Fix NVME io abort failures causing hangs (bsc#1154521).\n- scsi: lpfc: Fix premature re-enabling of interrupts in lpfc_sli_host_down (bsc#1154521).\n- scsi: lpfc: Fix propagation of devloss_tmo setting to nvme transport (bsc#1140883).\n- scsi: lpfc: Fix pt2pt discovery on SLI3 HBAs (bsc#1154521).\n- scsi: lpfc: Fix rpi release when deleting vport (bsc#1154521).\n- scsi: lpfc: fix spelling error in MAGIC_NUMER_xxx (bsc#1154601).\n- scsi: lpfc: Fix spinlock_irq issues in lpfc_els_flush_cmd() (bsc#1154521).\n- scsi: lpfc: Fix unexpected error messages during RSCN handling (bsc#1154601).\n- scsi: lpfc: Honor module parameter lpfc_use_adisc (bsc#1154601).\n- scsi: lpfc: Initialize cpu_map for not present cpus (bsc#1154601).\n- scsi: lpfc: Limit xri count for kdump environment (bsc#1154124).\n- scsi: lpfc: lpfc_attr: Fix Use plain integer as NULL pointer (bsc#1154601).\n- scsi: lpfc: lpfc_nvmet: Fix Use plain integer as NULL pointer (bsc#1154601).\n- scsi: lpfc: Make function lpfc_defer_pt2pt_acc static (bsc#1154521).\n- scsi: lpfc: Make lpfc_debugfs_ras_log_data static (bsc#1154601).\n- scsi: lpfc: Mitigate high memory pre-allocation by SCSI-MQ (bsc#1154601).\n- scsi: lpfc: Raise config max for lpfc_fcp_mq_threshold variable (bsc#1154601).\n- scsi: lpfc: Remove bg debugfs buffers (bsc#1144375).\n- scsi: lpfc: remove left-over BUILD_NVME defines (bsc#1154268).\n- scsi: lpfc: revise nvme max queues to be hdwq count (bsc#1154601).\n- scsi: lpfc: Sync with FC-NVMe-2 SLER change to require Conf with SLER (bsc#1154601).\n- scsi: lpfc: Update async event logging (bsc#1154521).\n- scsi: lpfc: Update lpfc version to 12.4.0.1 (bsc#1154521).\n- scsi: lpfc: Update lpfc version to 12.6.0.1 (bsc#1154601).\n- scsi: lpfc: Update lpfc version to 12.6.0.2 (bsc#1154601).\n- scsi: qedf: fc_rport_priv reference counting fixes (bsc#1098291).\n- scsi: qedf: Modify abort and tmf handler to handle edge condition and flush (bsc#1098291).\n- scsi: qla2xxx: Add 28xx flash primary/secondary status/image mechanism (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Add Device ID for ISP28XX (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Add error handling for PLOGI ELS passthrough (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Add error handling for PLOGI ELS passthrough (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Add error handling for PLOGI ELS passthrough (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Add First Burst support for FC-NVMe devices (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Add fw_attr and port_no SysFS node (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Add new FW dump template entry types (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Add pci function reset support (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Add protection mask module parameters (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Add Serdes support for ISP28XX (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Add support for multiple fwdump templates/segments (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Add support for setting port speed (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Allow NVMe IO to resume with short cable pull (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: allow session delete to finish before create (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Always check the qla2x00_wait_for_hba_online() return value (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Avoid PCI IRQ affinity mapping when multiqueue is not supported (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: avoid printf format warning (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Avoid that Coverity complains about dereferencing a NULL rport pointer (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Avoid that lockdep complains about unsafe locking in tcm_qla2xxx_close_session() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Avoid that qla2x00_mem_free() crashes if called twice (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Capture FW dump on MPI heartbeat stop event (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Capture FW dump on MPI heartbeat stop event (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Capture FW dump on MPI heartbeat stop event (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Change abort wait_loop from msleep to wait_event_timeout (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Change data_dsd into an array (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Change default ZIO threshold (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Change the return type of qla24xx_read_flash_data() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Change the return type of qla2x00_update_ms_fdmi_iocb() into void (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Check for FW started flag before aborting (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: check for kstrtol() failure (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Check for MB timeout while capturing ISP27/28xx FW dump (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Check for MB timeout while capturing ISP27/28xx FW dump (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Check for MB timeout while capturing ISP27/28xx FW dump (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Check secondary image if reading the primary image fails (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Check the PCI info string output buffer size (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Check the size of firmware data structures at compile time (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Cleanup fcport memory to prevent leak (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Cleanup redundant qla2x00_abort_all_cmds during unload (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Cleanups for NVRAM/Flash read/write path (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: cleanup trace buffer initialization (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Complain if a command is released that is owned by the firmware (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Complain if a mailbox command times out (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Complain if a soft reset fails (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Complain if parsing the version string fails (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Complain if sp-\u003edone() is not called from the completion path (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Complain if waiting for pending commands times out (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Complain loudly about reference count underflow (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Correct error handling during initialization failures (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Correction and improvement to fwdt processing (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Correctly report max/min supported speeds (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: deadlock by configfs_depend_item (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Declare fourth qla2x00_set_model_info() argument const (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Declare local symbols static (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Declare qla24xx_build_scsi_crc_2_iocbs() static (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Declare qla2x00_find_new_loop_id() static (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Declare qla_tgt_cmd.cdb const (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Declare the fourth ql_dump_buffer() argument const (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Disable T10-DIF feature with FC-NVMe during probe (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Do command completion on abort timeout (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: qla2xxx: Do not corrupt vha-\u003eplogi_ack_list (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: do not use zero for FC4_PRIORITY_NVME (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: qla2xxx: Downgrade driver to 10.01.00.19-k There are upstream bug reports against 10.01.00.19-k which haven\u0027t been resolved. Also the newer version failed to get a proper review. For time being it\u0027s better to got with the older version and do not introduce new bugs.\n- scsi: qla2xxx: Dual FCP-NVMe target port support (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Dual FCP-NVMe target port support (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Dual FCP-NVMe target port support (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Enable type checking for the SRB free and done callback functions (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix abort timeout race condition (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix a dma_pool_free() call (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: qla2xxx: Fix a NULL pointer dereference (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix a qla24xx_enable_msix() error path (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix a race condition between aborting and completing a SCSI command (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix a recently introduced kernel warning (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix a small typo in qla_bsg.c (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix code indentation for qla27xx_fwdt_entry (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix comment alignment in qla_bsg.c (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix comment in MODULE_PARM_DESC in qla2xxx (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix device connect issues in P2P configuration (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: qla2xxx: Fix different size DMA Alloc/Unmap (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix DMA error when the DIF sg buffer crosses 4GB boundary (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix DMA unmap leak (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix double scsi_done for abort path (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: qla2xxx: Fix driver reload for ISP82xx (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix driver unload hang (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: qla2xxx: Fix driver unload when FC-NVMe LUNs are connected (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: fix fcport null pointer access (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix flash read for Qlogic ISPs (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix formatting of pointer types (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix fw dump corruption (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix fw options handle eh_bus_reset() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix gnl.l memory leak on adapter init failure (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix hang in fcport delete path (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix hardirq-unsafe locking (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix hardlockup in abort command during driver remove (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix kernel crash after disconnecting NVMe devices (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix LUN discovery if loop id is not assigned yet by firmware (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix memory leak when sending I/O fails (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: qla2xxx: Fix message indicating vectors used by driver (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix N2N link reset (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix N2N link reset (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Fix N2N link reset (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Fix N2N link up fail (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix N2N link up fail (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Fix N2N link up fail (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Fix Nport ID display value (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix NULL pointer crash due to stale CPUID (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix NVME cmd and LS cmd timeout race condition (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix NVMe port discovery after a short device port loss (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix panic from use after free in qla2x00_async_tm_cmd (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix partial flash write of MBI (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Fix possible fcport null-pointer dereferences (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix premature timer expiration (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix qla24xx_process_bidir_cmd() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix race conditions in the code for aborting SCSI commands (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix read offset in qla24xx_load_risc_flash() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix Relogin to prevent modifying scan_state flag (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix routine qla27xx_dump_{mpi|ram}() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix session cleanup hang (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix session lookup in qlt_abort_work() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: fix spelling mistake \u0027alredy\u0027 -\u003e \u0027already\u0027 (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: fix spelling mistake \u0027initializatin\u0027 -\u003e \u0027initialization\u0027 (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix SRB allocation flag to avoid sleeping in IRQ context (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix SRB leak on switch command timeout (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: qla2xxx: Fix stale mem access on driver unload (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix stale mem access on driver unload (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Fix stale mem access on driver unload (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Fix stale session (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix stuck login session (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix unbound sleep in fcport delete path (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix unbound sleep in fcport delete path (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Fix unbound sleep in fcport delete path (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Fix unload when NVMe devices are configured (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: fixup incorrect usage of host_byte (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Fix use-after-free issues in qla2xxx_qpair_sp_free_dma() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Fix wait condition in loop (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: flush IO on chip reset or sess delete (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Further limit FLASH region write access from SysFS (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Improve Linux kernel coding style conformance (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Improve logging for scan thread (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Improve logging for scan thread (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Improve logging for scan thread (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Include the \u003casm/unaligned.h\u003e header file from qla_dsd.h (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Increase the max_sgl_segments to 1024 (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Increase the size of the mailbox arrays from 4 to 8 (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Initialized mailbox to prevent driver load failure (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: initialize fc4_type_priority (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: qla2xxx: Inline the qla2x00_fcport_event_handler() function (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Insert spaces where required (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Introduce qla2x00_els_dcmd2_free() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Introduce qla2xxx_get_next_handle() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Introduce the be_id_t and le_id_t data types for FC src/dst IDs (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Introduce the dsd32 and dsd64 data structures (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Introduce the function qla2xxx_init_sp() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Leave a blank line after declarations (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Let the compiler check the type of the SCSI command context pointer (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Log the status code if a firmware command fails (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Make it explicit that ELS pass-through IOCBs use little endian (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Make qla24xx_async_abort_cmd() static (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Make qla2x00_abort_srb() again decrease the sp reference count (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Make qla2x00_mem_free() easier to verify (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Make qla2x00_process_response_queue() easier to read (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Make qlt_handle_abts_completion() more robust (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Make sure that aborted commands are freed (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Modify NVMe include directives (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Move debug messages before sending srb preventing panic (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: move IO flush to the front of NVME rport unregistration (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Move marker request behind QPair (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Move qla2x00_clear_loop_id() from qla_inline.h into qla_init.c (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Move qla2x00_is_reserved_id() from qla_inline.h into qla_init.c (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Move qla2x00_set_fcport_state() from a .h into a .c file (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Move qla2x00_set_reserved_loop_ids() definition (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Move the \u003clinux/io-64-nonatomic-lo-hi.h\u003e include directive (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Move the port_state_str definition from a .h to a .c file (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: no need to check return value of debugfs_create functions (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: on session delete, return nvme cmd (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Optimize NPIV tear down process (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Optimize NPIV tear down process (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Optimize NPIV tear down process (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Pass little-endian values to the firmware (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Prevent memory leak for CT req/rsp allocation (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Prevent multiple ADISC commands per session (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Prevent SysFS access when chip is down (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: qla2x00_alloc_fw_dump: set ha-\u003eeft (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Really fix qla2xxx_eh_abort() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Reduce the number of casts in GID list code (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Reduce the number of forward declarations (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Reduce the scope of three local variables in qla2xxx_queuecommand() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Reject EH_{abort|device_reset|target_request} (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Remove a comment that refers to the SCSI host lock (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Remove an include directive (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: qla2xxx: Remove an include directive from qla_mr.c (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Remove a set-but-not-used variable (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Remove a superfluous forward declaration (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Remove a superfluous pointer check (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Remove dead code (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: remove double assignment in qla2x00_update_fcport (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Remove FW default template (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Remove qla_tgt_cmd.data_work and qla_tgt_cmd.data_work_free (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Remove qla_tgt_cmd.released (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: remove redundant assignment to pointer host (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: remove redundant assignment to pointer host (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: remove redundant null check on pointer sess (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Remove set but not used variable \u0027ptr_dma\u0027 (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Remove superfluous sts_entry_* casts (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Remove the fcport test from qla_nvme_abort_work() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Remove two superfluous casts (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Remove two superfluous if-tests (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Remove two superfluous tests (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Remove unnecessary locking from the target code (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Remove unnecessary null check (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Remove unreachable code from qla83xx_idc_lock() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Remove useless set memory to zero use memset() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Remove WARN_ON_ONCE in qla2x00_status_cont_entry() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Remove WARN_ON_ONCE in qla2x00_status_cont_entry() (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Replace vmalloc + memset with vzalloc (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Report invalid mailbox status codes (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Report the firmware status code if a mailbox command fails (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Reset the FCF_ASYNC_{SENT|ACTIVE} flags (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Restore FAWWPN of Physical Port only for loop down (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Retry fabric Scan on IOCB queue full (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Retry PLOGI on FC-NVMe PRLI failure (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: qla2xxx: Rework key encoding in qlt_find_host_by_d_id() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Secure flash update support for ISP28XX (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Set remote port devloss timeout to 0 (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Set remove flag for all VP (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Set remove flag for all VP (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Set remove flag for all VP (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Set the qpair in SRB to NULL when SRB is released (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Set the responder mode if appropriate for ELS pass-through IOCBs (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Set the SCSI command result before calling the command done (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Silence fwdump template message (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Silence fwdump template message (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Silence fwdump template message (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Silence Successful ELS IOCB message (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Simplification of register address used in qla_tmpl.c (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Simplify a debug statement (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Simplify conditional check again (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Simplify qla24xx_abort_sp_done() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Simplify qla24xx_async_abort_cmd() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Simplify qlt_lport_dump() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Simplify qlt_send_term_imm_notif() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Skip FW dump on LOOP initialization error (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: stop timer in shutdown path (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Suppress a Coveritiy complaint about integer overflow (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Suppress multiple Coverity complaint about out-of-bounds accesses (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: target: Fix offline port handling and host reset handling (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Uninline qla2x00_init_timer() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Unregister resources in the opposite order of the registration order (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Update driver version to 10.00.00.13-k (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Update driver version to 10.00.00.14-k (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Update driver version to 10.01.00.15-k (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Update driver version to 10.01.00.16-k (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Update driver version to 10.01.00.18-k (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Update driver version to 10.01.00.19-k (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Update driver version to 10.01.00.20-k (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Update driver version to 10.01.00.20-k (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Update driver version to 10.01.00.20-k (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Update driver version to 10.01.00.21-k (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: qla2xxx: Update flash read/write routine (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Use an on-stack completion in qla24xx_control_vp() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Use ARRAY_SIZE() in the definition of QLA_LAST_SPEED (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Use common update-firmware-options routine for ISP27xx+ (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Use complete switch scan for RSCN events (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Use Correct index for Q-Pair array (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Use dma_pool_zalloc() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Use get/put_unaligned where appropriate (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Use __le64 instead of uint32_t for sending DMA addresses to firmware (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Use memcpy() and strlcpy() instead of strcpy() and strncpy() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Use mutex protection during qla2x00_sysfs_read_fw_dump() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Use strlcpy() instead of strncpy() (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Use tabs instead of spaces for indentation (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Use tabs to indent code (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: qla2xxx: Verify locking assumptions at runtime (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: scsi_dh_rdac: zero cdb in send_mode_select() (bsc#1149313).\n- scsi: scsi_transport_fc: nvme: display FC-NVMe port roles (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi: sd: Ignore a failure to sync cache due to lack of authorization (git-fixes).\n- scsi: storvsc: Add ability to change scsi queue depth (bsc#1155021).\n- scsi: storvsc: setup 1:1 mapping between hardware queue and CPU queue (bsc#1140729).\n- scsi: tcm_qla2xxx: Minimize #include directives (bsc#1123034 bsc#1131304 bsc#1127988).\n- scsi_transport_fc: complete requests from -\u003etimeout (bsc#1142076).\n- scsi: zfcp: fix reaction on bit error threshold notification (bsc#1154956 LTC#182054).\n- sctp: Fix the link time qualifier of \u0027sctp_ctrlsock_exit()\u0027 (networking-stable-19_09_15).\n- sctp: fix the transport error_count check (networking-stable-19_08_21).\n- sctp: use transport pf_retrans in sctp_do_8_2_transport_strike (networking-stable-19_09_15).\n- serial: fix kernel-doc warning in comments (bsc#1051510).\n- serial: mctrl_gpio: Check for NULL pointer (bsc#1051510).\n- serial: uartlite: fix exit path null pointer (bsc#1051510).\n- Sign non-x86 kernels when possible (boo#1134303)\n- skge: fix checksum byte order (networking-stable-19_09_30).\n- sky2: Disable MSI on yet another ASUS boards (P6Xxxx) (bsc#1051510).\n- slip: make slhc_free() silently accept an error pointer (bsc#1051510).\n- slip: sl_alloc(): remove unused parameter \u0027dev_t line\u0027 (bsc#1051510).\n- sock_diag: fix autoloading of the raw_diag module (bsc#1152791).\n- sock_diag: request _diag module only when the family or proto has been registered (bsc#1152791).\n- spi: spi-fsl-dspi: Exit the ISR with IRQ_NONE when it\u0027s not ours (bsc#1111666).\n- staging: bcm2835-audio: Fix draining behavior regression (bsc#1111666).\n- staging: rtl8188eu: fix null dereference when kzalloc fails (bsc#1051510).\n- staging: vt6655: Fix memory leak in vt6655_probe (bsc#1051510).\n- staging: wlan-ng: fix exit return when sme-\u003ekey_idx \u003e= NUM_WEPKEYS (bsc#1051510).\n- SUNRPC fix regression in umount of a secure mount (git-fixes).\n- SUNRPC: Handle connection breakages correctly in call_status() (git-fixes).\n- SUNRPC/nfs: Fix return value for nfs4_callback_compound() (git-fixes).\n- supporte.conf: add efivarfs to kernel-default-base (bsc#1154858).\n- supported.conf: Add vfio_ccw (bsc#1151192 jsc#SLE-6138).\n- supported.conf: Mark vfio_ccw supported by SUSE, because bugs can be routed to IBM via SUSE support (jsc#SLE-6138, bsc#1151192).\n- tcp: Do not dequeue SYN/FIN-segments from write-queue (git-gixes).\n- tcp: fix tcp_ecn_withdraw_cwr() to clear TCP_ECN_QUEUE_CWR (networking-stable-19_09_15).\n- tcp: inherit timestamp on mtu probe (networking-stable-19_09_05).\n- tcp: make sure EPOLLOUT wont be missed (networking-stable-19_08_28).\n- tcp: remove empty skb from write queue in error cases (networking-stable-19_09_05).\n- team: Add vlan tx offload to hw_enc_features (bsc#1051510).\n- team: Add vlan tx offload to hw_enc_features (networking-stable-19_08_21).\n- thermal: Fix use-after-free when unregistering thermal zone device (bsc#1051510).\n- thermal_hwmon: Sanitize thermal_zone type (bsc#1051510).\n- tipc: add NULL pointer check before calling kfree_rcu (networking-stable-19_09_15).\n- tipc: fix unlimited bundling of small messages (networking-stable-19_10_05).\n- tpm_tis_core: Set TPM_CHIP_FLAG_IRQ before probing for interrupts (bsc#1082555).\n- tracing: Get trace_array reference for available_tracers files (bsc#1156429).\n- tracing: Initialize iter-\u003eseq after zeroing in tracing_read_pipe() (bsc#1151508).\n- tty: serial: fsl_lpuart: Use appropriate lpuart32_* I/O funcs (bsc#1111666).\n- tun: fix use-after-free when register netdev failed (bsc#1111666).\n- tun: fix use-after-free when register netdev failed (networking-stable-19_09_15).\n- tuntap: correctly set SOCKWQ_ASYNC_NOSPACE (bsc#1145099).\n- UAS: Revert commit 3ae62a42090f (\u0027UAS: fix alignment of scatter/gather segments\u0027).\n- USB: adutux: fix NULL-derefs on disconnect (bsc#1142635).\n- USB: adutux: fix use-after-free on disconnect (bsc#1142635).\n- USB: adutux: fix use-after-free on release (bsc#1051510).\n- USB: chaoskey: fix use-after-free on release (bsc#1051510).\n- USB: dummy-hcd: fix power budget for SuperSpeed mode (bsc#1051510).\n- USB: gadget: Reject endpoints with 0 maxpacket value (bsc#1051510).\n- USB: gadget: udc: atmel: Fix interrupt storm in FIFO mode (bsc#1051510).\n- USB: handle warm-reset port requests on hub resume (bsc#1051510).\n- USB: iowarrior: fix use-after-free after driver unbind (bsc#1051510).\n- USB: iowarrior: fix use-after-free on disconnect (bsc#1051510).\n- USB: iowarrior: fix use-after-free on release (bsc#1051510).\n- USBIP: add config dependency for SGL_ALLOC (git-fixes).\n- USBip: Fix free of unallocated memory in vhci tx (git-fixes).\n- USBip: Fix vhci_urb_enqueue() URB null transfer buffer error path (git-fixes).\n- USBip: Implement SG support to vhci-hcd and stub driver (git-fixes).\n- USB: ldusb: fix control-message timeout (bsc#1051510).\n- USB: ldusb: fix memleak on disconnect (bsc#1051510).\n- USB: ldusb: fix NULL-derefs on driver unbind (bsc#1051510).\n- USB: ldusb: fix read info leaks (bsc#1051510).\n- USB: ldusb: fix ring-buffer locking (bsc#1051510).\n- USB: legousbtower: fix a signedness bug in tower_probe() (bsc#1051510).\n- USB: legousbtower: fix deadlock on disconnect (bsc#1142635).\n- USB: legousbtower: fix memleak on disconnect (bsc#1051510).\n- USB: legousbtower: fix open after failed reset request (bsc#1142635).\n- USB: legousbtower: fix potential NULL-deref on disconnect (bsc#1142635).\n- USB: legousbtower: fix slab info leak at probe (bsc#1142635).\n- USB: legousbtower: fix use-after-free on release (bsc#1051510).\n- USB: microtek: fix info-leak at probe (bsc#1142635).\n- usbnet: ignore endpoints with invalid wMaxPacketSize (bsc#1051510).\n- usbnet: sanity checking of packet sizes and device mtu (bsc#1051510).\n- USB: serial: fix runtime PM after driver unbind (bsc#1051510).\n- USB: serial: ftdi_sio: add device IDs for Sienna and Echelon PL-20 (bsc#1051510).\n- USB: serial: keyspan: fix NULL-derefs on open() and write() (bsc#1051510).\n- USB: serial: option: add support for Cinterion CLS8 devices (bsc#1051510).\n- USB: serial: option: add Telit FN980 compositions (bsc#1051510).\n- USB: serial: ti_usb_3410_5052: fix port-close races (bsc#1051510).\n- USB: serial: whiteheat: fix line-speed endianness (bsc#1051510).\n- USB: serial: whiteheat: fix potential slab corruption (bsc#1051510).\n- usb-storage: Revert commit 747668dbc061 (\u0027usb-storage: Set virt_boundary_mask to avoid SG overflows\u0027) (bsc#1051510).\n- USB: udc: lpc32xx: fix bad bit shift operation (bsc#1051510).\n- USB: usbcore: Fix slab-out-of-bounds bug during device reset (bsc#1051510).\n- USB: usblcd: fix I/O after disconnect (bsc#1142635).\n- USB: usblp: fix runtime PM after driver unbind (bsc#1051510).\n- USB: usblp: fix use-after-free on disconnect (bsc#1051510).\n- USB: usb-skeleton: fix NULL-deref on disconnect (bsc#1051510).\n- USB: usb-skeleton: fix runtime PM after driver unbind (bsc#1051510).\n- USB: usb-skeleton: fix use-after-free after driver unbind (bsc#1051510).\n- USB: xhci: wait for CNR controller not ready bit in xhci resume (bsc#1051510).\n- USB: yurex: Do not retry on unexpected errors (bsc#1051510).\n- USB: yurex: fix NULL-derefs on disconnect (bsc#1051510).\n- vfio_pci: Restore original state on release (bsc#1051510).\n- vhost_net: conditionally enable tx polling (bsc#1145099).\n- vhost/test: fix build for vhost test (bsc#1111666).\n- video: of: display_timing: Add of_node_put() in of_get_display_timing() (bsc#1051510).\n- video: ssd1307fb: Start page range at page_offset (bsc#1113722)\n- vsock: Fix a lockdep warning in __vsock_release() (networking-stable-19_10_05).\n- watchdog: imx2_wdt: fix min() calculation in imx2_wdt_set_timeout (bsc#1051510).\n- wcn36xx: use dynamic allocation for large variables (bsc#1111666).\n- wil6210: fix freeing of rx buffers in EDMA mode (bsc#1111666).\n- x86/asm: Fix MWAITX C-state hint value (bsc#1114279).\n- x86/boot/64: Make level2_kernel_pgt pages invalid outside kernel area (bnc#1153969).\n- x86/boot/64: Round memory hole size up to next PMD page (bnc#1153969).\n- x86/CPU/AMD: Clear RDRAND CPUID bit on AMD family 15h/16h (bsc#1114279).\n- x86/fpu: Add FPU state copying quirk to handle XRSTOR failure on Intel Skylake CPUs (bsc#1151955).\n- x86/mm: Use WRITE_ONCE() when setting PTEs (bsc#1114279).\n- x86/tls: Fix possible spectre-v1 in do_get_thread_area() (bsc#1114279).\n- xen/netback: fix error path of xenvif_connect_data() (bsc#1065600).\n- xen/netback: Reset nr_frags before freeing skb (networking-stable-19_08_21).\n- xen-netfront: do not assume sk_buff_head list is empty in error handling (bsc#1065600).\n- xen-netfront: do not use ~0U as error return value for xennet_fill_frags() (bsc#1065600).\n- xen/pv: Fix Xen PV guest int3 handling (bsc#1153811).\n- xen/xenbus: fix self-deadlock after killing user process (bsc#1065600).\n- xfrm: fix sa selector validation (bsc#1156609).\n- xfrm: Fix xfrm sel prefix length validation (git-fixes).\n- xhci: Check all endpoints for LPM timeout (bsc#1051510).\n- xhci: Fix false warning message about wrong bounce buffer write length (bsc#1051510).\n- xhci: Increase STS_SAVE timeout in xhci_suspend() (bsc#1051510).\n- xhci: Prevent device initiated U1/U2 link pm if exit latency is too long (bsc#1051510).\n- xsk: avoid store-tearing when assigning queues (bsc#1111666).\n- xsk: avoid store-tearing when assigning umem (bsc#1111666).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2019-3295,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-3295,SUSE-SLE-Module-RT-15-SP1-2019-3295",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_3295-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2019:3295-1",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20193295-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2019:3295-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2019-December/006257.html"
},
{
"category": "self",
"summary": "SUSE Bug 1046299",
"url": "https://bugzilla.suse.com/1046299"
},
{
"category": "self",
"summary": "SUSE Bug 1046303",
"url": "https://bugzilla.suse.com/1046303"
},
{
"category": "self",
"summary": "SUSE Bug 1046305",
"url": "https://bugzilla.suse.com/1046305"
},
{
"category": "self",
"summary": "SUSE Bug 1048942",
"url": "https://bugzilla.suse.com/1048942"
},
{
"category": "self",
"summary": "SUSE Bug 1050244",
"url": "https://bugzilla.suse.com/1050244"
},
{
"category": "self",
"summary": "SUSE Bug 1050536",
"url": "https://bugzilla.suse.com/1050536"
},
{
"category": "self",
"summary": "SUSE Bug 1050545",
"url": "https://bugzilla.suse.com/1050545"
},
{
"category": "self",
"summary": "SUSE Bug 1051510",
"url": "https://bugzilla.suse.com/1051510"
},
{
"category": "self",
"summary": "SUSE Bug 1054914",
"url": "https://bugzilla.suse.com/1054914"
},
{
"category": "self",
"summary": "SUSE Bug 1055117",
"url": "https://bugzilla.suse.com/1055117"
},
{
"category": "self",
"summary": "SUSE Bug 1055186",
"url": "https://bugzilla.suse.com/1055186"
},
{
"category": "self",
"summary": "SUSE Bug 1061840",
"url": "https://bugzilla.suse.com/1061840"
},
{
"category": "self",
"summary": "SUSE Bug 1064802",
"url": "https://bugzilla.suse.com/1064802"
},
{
"category": "self",
"summary": "SUSE Bug 1065600",
"url": "https://bugzilla.suse.com/1065600"
},
{
"category": "self",
"summary": "SUSE Bug 1065729",
"url": "https://bugzilla.suse.com/1065729"
},
{
"category": "self",
"summary": "SUSE Bug 1066129",
"url": "https://bugzilla.suse.com/1066129"
},
{
"category": "self",
"summary": "SUSE Bug 1071995",
"url": "https://bugzilla.suse.com/1071995"
},
{
"category": "self",
"summary": "SUSE Bug 1073513",
"url": "https://bugzilla.suse.com/1073513"
},
{
"category": "self",
"summary": "SUSE Bug 1082555",
"url": "https://bugzilla.suse.com/1082555"
},
{
"category": "self",
"summary": "SUSE Bug 1082635",
"url": "https://bugzilla.suse.com/1082635"
},
{
"category": "self",
"summary": "SUSE Bug 1083647",
"url": "https://bugzilla.suse.com/1083647"
},
{
"category": "self",
"summary": "SUSE Bug 1086323",
"url": "https://bugzilla.suse.com/1086323"
},
{
"category": "self",
"summary": "SUSE Bug 1087092",
"url": "https://bugzilla.suse.com/1087092"
},
{
"category": "self",
"summary": "SUSE Bug 1089644",
"url": "https://bugzilla.suse.com/1089644"
},
{
"category": "self",
"summary": "SUSE Bug 1090631",
"url": "https://bugzilla.suse.com/1090631"
},
{
"category": "self",
"summary": "SUSE Bug 1091041",
"url": "https://bugzilla.suse.com/1091041"
},
{
"category": "self",
"summary": "SUSE Bug 1093205",
"url": "https://bugzilla.suse.com/1093205"
},
{
"category": "self",
"summary": "SUSE Bug 1096254",
"url": "https://bugzilla.suse.com/1096254"
},
{
"category": "self",
"summary": "SUSE Bug 1097583",
"url": "https://bugzilla.suse.com/1097583"
},
{
"category": "self",
"summary": "SUSE Bug 1097584",
"url": "https://bugzilla.suse.com/1097584"
},
{
"category": "self",
"summary": "SUSE Bug 1097585",
"url": "https://bugzilla.suse.com/1097585"
},
{
"category": "self",
"summary": "SUSE Bug 1097586",
"url": "https://bugzilla.suse.com/1097586"
},
{
"category": "self",
"summary": "SUSE Bug 1097587",
"url": "https://bugzilla.suse.com/1097587"
},
{
"category": "self",
"summary": "SUSE Bug 1097588",
"url": "https://bugzilla.suse.com/1097588"
},
{
"category": "self",
"summary": "SUSE Bug 1098291",
"url": "https://bugzilla.suse.com/1098291"
},
{
"category": "self",
"summary": "SUSE Bug 1101674",
"url": "https://bugzilla.suse.com/1101674"
},
{
"category": "self",
"summary": "SUSE Bug 1104967",
"url": "https://bugzilla.suse.com/1104967"
},
{
"category": "self",
"summary": "SUSE Bug 1109158",
"url": "https://bugzilla.suse.com/1109158"
},
{
"category": "self",
"summary": "SUSE Bug 1111666",
"url": "https://bugzilla.suse.com/1111666"
},
{
"category": "self",
"summary": "SUSE Bug 1112178",
"url": "https://bugzilla.suse.com/1112178"
},
{
"category": "self",
"summary": "SUSE Bug 1113722",
"url": "https://bugzilla.suse.com/1113722"
},
{
"category": "self",
"summary": "SUSE Bug 1113994",
"url": "https://bugzilla.suse.com/1113994"
},
{
"category": "self",
"summary": "SUSE Bug 1114279",
"url": "https://bugzilla.suse.com/1114279"
},
{
"category": "self",
"summary": "SUSE Bug 1117665",
"url": "https://bugzilla.suse.com/1117665"
},
{
"category": "self",
"summary": "SUSE Bug 1119086",
"url": "https://bugzilla.suse.com/1119086"
},
{
"category": "self",
"summary": "SUSE Bug 1119461",
"url": "https://bugzilla.suse.com/1119461"
},
{
"category": "self",
"summary": "SUSE Bug 1119465",
"url": "https://bugzilla.suse.com/1119465"
},
{
"category": "self",
"summary": "SUSE Bug 1123034",
"url": "https://bugzilla.suse.com/1123034"
},
{
"category": "self",
"summary": "SUSE Bug 1123080",
"url": "https://bugzilla.suse.com/1123080"
},
{
"category": "self",
"summary": "SUSE Bug 1127988",
"url": "https://bugzilla.suse.com/1127988"
},
{
"category": "self",
"summary": "SUSE Bug 1131107",
"url": "https://bugzilla.suse.com/1131107"
},
{
"category": "self",
"summary": "SUSE Bug 1131304",
"url": "https://bugzilla.suse.com/1131304"
},
{
"category": "self",
"summary": "SUSE Bug 1133140",
"url": "https://bugzilla.suse.com/1133140"
},
{
"category": "self",
"summary": "SUSE Bug 1134303",
"url": "https://bugzilla.suse.com/1134303"
},
{
"category": "self",
"summary": "SUSE Bug 1135642",
"url": "https://bugzilla.suse.com/1135642"
},
{
"category": "self",
"summary": "SUSE Bug 1135854",
"url": "https://bugzilla.suse.com/1135854"
},
{
"category": "self",
"summary": "SUSE Bug 1135873",
"url": "https://bugzilla.suse.com/1135873"
},
{
"category": "self",
"summary": "SUSE Bug 1135966",
"url": "https://bugzilla.suse.com/1135966"
},
{
"category": "self",
"summary": "SUSE Bug 1135967",
"url": "https://bugzilla.suse.com/1135967"
},
{
"category": "self",
"summary": "SUSE Bug 1137040",
"url": "https://bugzilla.suse.com/1137040"
},
{
"category": "self",
"summary": "SUSE Bug 1137069",
"url": "https://bugzilla.suse.com/1137069"
},
{
"category": "self",
"summary": "SUSE Bug 1137799",
"url": "https://bugzilla.suse.com/1137799"
},
{
"category": "self",
"summary": "SUSE Bug 1137861",
"url": "https://bugzilla.suse.com/1137861"
},
{
"category": "self",
"summary": "SUSE Bug 1137865",
"url": "https://bugzilla.suse.com/1137865"
},
{
"category": "self",
"summary": "SUSE Bug 1137959",
"url": "https://bugzilla.suse.com/1137959"
},
{
"category": "self",
"summary": "SUSE Bug 1137982",
"url": "https://bugzilla.suse.com/1137982"
},
{
"category": "self",
"summary": "SUSE Bug 1138190",
"url": "https://bugzilla.suse.com/1138190"
},
{
"category": "self",
"summary": "SUSE Bug 1139073",
"url": "https://bugzilla.suse.com/1139073"
},
{
"category": "self",
"summary": "SUSE Bug 1140090",
"url": "https://bugzilla.suse.com/1140090"
},
{
"category": "self",
"summary": "SUSE Bug 1140155",
"url": "https://bugzilla.suse.com/1140155"
},
{
"category": "self",
"summary": "SUSE Bug 1140729",
"url": "https://bugzilla.suse.com/1140729"
},
{
"category": "self",
"summary": "SUSE Bug 1140845",
"url": "https://bugzilla.suse.com/1140845"
},
{
"category": "self",
"summary": "SUSE Bug 1140883",
"url": "https://bugzilla.suse.com/1140883"
},
{
"category": "self",
"summary": "SUSE Bug 1141013",
"url": "https://bugzilla.suse.com/1141013"
},
{
"category": "self",
"summary": "SUSE Bug 1141600",
"url": "https://bugzilla.suse.com/1141600"
},
{
"category": "self",
"summary": "SUSE Bug 1142076",
"url": "https://bugzilla.suse.com/1142076"
},
{
"category": "self",
"summary": "SUSE Bug 1142635",
"url": "https://bugzilla.suse.com/1142635"
},
{
"category": "self",
"summary": "SUSE Bug 1142667",
"url": "https://bugzilla.suse.com/1142667"
},
{
"category": "self",
"summary": "SUSE Bug 1143706",
"url": "https://bugzilla.suse.com/1143706"
},
{
"category": "self",
"summary": "SUSE Bug 1144338",
"url": "https://bugzilla.suse.com/1144338"
},
{
"category": "self",
"summary": "SUSE Bug 1144375",
"url": "https://bugzilla.suse.com/1144375"
},
{
"category": "self",
"summary": "SUSE Bug 1144449",
"url": "https://bugzilla.suse.com/1144449"
},
{
"category": "self",
"summary": "SUSE Bug 1144903",
"url": "https://bugzilla.suse.com/1144903"
},
{
"category": "self",
"summary": "SUSE Bug 1145099",
"url": "https://bugzilla.suse.com/1145099"
},
{
"category": "self",
"summary": "SUSE Bug 1146042",
"url": "https://bugzilla.suse.com/1146042"
},
{
"category": "self",
"summary": "SUSE Bug 1146519",
"url": "https://bugzilla.suse.com/1146519"
},
{
"category": "self",
"summary": "SUSE Bug 1146540",
"url": "https://bugzilla.suse.com/1146540"
},
{
"category": "self",
"summary": "SUSE Bug 1146612",
"url": "https://bugzilla.suse.com/1146612"
},
{
"category": "self",
"summary": "SUSE Bug 1146664",
"url": "https://bugzilla.suse.com/1146664"
},
{
"category": "self",
"summary": "SUSE Bug 1148133",
"url": "https://bugzilla.suse.com/1148133"
},
{
"category": "self",
"summary": "SUSE Bug 1148410",
"url": "https://bugzilla.suse.com/1148410"
},
{
"category": "self",
"summary": "SUSE Bug 1148712",
"url": "https://bugzilla.suse.com/1148712"
},
{
"category": "self",
"summary": "SUSE Bug 1148868",
"url": "https://bugzilla.suse.com/1148868"
},
{
"category": "self",
"summary": "SUSE Bug 1149119",
"url": "https://bugzilla.suse.com/1149119"
},
{
"category": "self",
"summary": "SUSE Bug 1149313",
"url": "https://bugzilla.suse.com/1149313"
},
{
"category": "self",
"summary": "SUSE Bug 1149446",
"url": "https://bugzilla.suse.com/1149446"
},
{
"category": "self",
"summary": "SUSE Bug 1149448",
"url": "https://bugzilla.suse.com/1149448"
},
{
"category": "self",
"summary": "SUSE Bug 1149555",
"url": "https://bugzilla.suse.com/1149555"
},
{
"category": "self",
"summary": "SUSE Bug 1149651",
"url": "https://bugzilla.suse.com/1149651"
},
{
"category": "self",
"summary": "SUSE Bug 1149853",
"url": "https://bugzilla.suse.com/1149853"
},
{
"category": "self",
"summary": "SUSE Bug 1150305",
"url": "https://bugzilla.suse.com/1150305"
},
{
"category": "self",
"summary": "SUSE Bug 1150381",
"url": "https://bugzilla.suse.com/1150381"
},
{
"category": "self",
"summary": "SUSE Bug 1150423",
"url": "https://bugzilla.suse.com/1150423"
},
{
"category": "self",
"summary": "SUSE Bug 1150452",
"url": "https://bugzilla.suse.com/1150452"
},
{
"category": "self",
"summary": "SUSE Bug 1150457",
"url": "https://bugzilla.suse.com/1150457"
},
{
"category": "self",
"summary": "SUSE Bug 1150465",
"url": "https://bugzilla.suse.com/1150465"
},
{
"category": "self",
"summary": "SUSE Bug 1150466",
"url": "https://bugzilla.suse.com/1150466"
},
{
"category": "self",
"summary": "SUSE Bug 1150846",
"url": "https://bugzilla.suse.com/1150846"
},
{
"category": "self",
"summary": "SUSE Bug 1150875",
"url": "https://bugzilla.suse.com/1150875"
},
{
"category": "self",
"summary": "SUSE Bug 1151067",
"url": "https://bugzilla.suse.com/1151067"
},
{
"category": "self",
"summary": "SUSE Bug 1151192",
"url": "https://bugzilla.suse.com/1151192"
},
{
"category": "self",
"summary": "SUSE Bug 1151350",
"url": "https://bugzilla.suse.com/1151350"
},
{
"category": "self",
"summary": "SUSE Bug 1151508",
"url": "https://bugzilla.suse.com/1151508"
},
{
"category": "self",
"summary": "SUSE Bug 1151610",
"url": "https://bugzilla.suse.com/1151610"
},
{
"category": "self",
"summary": "SUSE Bug 1151661",
"url": "https://bugzilla.suse.com/1151661"
},
{
"category": "self",
"summary": "SUSE Bug 1151662",
"url": "https://bugzilla.suse.com/1151662"
},
{
"category": "self",
"summary": "SUSE Bug 1151667",
"url": "https://bugzilla.suse.com/1151667"
},
{
"category": "self",
"summary": "SUSE Bug 1151680",
"url": "https://bugzilla.suse.com/1151680"
},
{
"category": "self",
"summary": "SUSE Bug 1151807",
"url": "https://bugzilla.suse.com/1151807"
},
{
"category": "self",
"summary": "SUSE Bug 1151891",
"url": "https://bugzilla.suse.com/1151891"
},
{
"category": "self",
"summary": "SUSE Bug 1151955",
"url": "https://bugzilla.suse.com/1151955"
},
{
"category": "self",
"summary": "SUSE Bug 1152024",
"url": "https://bugzilla.suse.com/1152024"
},
{
"category": "self",
"summary": "SUSE Bug 1152025",
"url": "https://bugzilla.suse.com/1152025"
},
{
"category": "self",
"summary": "SUSE Bug 1152026",
"url": "https://bugzilla.suse.com/1152026"
},
{
"category": "self",
"summary": "SUSE Bug 1152033",
"url": "https://bugzilla.suse.com/1152033"
},
{
"category": "self",
"summary": "SUSE Bug 1152161",
"url": "https://bugzilla.suse.com/1152161"
},
{
"category": "self",
"summary": "SUSE Bug 1152187",
"url": "https://bugzilla.suse.com/1152187"
},
{
"category": "self",
"summary": "SUSE Bug 1152243",
"url": "https://bugzilla.suse.com/1152243"
},
{
"category": "self",
"summary": "SUSE Bug 1152325",
"url": "https://bugzilla.suse.com/1152325"
},
{
"category": "self",
"summary": "SUSE Bug 1152457",
"url": "https://bugzilla.suse.com/1152457"
},
{
"category": "self",
"summary": "SUSE Bug 1152460",
"url": "https://bugzilla.suse.com/1152460"
},
{
"category": "self",
"summary": "SUSE Bug 1152466",
"url": "https://bugzilla.suse.com/1152466"
},
{
"category": "self",
"summary": "SUSE Bug 1152497",
"url": "https://bugzilla.suse.com/1152497"
},
{
"category": "self",
"summary": "SUSE Bug 1152505",
"url": "https://bugzilla.suse.com/1152505"
},
{
"category": "self",
"summary": "SUSE Bug 1152506",
"url": "https://bugzilla.suse.com/1152506"
},
{
"category": "self",
"summary": "SUSE Bug 1152525",
"url": "https://bugzilla.suse.com/1152525"
},
{
"category": "self",
"summary": "SUSE Bug 1152624",
"url": "https://bugzilla.suse.com/1152624"
},
{
"category": "self",
"summary": "SUSE Bug 1152665",
"url": "https://bugzilla.suse.com/1152665"
},
{
"category": "self",
"summary": "SUSE Bug 1152685",
"url": "https://bugzilla.suse.com/1152685"
},
{
"category": "self",
"summary": "SUSE Bug 1152696",
"url": "https://bugzilla.suse.com/1152696"
},
{
"category": "self",
"summary": "SUSE Bug 1152697",
"url": "https://bugzilla.suse.com/1152697"
},
{
"category": "self",
"summary": "SUSE Bug 1152782",
"url": "https://bugzilla.suse.com/1152782"
},
{
"category": "self",
"summary": "SUSE Bug 1152788",
"url": "https://bugzilla.suse.com/1152788"
},
{
"category": "self",
"summary": "SUSE Bug 1152790",
"url": "https://bugzilla.suse.com/1152790"
},
{
"category": "self",
"summary": "SUSE Bug 1152791",
"url": "https://bugzilla.suse.com/1152791"
},
{
"category": "self",
"summary": "SUSE Bug 1152972",
"url": "https://bugzilla.suse.com/1152972"
},
{
"category": "self",
"summary": "SUSE Bug 1152974",
"url": "https://bugzilla.suse.com/1152974"
},
{
"category": "self",
"summary": "SUSE Bug 1152975",
"url": "https://bugzilla.suse.com/1152975"
},
{
"category": "self",
"summary": "SUSE Bug 1153112",
"url": "https://bugzilla.suse.com/1153112"
},
{
"category": "self",
"summary": "SUSE Bug 1153158",
"url": "https://bugzilla.suse.com/1153158"
},
{
"category": "self",
"summary": "SUSE Bug 1153236",
"url": "https://bugzilla.suse.com/1153236"
},
{
"category": "self",
"summary": "SUSE Bug 1153263",
"url": "https://bugzilla.suse.com/1153263"
},
{
"category": "self",
"summary": "SUSE Bug 1153476",
"url": "https://bugzilla.suse.com/1153476"
},
{
"category": "self",
"summary": "SUSE Bug 1153509",
"url": "https://bugzilla.suse.com/1153509"
},
{
"category": "self",
"summary": "SUSE Bug 1153607",
"url": "https://bugzilla.suse.com/1153607"
},
{
"category": "self",
"summary": "SUSE Bug 1153646",
"url": "https://bugzilla.suse.com/1153646"
},
{
"category": "self",
"summary": "SUSE Bug 1153681",
"url": "https://bugzilla.suse.com/1153681"
},
{
"category": "self",
"summary": "SUSE Bug 1153713",
"url": "https://bugzilla.suse.com/1153713"
},
{
"category": "self",
"summary": "SUSE Bug 1153717",
"url": "https://bugzilla.suse.com/1153717"
},
{
"category": "self",
"summary": "SUSE Bug 1153718",
"url": "https://bugzilla.suse.com/1153718"
},
{
"category": "self",
"summary": "SUSE Bug 1153719",
"url": "https://bugzilla.suse.com/1153719"
},
{
"category": "self",
"summary": "SUSE Bug 1153811",
"url": "https://bugzilla.suse.com/1153811"
},
{
"category": "self",
"summary": "SUSE Bug 1153969",
"url": "https://bugzilla.suse.com/1153969"
},
{
"category": "self",
"summary": "SUSE Bug 1154108",
"url": "https://bugzilla.suse.com/1154108"
},
{
"category": "self",
"summary": "SUSE Bug 1154124",
"url": "https://bugzilla.suse.com/1154124"
},
{
"category": "self",
"summary": "SUSE Bug 1154189",
"url": "https://bugzilla.suse.com/1154189"
},
{
"category": "self",
"summary": "SUSE Bug 1154242",
"url": "https://bugzilla.suse.com/1154242"
},
{
"category": "self",
"summary": "SUSE Bug 1154268",
"url": "https://bugzilla.suse.com/1154268"
},
{
"category": "self",
"summary": "SUSE Bug 1154354",
"url": "https://bugzilla.suse.com/1154354"
},
{
"category": "self",
"summary": "SUSE Bug 1154372",
"url": "https://bugzilla.suse.com/1154372"
},
{
"category": "self",
"summary": "SUSE Bug 1154521",
"url": "https://bugzilla.suse.com/1154521"
},
{
"category": "self",
"summary": "SUSE Bug 1154526",
"url": "https://bugzilla.suse.com/1154526"
},
{
"category": "self",
"summary": "SUSE Bug 1154578",
"url": "https://bugzilla.suse.com/1154578"
},
{
"category": "self",
"summary": "SUSE Bug 1154601",
"url": "https://bugzilla.suse.com/1154601"
},
{
"category": "self",
"summary": "SUSE Bug 1154607",
"url": "https://bugzilla.suse.com/1154607"
},
{
"category": "self",
"summary": "SUSE Bug 1154608",
"url": "https://bugzilla.suse.com/1154608"
},
{
"category": "self",
"summary": "SUSE Bug 1154610",
"url": "https://bugzilla.suse.com/1154610"
},
{
"category": "self",
"summary": "SUSE Bug 1154611",
"url": "https://bugzilla.suse.com/1154611"
},
{
"category": "self",
"summary": "SUSE Bug 1154651",
"url": "https://bugzilla.suse.com/1154651"
},
{
"category": "self",
"summary": "SUSE Bug 1154737",
"url": "https://bugzilla.suse.com/1154737"
},
{
"category": "self",
"summary": "SUSE Bug 1154747",
"url": "https://bugzilla.suse.com/1154747"
},
{
"category": "self",
"summary": "SUSE Bug 1154848",
"url": "https://bugzilla.suse.com/1154848"
},
{
"category": "self",
"summary": "SUSE Bug 1154858",
"url": "https://bugzilla.suse.com/1154858"
},
{
"category": "self",
"summary": "SUSE Bug 1154905",
"url": "https://bugzilla.suse.com/1154905"
},
{
"category": "self",
"summary": "SUSE Bug 1154956",
"url": "https://bugzilla.suse.com/1154956"
},
{
"category": "self",
"summary": "SUSE Bug 1155021",
"url": "https://bugzilla.suse.com/1155021"
},
{
"category": "self",
"summary": "SUSE Bug 1155061",
"url": "https://bugzilla.suse.com/1155061"
},
{
"category": "self",
"summary": "SUSE Bug 1155178",
"url": "https://bugzilla.suse.com/1155178"
},
{
"category": "self",
"summary": "SUSE Bug 1155179",
"url": "https://bugzilla.suse.com/1155179"
},
{
"category": "self",
"summary": "SUSE Bug 1155184",
"url": "https://bugzilla.suse.com/1155184"
},
{
"category": "self",
"summary": "SUSE Bug 1155186",
"url": "https://bugzilla.suse.com/1155186"
},
{
"category": "self",
"summary": "SUSE Bug 1155671",
"url": "https://bugzilla.suse.com/1155671"
},
{
"category": "self",
"summary": "SUSE Bug 1155692",
"url": "https://bugzilla.suse.com/1155692"
},
{
"category": "self",
"summary": "SUSE Bug 1155812",
"url": "https://bugzilla.suse.com/1155812"
},
{
"category": "self",
"summary": "SUSE Bug 1155817",
"url": "https://bugzilla.suse.com/1155817"
},
{
"category": "self",
"summary": "SUSE Bug 1155836",
"url": "https://bugzilla.suse.com/1155836"
},
{
"category": "self",
"summary": "SUSE Bug 1155945",
"url": "https://bugzilla.suse.com/1155945"
},
{
"category": "self",
"summary": "SUSE Bug 1155982",
"url": "https://bugzilla.suse.com/1155982"
},
{
"category": "self",
"summary": "SUSE Bug 1156187",
"url": "https://bugzilla.suse.com/1156187"
},
{
"category": "self",
"summary": "SUSE Bug 1156429",
"url": "https://bugzilla.suse.com/1156429"
},
{
"category": "self",
"summary": "SUSE Bug 1156466",
"url": "https://bugzilla.suse.com/1156466"
},
{
"category": "self",
"summary": "SUSE Bug 1156494",
"url": "https://bugzilla.suse.com/1156494"
},
{
"category": "self",
"summary": "SUSE Bug 1156609",
"url": "https://bugzilla.suse.com/1156609"
},
{
"category": "self",
"summary": "SUSE Bug 1156700",
"url": "https://bugzilla.suse.com/1156700"
},
{
"category": "self",
"summary": "SUSE Bug 1156729",
"url": "https://bugzilla.suse.com/1156729"
},
{
"category": "self",
"summary": "SUSE Bug 1156882",
"url": "https://bugzilla.suse.com/1156882"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-18595 page",
"url": "https://www.suse.com/security/cve/CVE-2017-18595/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-12207 page",
"url": "https://www.suse.com/security/cve/CVE-2018-12207/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-0154 page",
"url": "https://www.suse.com/security/cve/CVE-2019-0154/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-0155 page",
"url": "https://www.suse.com/security/cve/CVE-2019-0155/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-10220 page",
"url": "https://www.suse.com/security/cve/CVE-2019-10220/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11135 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11135/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-14821 page",
"url": "https://www.suse.com/security/cve/CVE-2019-14821/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15291 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15291/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15916 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15916/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-16231 page",
"url": "https://www.suse.com/security/cve/CVE-2019-16231/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-16232 page",
"url": "https://www.suse.com/security/cve/CVE-2019-16232/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-16233 page",
"url": "https://www.suse.com/security/cve/CVE-2019-16233/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-16234 page",
"url": "https://www.suse.com/security/cve/CVE-2019-16234/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-16995 page",
"url": "https://www.suse.com/security/cve/CVE-2019-16995/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-17055 page",
"url": "https://www.suse.com/security/cve/CVE-2019-17055/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-17056 page",
"url": "https://www.suse.com/security/cve/CVE-2019-17056/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-17133 page",
"url": "https://www.suse.com/security/cve/CVE-2019-17133/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-17666 page",
"url": "https://www.suse.com/security/cve/CVE-2019-17666/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-18805 page",
"url": "https://www.suse.com/security/cve/CVE-2019-18805/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-9506 page",
"url": "https://www.suse.com/security/cve/CVE-2019-9506/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2019-12-13T17:30:04Z",
"generator": {
"date": "2019-12-13T17:30:04Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2019:3295-1",
"initial_release_date": "2019-12-13T17:30:04Z",
"revision_history": [
{
"date": "2019-12-13T17:30:04Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-rt-4.12.14-14.14.2.noarch",
"product": {
"name": "kernel-devel-rt-4.12.14-14.14.2.noarch",
"product_id": "kernel-devel-rt-4.12.14-14.14.2.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-rt-4.12.14-14.14.2.noarch",
"product": {
"name": "kernel-source-rt-4.12.14-14.14.2.noarch",
"product_id": "kernel-source-rt-4.12.14-14.14.2.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-rt-4.12.14-14.14.3.x86_64",
"product": {
"name": "cluster-md-kmp-rt-4.12.14-14.14.3.x86_64",
"product_id": "cluster-md-kmp-rt-4.12.14-14.14.3.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-rt_debug-4.12.14-14.14.3.x86_64",
"product": {
"name": "cluster-md-kmp-rt_debug-4.12.14-14.14.3.x86_64",
"product_id": "cluster-md-kmp-rt_debug-4.12.14-14.14.3.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-rt-4.12.14-14.14.3.x86_64",
"product": {
"name": "dlm-kmp-rt-4.12.14-14.14.3.x86_64",
"product_id": "dlm-kmp-rt-4.12.14-14.14.3.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-rt_debug-4.12.14-14.14.3.x86_64",
"product": {
"name": "dlm-kmp-rt_debug-4.12.14-14.14.3.x86_64",
"product_id": "dlm-kmp-rt_debug-4.12.14-14.14.3.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-rt-4.12.14-14.14.3.x86_64",
"product": {
"name": "gfs2-kmp-rt-4.12.14-14.14.3.x86_64",
"product_id": "gfs2-kmp-rt-4.12.14-14.14.3.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-rt_debug-4.12.14-14.14.3.x86_64",
"product": {
"name": "gfs2-kmp-rt_debug-4.12.14-14.14.3.x86_64",
"product_id": "gfs2-kmp-rt_debug-4.12.14-14.14.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-4.12.14-14.14.3.x86_64",
"product": {
"name": "kernel-rt-4.12.14-14.14.3.x86_64",
"product_id": "kernel-rt-4.12.14-14.14.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-base-4.12.14-14.14.3.x86_64",
"product": {
"name": "kernel-rt-base-4.12.14-14.14.3.x86_64",
"product_id": "kernel-rt-base-4.12.14-14.14.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-4.12.14-14.14.3.x86_64",
"product": {
"name": "kernel-rt-devel-4.12.14-14.14.3.x86_64",
"product_id": "kernel-rt-devel-4.12.14-14.14.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-extra-4.12.14-14.14.3.x86_64",
"product": {
"name": "kernel-rt-extra-4.12.14-14.14.3.x86_64",
"product_id": "kernel-rt-extra-4.12.14-14.14.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-livepatch-devel-4.12.14-14.14.3.x86_64",
"product": {
"name": "kernel-rt-livepatch-devel-4.12.14-14.14.3.x86_64",
"product_id": "kernel-rt-livepatch-devel-4.12.14-14.14.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-4.12.14-14.14.3.x86_64",
"product": {
"name": "kernel-rt_debug-4.12.14-14.14.3.x86_64",
"product_id": "kernel-rt_debug-4.12.14-14.14.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-base-4.12.14-14.14.3.x86_64",
"product": {
"name": "kernel-rt_debug-base-4.12.14-14.14.3.x86_64",
"product_id": "kernel-rt_debug-base-4.12.14-14.14.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-devel-4.12.14-14.14.3.x86_64",
"product": {
"name": "kernel-rt_debug-devel-4.12.14-14.14.3.x86_64",
"product_id": "kernel-rt_debug-devel-4.12.14-14.14.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-extra-4.12.14-14.14.3.x86_64",
"product": {
"name": "kernel-rt_debug-extra-4.12.14-14.14.3.x86_64",
"product_id": "kernel-rt_debug-extra-4.12.14-14.14.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-livepatch-devel-4.12.14-14.14.3.x86_64",
"product": {
"name": "kernel-rt_debug-livepatch-devel-4.12.14-14.14.3.x86_64",
"product_id": "kernel-rt_debug-livepatch-devel-4.12.14-14.14.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-rt-4.12.14-14.14.2.x86_64",
"product": {
"name": "kernel-syms-rt-4.12.14-14.14.2.x86_64",
"product_id": "kernel-syms-rt-4.12.14-14.14.2.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-rt-4.12.14-14.14.3.x86_64",
"product": {
"name": "kselftests-kmp-rt-4.12.14-14.14.3.x86_64",
"product_id": "kselftests-kmp-rt-4.12.14-14.14.3.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-rt_debug-4.12.14-14.14.3.x86_64",
"product": {
"name": "kselftests-kmp-rt_debug-4.12.14-14.14.3.x86_64",
"product_id": "kselftests-kmp-rt_debug-4.12.14-14.14.3.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-rt-4.12.14-14.14.3.x86_64",
"product": {
"name": "ocfs2-kmp-rt-4.12.14-14.14.3.x86_64",
"product_id": "ocfs2-kmp-rt-4.12.14-14.14.3.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-rt_debug-4.12.14-14.14.3.x86_64",
"product": {
"name": "ocfs2-kmp-rt_debug-4.12.14-14.14.3.x86_64",
"product_id": "ocfs2-kmp-rt_debug-4.12.14-14.14.3.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-rt-4.12.14-14.14.3.x86_64",
"product": {
"name": "reiserfs-kmp-rt-4.12.14-14.14.3.x86_64",
"product_id": "reiserfs-kmp-rt-4.12.14-14.14.3.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-rt_debug-4.12.14-14.14.3.x86_64",
"product": {
"name": "reiserfs-kmp-rt_debug-4.12.14-14.14.3.x86_64",
"product_id": "reiserfs-kmp-rt_debug-4.12.14-14.14.3.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Real Time Module 15 SP1",
"product": {
"name": "SUSE Real Time Module 15 SP1",
"product_id": "SUSE Real Time Module 15 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-rt:15:sp1"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-rt-4.12.14-14.14.3.x86_64 as component of SUSE Real Time Module 15 SP1",
"product_id": "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.14.3.x86_64"
},
"product_reference": "cluster-md-kmp-rt-4.12.14-14.14.3.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-rt-4.12.14-14.14.3.x86_64 as component of SUSE Real Time Module 15 SP1",
"product_id": "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.14.3.x86_64"
},
"product_reference": "dlm-kmp-rt-4.12.14-14.14.3.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-rt-4.12.14-14.14.3.x86_64 as component of SUSE Real Time Module 15 SP1",
"product_id": "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.14.3.x86_64"
},
"product_reference": "gfs2-kmp-rt-4.12.14-14.14.3.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-rt-4.12.14-14.14.2.noarch as component of SUSE Real Time Module 15 SP1",
"product_id": "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.14.2.noarch"
},
"product_reference": "kernel-devel-rt-4.12.14-14.14.2.noarch",
"relates_to_product_reference": "SUSE Real Time Module 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-4.12.14-14.14.3.x86_64 as component of SUSE Real Time Module 15 SP1",
"product_id": "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.14.3.x86_64"
},
"product_reference": "kernel-rt-4.12.14-14.14.3.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-base-4.12.14-14.14.3.x86_64 as component of SUSE Real Time Module 15 SP1",
"product_id": "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.14.3.x86_64"
},
"product_reference": "kernel-rt-base-4.12.14-14.14.3.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-4.12.14-14.14.3.x86_64 as component of SUSE Real Time Module 15 SP1",
"product_id": "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.14.3.x86_64"
},
"product_reference": "kernel-rt-devel-4.12.14-14.14.3.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt_debug-devel-4.12.14-14.14.3.x86_64 as component of SUSE Real Time Module 15 SP1",
"product_id": "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.14.3.x86_64"
},
"product_reference": "kernel-rt_debug-devel-4.12.14-14.14.3.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-rt-4.12.14-14.14.2.noarch as component of SUSE Real Time Module 15 SP1",
"product_id": "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.14.2.noarch"
},
"product_reference": "kernel-source-rt-4.12.14-14.14.2.noarch",
"relates_to_product_reference": "SUSE Real Time Module 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-rt-4.12.14-14.14.2.x86_64 as component of SUSE Real Time Module 15 SP1",
"product_id": "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.14.2.x86_64"
},
"product_reference": "kernel-syms-rt-4.12.14-14.14.2.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-rt-4.12.14-14.14.3.x86_64 as component of SUSE Real Time Module 15 SP1",
"product_id": "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.14.3.x86_64"
},
"product_reference": "ocfs2-kmp-rt-4.12.14-14.14.3.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-18595",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-18595"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 4.14.11. A double free may be caused by the function allocate_trace_buffer in the file kernel/trace/trace.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.14.2.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.14.2.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.14.2.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.14.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-18595",
"url": "https://www.suse.com/security/cve/CVE-2017-18595"
},
{
"category": "external",
"summary": "SUSE Bug 1149555 for CVE-2017-18595",
"url": "https://bugzilla.suse.com/1149555"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.14.2.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.14.2.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.14.2.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.14.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.14.2.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.14.2.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.14.2.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.14.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-12-13T17:30:04Z",
"details": "moderate"
}
],
"title": "CVE-2017-18595"
},
{
"cve": "CVE-2018-12207",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-12207"
}
],
"notes": [
{
"category": "general",
"text": "Improper invalidation for page table updates by a virtual guest operating system for multiple Intel(R) Processors may allow an authenticated user to potentially enable denial of service of the host system via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.14.2.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.14.2.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.14.2.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.14.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-12207",
"url": "https://www.suse.com/security/cve/CVE-2018-12207"
},
{
"category": "external",
"summary": "SUSE Bug 1117665 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1117665"
},
{
"category": "external",
"summary": "SUSE Bug 1139073 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1139073"
},
{
"category": "external",
"summary": "SUSE Bug 1152505 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1152505"
},
{
"category": "external",
"summary": "SUSE Bug 1155812 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1155812"
},
{
"category": "external",
"summary": "SUSE Bug 1155817 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1155817"
},
{
"category": "external",
"summary": "SUSE Bug 1155945 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1155945"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1201877"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.14.2.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.14.2.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.14.2.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.14.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.14.2.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.14.2.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.14.2.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.14.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-12-13T17:30:04Z",
"details": "moderate"
}
],
"title": "CVE-2018-12207"
},
{
"cve": "CVE-2019-0154",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-0154"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient access control in subsystem for Intel (R) processor graphics in 6th, 7th, 8th and 9th Generation Intel(R) Core(TM) Processor Families; Intel(R) Pentium(R) Processor J, N, Silver and Gold Series; Intel(R) Celeron(R) Processor J, N, G3900 and G4900 Series; Intel(R) Atom(R) Processor A and E3900 Series; Intel(R) Xeon(R) Processor E3-1500 v5 and v6 and E-2100 Processor Families may allow an authenticated user to potentially enable denial of service via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.14.2.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.14.2.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.14.2.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.14.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-0154",
"url": "https://www.suse.com/security/cve/CVE-2019-0154"
},
{
"category": "external",
"summary": "SUSE Bug 1135966 for CVE-2019-0154",
"url": "https://bugzilla.suse.com/1135966"
},
{
"category": "external",
"summary": "SUSE Bug 1181720 for CVE-2019-0154",
"url": "https://bugzilla.suse.com/1181720"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.14.2.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.14.2.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.14.2.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.14.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.14.2.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.14.2.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.14.2.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.14.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-12-13T17:30:04Z",
"details": "important"
}
],
"title": "CVE-2019-0154"
},
{
"cve": "CVE-2019-0155",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-0155"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient access control in a subsystem for Intel (R) processor graphics in 6th, 7th, 8th and 9th Generation Intel(R) Core(TM) Processor Families; Intel(R) Pentium(R) Processor J, N, Silver and Gold Series; Intel(R) Celeron(R) Processor J, N, G3900 and G4900 Series; Intel(R) Atom(R) Processor A and E3900 Series; Intel(R) Xeon(R) Processor E3-1500 v5 and v6, E-2100 and E-2200 Processor Families; Intel(R) Graphics Driver for Windows before 26.20.100.6813 (DCH) or 26.20.100.6812 and before 21.20.x.5077 (aka15.45.5077), i915 Linux Driver for Intel(R) Processor Graphics before versions 5.4-rc7, 5.3.11, 4.19.84, 4.14.154, 4.9.201, 4.4.201 may allow an authenticated user to potentially enable escalation of privilege via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.14.2.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.14.2.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.14.2.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.14.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-0155",
"url": "https://www.suse.com/security/cve/CVE-2019-0155"
},
{
"category": "external",
"summary": "SUSE Bug 1135966 for CVE-2019-0155",
"url": "https://bugzilla.suse.com/1135966"
},
{
"category": "external",
"summary": "SUSE Bug 1135967 for CVE-2019-0155",
"url": "https://bugzilla.suse.com/1135967"
},
{
"category": "external",
"summary": "SUSE Bug 1173663 for CVE-2019-0155",
"url": "https://bugzilla.suse.com/1173663"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.14.2.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.14.2.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.14.2.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.14.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.14.2.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.14.2.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.14.2.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.14.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-12-13T17:30:04Z",
"details": "important"
}
],
"title": "CVE-2019-0155"
},
{
"cve": "CVE-2019-10220",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-10220"
}
],
"notes": [
{
"category": "general",
"text": "Linux kernel CIFS implementation, version 4.9.0 is vulnerable to a relative paths injection in directory entry lists.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.14.2.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.14.2.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.14.2.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.14.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-10220",
"url": "https://www.suse.com/security/cve/CVE-2019-10220"
},
{
"category": "external",
"summary": "SUSE Bug 1144903 for CVE-2019-10220",
"url": "https://bugzilla.suse.com/1144903"
},
{
"category": "external",
"summary": "SUSE Bug 1153108 for CVE-2019-10220",
"url": "https://bugzilla.suse.com/1153108"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.14.2.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.14.2.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.14.2.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.14.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.14.2.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.14.2.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.14.2.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.14.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-12-13T17:30:04Z",
"details": "important"
}
],
"title": "CVE-2019-10220"
},
{
"cve": "CVE-2019-11135",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11135"
}
],
"notes": [
{
"category": "general",
"text": "TSX Asynchronous Abort condition on some CPUs utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.14.2.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.14.2.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.14.2.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.14.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11135",
"url": "https://www.suse.com/security/cve/CVE-2019-11135"
},
{
"category": "external",
"summary": "SUSE Bug 1139073 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1139073"
},
{
"category": "external",
"summary": "SUSE Bug 1152497 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1152497"
},
{
"category": "external",
"summary": "SUSE Bug 1152505 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1152505"
},
{
"category": "external",
"summary": "SUSE Bug 1152506 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1152506"
},
{
"category": "external",
"summary": "SUSE Bug 1160120 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1160120"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1201877"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.14.2.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.14.2.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.14.2.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.14.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.14.2.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.14.2.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.14.2.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.14.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-12-13T17:30:04Z",
"details": "moderate"
}
],
"title": "CVE-2019-11135"
},
{
"cve": "CVE-2019-14821",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-14821"
}
],
"notes": [
{
"category": "general",
"text": "An out-of-bounds access issue was found in the Linux kernel, all versions through 5.3, in the way Linux kernel\u0027s KVM hypervisor implements the Coalesced MMIO write operation. It operates on an MMIO ring buffer \u0027struct kvm_coalesced_mmio\u0027 object, wherein write indices \u0027ring-\u003efirst\u0027 and \u0027ring-\u003elast\u0027 value could be supplied by a host user-space process. An unprivileged host user or process with access to \u0027/dev/kvm\u0027 device could use this flaw to crash the host kernel, resulting in a denial of service or potentially escalating privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.14.2.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.14.2.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.14.2.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.14.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-14821",
"url": "https://www.suse.com/security/cve/CVE-2019-14821"
},
{
"category": "external",
"summary": "SUSE Bug 1151350 for CVE-2019-14821",
"url": "https://bugzilla.suse.com/1151350"
},
{
"category": "external",
"summary": "SUSE Bug 1218966 for CVE-2019-14821",
"url": "https://bugzilla.suse.com/1218966"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.14.2.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.14.2.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.14.2.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.14.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.0"
},
"products": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.14.2.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.14.2.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.14.2.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.14.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-12-13T17:30:04Z",
"details": "moderate"
}
],
"title": "CVE-2019-14821"
},
{
"cve": "CVE-2019-15291",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15291"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 5.2.9. There is a NULL pointer dereference caused by a malicious USB device in the flexcop_usb_probe function in the drivers/media/usb/b2c2/flexcop-usb.c driver.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.14.2.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.14.2.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.14.2.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.14.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15291",
"url": "https://www.suse.com/security/cve/CVE-2019-15291"
},
{
"category": "external",
"summary": "SUSE Bug 1146519 for CVE-2019-15291",
"url": "https://bugzilla.suse.com/1146519"
},
{
"category": "external",
"summary": "SUSE Bug 1146540 for CVE-2019-15291",
"url": "https://bugzilla.suse.com/1146540"
},
{
"category": "external",
"summary": "SUSE Bug 1158381 for CVE-2019-15291",
"url": "https://bugzilla.suse.com/1158381"
},
{
"category": "external",
"summary": "SUSE Bug 1158834 for CVE-2019-15291",
"url": "https://bugzilla.suse.com/1158834"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.14.2.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.14.2.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.14.2.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.14.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.14.2.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.14.2.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.14.2.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.14.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-12-13T17:30:04Z",
"details": "moderate"
}
],
"title": "CVE-2019-15291"
},
{
"cve": "CVE-2019-15916",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15916"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.0.1. There is a memory leak in register_queue_kobjects() in net/core/net-sysfs.c, which will cause denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.14.2.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.14.2.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.14.2.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.14.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15916",
"url": "https://www.suse.com/security/cve/CVE-2019-15916"
},
{
"category": "external",
"summary": "SUSE Bug 1149448 for CVE-2019-15916",
"url": "https://bugzilla.suse.com/1149448"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.14.2.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.14.2.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.14.2.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.14.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.14.2.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.14.2.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.14.2.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.14.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-12-13T17:30:04Z",
"details": "low"
}
],
"title": "CVE-2019-15916"
},
{
"cve": "CVE-2019-16231",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-16231"
}
],
"notes": [
{
"category": "general",
"text": "drivers/net/fjes/fjes_main.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.14.2.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.14.2.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.14.2.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.14.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-16231",
"url": "https://www.suse.com/security/cve/CVE-2019-16231"
},
{
"category": "external",
"summary": "SUSE Bug 1150466 for CVE-2019-16231",
"url": "https://bugzilla.suse.com/1150466"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.14.2.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.14.2.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.14.2.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.14.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.14.2.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.14.2.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.14.2.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.14.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-12-13T17:30:04Z",
"details": "low"
}
],
"title": "CVE-2019-16231"
},
{
"cve": "CVE-2019-16232",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-16232"
}
],
"notes": [
{
"category": "general",
"text": "drivers/net/wireless/marvell/libertas/if_sdio.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.14.2.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.14.2.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.14.2.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.14.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-16232",
"url": "https://www.suse.com/security/cve/CVE-2019-16232"
},
{
"category": "external",
"summary": "SUSE Bug 1150465 for CVE-2019-16232",
"url": "https://bugzilla.suse.com/1150465"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.14.2.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.14.2.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.14.2.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.14.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.14.2.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.14.2.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.14.2.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.14.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-12-13T17:30:04Z",
"details": "low"
}
],
"title": "CVE-2019-16232"
},
{
"cve": "CVE-2019-16233",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-16233"
}
],
"notes": [
{
"category": "general",
"text": "drivers/scsi/qla2xxx/qla_os.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.14.2.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.14.2.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.14.2.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.14.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-16233",
"url": "https://www.suse.com/security/cve/CVE-2019-16233"
},
{
"category": "external",
"summary": "SUSE Bug 1150457 for CVE-2019-16233",
"url": "https://bugzilla.suse.com/1150457"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.14.2.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.14.2.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.14.2.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.14.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.14.2.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.14.2.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.14.2.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.14.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-12-13T17:30:04Z",
"details": "low"
}
],
"title": "CVE-2019-16233"
},
{
"cve": "CVE-2019-16234",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-16234"
}
],
"notes": [
{
"category": "general",
"text": "drivers/net/wireless/intel/iwlwifi/pcie/trans.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.14.2.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.14.2.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.14.2.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.14.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-16234",
"url": "https://www.suse.com/security/cve/CVE-2019-16234"
},
{
"category": "external",
"summary": "SUSE Bug 1150452 for CVE-2019-16234",
"url": "https://bugzilla.suse.com/1150452"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.14.2.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.14.2.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.14.2.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.14.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.14.2.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.14.2.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.14.2.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.14.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-12-13T17:30:04Z",
"details": "low"
}
],
"title": "CVE-2019-16234"
},
{
"cve": "CVE-2019-16995",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-16995"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel before 5.0.3, a memory leak exits in hsr_dev_finalize() in net/hsr/hsr_device.c if hsr_add_port fails to add a port, which may cause denial of service, aka CID-6caabe7f197d.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.14.2.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.14.2.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.14.2.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.14.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-16995",
"url": "https://www.suse.com/security/cve/CVE-2019-16995"
},
{
"category": "external",
"summary": "SUSE Bug 1152685 for CVE-2019-16995",
"url": "https://bugzilla.suse.com/1152685"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.14.2.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.14.2.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.14.2.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.14.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.14.2.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.14.2.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.14.2.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.14.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-12-13T17:30:04Z",
"details": "moderate"
}
],
"title": "CVE-2019-16995"
},
{
"cve": "CVE-2019-17055",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-17055"
}
],
"notes": [
{
"category": "general",
"text": "base_sock_create in drivers/isdn/mISDN/socket.c in the AF_ISDN network module in the Linux kernel through 5.3.2 does not enforce CAP_NET_RAW, which means that unprivileged users can create a raw socket, aka CID-b91ee4aa2a21.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.14.2.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.14.2.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.14.2.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.14.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-17055",
"url": "https://www.suse.com/security/cve/CVE-2019-17055"
},
{
"category": "external",
"summary": "SUSE Bug 1152782 for CVE-2019-17055",
"url": "https://bugzilla.suse.com/1152782"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.14.2.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.14.2.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.14.2.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.14.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.14.2.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.14.2.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.14.2.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.14.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-12-13T17:30:04Z",
"details": "low"
}
],
"title": "CVE-2019-17055"
},
{
"cve": "CVE-2019-17056",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-17056"
}
],
"notes": [
{
"category": "general",
"text": "llcp_sock_create in net/nfc/llcp_sock.c in the AF_NFC network module in the Linux kernel through 5.3.2 does not enforce CAP_NET_RAW, which means that unprivileged users can create a raw socket, aka CID-3a359798b176.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.14.2.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.14.2.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.14.2.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.14.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-17056",
"url": "https://www.suse.com/security/cve/CVE-2019-17056"
},
{
"category": "external",
"summary": "SUSE Bug 1152788 for CVE-2019-17056",
"url": "https://bugzilla.suse.com/1152788"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.14.2.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.14.2.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.14.2.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.14.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.14.2.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.14.2.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.14.2.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.14.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-12-13T17:30:04Z",
"details": "moderate"
}
],
"title": "CVE-2019-17056"
},
{
"cve": "CVE-2019-17133",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-17133"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel through 5.3.2, cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c does not reject a long SSID IE, leading to a Buffer Overflow.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.14.2.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.14.2.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.14.2.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.14.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-17133",
"url": "https://www.suse.com/security/cve/CVE-2019-17133"
},
{
"category": "external",
"summary": "SUSE Bug 1153158 for CVE-2019-17133",
"url": "https://bugzilla.suse.com/1153158"
},
{
"category": "external",
"summary": "SUSE Bug 1153161 for CVE-2019-17133",
"url": "https://bugzilla.suse.com/1153161"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.14.2.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.14.2.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.14.2.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.14.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.14.2.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.14.2.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.14.2.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.14.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-12-13T17:30:04Z",
"details": "important"
}
],
"title": "CVE-2019-17133"
},
{
"cve": "CVE-2019-17666",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-17666"
}
],
"notes": [
{
"category": "general",
"text": "rtl_p2p_noa_ie in drivers/net/wireless/realtek/rtlwifi/ps.c in the Linux kernel through 5.3.6 lacks a certain upper-bound check, leading to a buffer overflow.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.14.2.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.14.2.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.14.2.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.14.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-17666",
"url": "https://www.suse.com/security/cve/CVE-2019-17666"
},
{
"category": "external",
"summary": "SUSE Bug 1154372 for CVE-2019-17666",
"url": "https://bugzilla.suse.com/1154372"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.14.2.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.14.2.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.14.2.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.14.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.14.2.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.14.2.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.14.2.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.14.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-12-13T17:30:04Z",
"details": "moderate"
}
],
"title": "CVE-2019-17666"
},
{
"cve": "CVE-2019-18805",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-18805"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in net/ipv4/sysctl_net_ipv4.c in the Linux kernel before 5.0.11. There is a net/ipv4/tcp_input.c signed integer overflow in tcp_ack_update_rtt() when userspace writes a very large integer to /proc/sys/net/ipv4/tcp_min_rtt_wlen, leading to a denial of service or possibly unspecified other impact, aka CID-19fad20d15a6.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.14.2.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.14.2.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.14.2.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.14.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-18805",
"url": "https://www.suse.com/security/cve/CVE-2019-18805"
},
{
"category": "external",
"summary": "SUSE Bug 1156187 for CVE-2019-18805",
"url": "https://bugzilla.suse.com/1156187"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.14.2.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.14.2.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.14.2.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.14.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.14.2.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.14.2.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.14.2.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.14.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-12-13T17:30:04Z",
"details": "low"
}
],
"title": "CVE-2019-18805"
},
{
"cve": "CVE-2019-9506",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-9506"
}
],
"notes": [
{
"category": "general",
"text": "The Bluetooth BR/EDR specification up to and including version 5.1 permits sufficiently low encryption key length and does not prevent an attacker from influencing the key length negotiation. This allows practical brute-force attacks (aka \"KNOB\") that can decrypt traffic and inject arbitrary ciphertext without the victim noticing.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.14.2.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.14.2.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.14.2.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.14.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-9506",
"url": "https://www.suse.com/security/cve/CVE-2019-9506"
},
{
"category": "external",
"summary": "SUSE Bug 1137865 for CVE-2019-9506",
"url": "https://bugzilla.suse.com/1137865"
},
{
"category": "external",
"summary": "SUSE Bug 1146042 for CVE-2019-9506",
"url": "https://bugzilla.suse.com/1146042"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.14.2.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.14.2.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.14.2.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.14.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.14.2.noarch",
"SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.14.3.x86_64",
"SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.14.2.noarch",
"SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.14.2.x86_64",
"SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.14.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-12-13T17:30:04Z",
"details": "moderate"
}
],
"title": "CVE-2019-9506"
}
]
}
suse-su-2019:2946-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\n\nThe SUSE Linux Enterprise 15 kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2018-12207: Untrusted virtual machines on Intel CPUs could exploit a race condition in the Instruction Fetch Unit of the Intel CPU to cause a Machine Exception during Page Size Change, causing the CPU core to be non-functional.\n\nThe Linux Kernel kvm hypervisor was adjusted to avoid page size changes in executable pages by splitting / merging huge pages into small pages as needed.\nMore information can be found on https://www.suse.com/support/kb/doc/?id=7023735\n\n- CVE-2019-11135: Aborting an asynchronous TSX operation on Intel CPUs with\nTransactional Memory support could be used to facilitate sidechannel\ninformation leaks out of microarchitectural buffers, similar to the previously\ndescribed \u0027Microarchitectural Data Sampling\u0027 attack.\n\nThe Linux kernel was supplemented with the option to disable TSX operation\naltogether (requiring CPU Microcode updates on older systems) and better\nflushing of microarchitectural buffers (VERW).\n\nThe set of options available is described in our TID at https://www.suse.com/support/kb/doc/?id=7024251\n\n- CVE-2019-0154: Fix a local denial of service via read of unprotected i915 registers. (bsc#1135966)\n- CVE-2019-0155: Fix privilege escalation in the i915 driver. Batch buffers from usermode could have escalated privileges via blitter command stream. (bsc#1135967)\n- CVE-2019-16233: drivers/scsi/qla2xxx/qla_os.c did not check the alloc_workqueue return value, leading to a NULL pointer dereference. (bsc#1150457).\n- CVE-2019-10220: Added sanity checks on the pathnames passed to the user space. (bsc#1144903).\n- CVE-2019-16995: Fix a memory leak in hsr_dev_finalize() if hsr_add_port failed to add a port, which may have caused denial of service (bsc#1152685).\n- CVE-2019-17666: rtlwifi: Fix potential overflow in P2P code (bsc#1154372).\n- CVE-2019-16232: Fix a potential NULL pointer dereference in the Marwell libertas driver (bsc#1150465)\n- CVE-2019-16234: iwlwifi pcie driver did not check the alloc_workqueue return value, leading to a NULL pointer dereference. (bsc#1150452).\n- CVE-2019-17133: cfg80211 wireless extension did not reject a long SSID IE, leading to a Buffer Overflow (bsc#1153158).\n- CVE-2019-17056: The AF_NFC network module did not enforce CAP_NET_RAW, which meant that unprivileged users could create a raw socket (bsc#1152788).\n\nThe following non-security bugs were fixed:\n\n- 9p: avoid attaching writeback_fid on mmap with type PRIVATE (bsc#1051510).\n- acpi / CPPC: do not require the _PSD method (bsc#1051510).\n- acpi / processor: do not print errors for processorIDs == 0xff (bsc#1051510).\n- acpi: CPPC: Set pcc_data[pcc_ss_id] to NULL in acpi_cppc_processor_exit() (bsc#1051510).\n- act_mirred: Fix mirred_init_module error handling (bsc#1051510).\n- alsa: bebob: Fix prototype of helper function to return negative value (bsc#1051510).\n- alsa: hda - Add laptop imic fixup for ASUS M9V laptop (bsc#1051510).\n- alsa: hda - Apply AMD controller workaround for Raven platform (bsc#1051510).\n- alsa: hda - Define a fallback_pin_fixup_tbl for alc269 family (bsc#1051510).\n- alsa: hda - Drop unsol event handler for Intel HDMI codecs (bsc#1051510).\n- alsa: hda - Expand pin_match function to match upcoming new tbls (bsc#1051510).\n- alsa: hda - Inform too slow responses (bsc#1051510).\n- alsa: hda - Show the fatal CORB/RIRB error more clearly (bsc#1051510).\n- alsa: hda/hdmi: remove redundant assignment to variable pcm_idx (bsc#1051510).\n- alsa: hda/realtek - Add support for ALC623 (bsc#1051510).\n- alsa: hda/realtek - Add support for ALC711 (bsc#1051510).\n- alsa: hda/realtek - Blacklist PC beep for Lenovo ThinkCentre M73/93 (bsc#1051510).\n- alsa: hda/realtek - Check beep whitelist before assigning in all codecs (bsc#1051510).\n- alsa: hda/realtek - Fix 2 front mics of codec 0x623 (bsc#1051510).\n- alsa: hda/realtek - Fix alienware headset mic (bsc#1051510).\n- alsa: hda/realtek: Reduce the Headphone static noise on XPS 9350/9360 (bsc#1051510).\n- alsa: hda/sigmatel - remove unused variable \u0027stac9200_core_init\u0027 (bsc#1051510).\n- alsa: hda: Add Elkhart Lake pci ID (bsc#1051510).\n- alsa: hda: Add Tigerlake/Jasperlake pci ID (bsc#1051510).\n- alsa: hda: Add support of Zhaoxin controller (bsc#1051510).\n- alsa: hda: Flush interrupts on disabling (bsc#1051510).\n- alsa: hda: Set fifo_size for both playback and capture streams (bsc#1051510).\n- alsa: i2c: ak4xxx-adda: Fix a possible null pointer dereference in build_adc_controls() (bsc#1051510).\n- alsa: line6: sizeof (byte) is always 1, use that fact (bsc#1051510).\n- alsa: timer: Fix mutex deadlock at releasing card (bsc#1051510).\n- alsa: usb-audio: Add Pioneer DDJ-SX3 PCM quirck (bsc#1051510).\n- alsa: usb-audio: Disable quirks for BOSS Katana amplifiers (bsc#1051510).\n- alsa: usb-audio: Skip bSynchAddress endpoint check if it is invalid (bsc#1051510).\n- appletalk: enforce CAP_NET_RAW for raw sockets (bsc#1051510).\n- arcnet: provide a buffer big enough to actually receive packets (networking-stable-19_09_30).\n- asoc: Define a set of DAPM pre/post-up events (bsc#1051510).\n- asoc: Intel: Fix use of potentially uninitialized variable (bsc#1051510).\n- asoc: Intel: NHLT: Fix debug print format (bsc#1051510).\n- asoc: dmaengine: Make the pcm-\u003ename equal to pcm-\u003eid if the name is not set (bsc#1051510).\n- asoc: rockchip: i2s: Fix RPM imbalance (bsc#1051510).\n- asoc: rsnd: Reinitialize bit clock inversion flag for every format setting (bsc#1051510).\n- asoc: sgtl5000: Fix charge pump source assignment (bsc#1051510).\n- auxdisplay: panel: need to delete scan_timer when misc_register fails in panel_attach (bsc#1051510).\n- ax25: enforce CAP_NET_RAW for raw sockets (bsc#1051510).\n- blk-wbt: abstract out end IO completion handler (bsc#1135873).\n- blk-wbt: fix has-sleeper queueing check (bsc#1135873).\n- blk-wbt: improve waking of tasks (bsc#1135873).\n- blk-wbt: move disable check into get_limit() (bsc#1135873).\n- blk-wbt: use wq_has_sleeper() for wq active check (bsc#1135873).\n- block: add io timeout to sysfs (bsc#1148410).\n- block: do not show io_timeout if driver has no timeout handler (bsc#1148410).\n- bluetooth: btrtl: Additional Realtek 8822CE Bluetooth devices (bsc#1051510).\n- bnx2x: Fix VF\u0027s VLAN reconfiguration in reload (bsc#1086323 ).\n- boot: Sign non-x86 kernels when possible (boo#1134303)\n- bpf: fix use after free in prog symbol exposure (bsc#1083647).\n- bridge/mdb: remove wrong use of NLM_F_MULTI (networking-stable-19_09_15).\n- btrfs: Ensure btrfs_init_dev_replace_tgtdev sees up to date values (bsc#1154651).\n- btrfs: Ensure replaced device does not have pending chunk allocation (bsc#1154607).\n- btrfs: bail out gracefully rather than BUG_ON (bsc#1153646).\n- btrfs: block-group: Fix a memory leak due to missing btrfs_put_block_group() (bsc#1155178).\n- btrfs: check for the full sync flag while holding the inode lock during fsync (bsc#1153713).\n- btrfs: qgroup: Always free PREALLOC META reserve in btrfs_delalloc_release_extents() (bsc#1155179).\n- btrfs: remove wrong use of volume_mutex from btrfs_dev_replace_start (bsc#1154651).\n- btrfs: tracepoints: Fix bad entry members of qgroup events (bsc#1155186).\n- btrfs: tracepoints: Fix wrong parameter order for qgroup events (bsc#1155184).\n- can: mcp251x: mcp251x_hw_reset(): allow more time after a reset (bsc#1051510).\n- can: xilinx_can: xcan_probe(): skip error message on deferred probe (bsc#1051510).\n- cdc_ether: fix rndis support for Mediatek based smartphones (networking-stable-19_09_15).\n- cdc_ncm: fix divide-by-zero caused by invalid wMaxPacketSize (bsc#1051510).\n- ceph: fix directories inode i_blkbits initialization (bsc#1153717).\n- ceph: reconnect connection if session hang in opening state (bsc#1153718).\n- ceph: update the mtime when truncating up (bsc#1153719).\n- cfg80211: Purge frame registrations on iftype change (bsc#1051510).\n- cfg80211: add and use strongly typed element iteration macros (bsc#1051510).\n- clk: at91: select parent if main oscillator or bypass is enabled (bsc#1051510).\n- clk: qoriq: Fix -Wunused-const-variable (bsc#1051510).\n- clk: sirf: Do not reference clk_init_data after registration (bsc#1051510).\n- clk: zx296718: Do not reference clk_init_data after registration (bsc#1051510).\n- crypto: af_alg - Fix race around ctx-\u003ercvused by making it atomic_t (bsc#1154737).\n- crypto: af_alg - Initialize sg_num_bytes in error code path (bsc#1051510).\n- crypto: af_alg - consolidation of duplicate code (bsc#1154737).\n- crypto: af_alg - fix race accessing cipher request (bsc#1154737).\n- crypto: af_alg - remove locking in async callback (bsc#1154737).\n- crypto: af_alg - update correct dst SGL entry (bsc#1051510).\n- crypto: af_alg - wait for data at beginning of recvmsg (bsc#1154737).\n- crypto: algif - return error code when no data was processed (bsc#1154737).\n- crypto: algif_aead - copy AAD from src to dst (bsc#1154737).\n- crypto: algif_aead - fix reference counting of null skcipher (bsc#1154737).\n- crypto: algif_aead - overhaul memory management (bsc#1154737).\n- crypto: algif_aead - skip SGL entries with NULL page (bsc#1154737).\n- crypto: algif_skcipher - overhaul memory management (bsc#1154737).\n- crypto: talitos - fix missing break in switch statement (bsc#1142635).\n- cxgb4: Signedness bug in init_one() (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).\n- cxgb4: fix endianness for vlan value in cxgb4_tc_flower (bsc#1064802 bsc#1066129).\n- cxgb4: offload VLAN flows regardless of VLAN ethtype (bsc#1064802 bsc#1066129).\n- cxgb4: reduce kernel stack usage in cudbg_collect_mem_region() (bsc#1073513).\n- cxgb4: smt: Add lock for atomic_dec_and_test (bsc#1064802 bsc#1066129).\n- cxgb4:Fix out-of-bounds MSI-X info array access (networking-stable-19_10_05).\n- dasd_fba: Display \u002700000000\u0027 for zero page when dumping sense (bsc#1123080).\n- drm/amd/powerplay/smu7: enforce minimal VBITimeout (v2) (bsc#1051510).\n- drm/amdgpu/si: fix ASIC tests (git-fixes).\n- drm/amdgpu: Check for valid number of registers to read (bsc#1051510).\n- drm/ast: Fixed reboot test may cause system hanged (bsc#1051510).\n- drm/bridge: tc358767: Increase AUX transfer length limit (bsc#1051510).\n- drm/edid: Add 6 bpc quirk for SDC panel in Lenovo G50 (bsc#1051510).\n- drm/i915/cmdparser: Add support for backward jumps (bsc#1135967)\n- drm/i915/cmdparser: Ignore Length operands during command matching (bsc#1135967)\n- drm/i915/cmdparser: Use explicit goto for error paths (bsc#1135967)\n- drm/i915/gen8+: Add RC6 CTX corruption WA (bsc#1135967)\n- drm/i915/gtt: Add read only pages to gen8_pte_encode (bsc#1135967)\n- drm/i915/gtt: Disable read-only support under GVT (bsc#1135967)\n- drm/i915/gtt: Read-only pages for insert_entries on bdw (bsc#1135967)\n- drm/i915: Add gen9 BCS cmdparsing (bsc#1135967)\n- drm/i915: Add support for mandatory cmdparsing (bsc#1135967)\n- drm/i915: Allow parsing of unsized batches (bsc#1135967)\n- drm/i915: Disable Secure Batches for gen6+\n- drm/i915: Lower RM timeout to avoid DSI hard hangs (bsc#1135967)\n- drm/i915: Prevent writing into a read-only object via a GGTT mmap (bsc#1135967)\n- drm/i915: Remove Master tables from cmdparser\n- drm/i915: Rename gen7 cmdparser tables (bsc#1135967)\n- drm/i915: Support ro ppgtt mapped cmdparser shadow buffers (bsc#1135967)\n- drm/msm/dsi: Implement reset correctly (bsc#1051510).\n- drm/panel: simple: fix AUO g185han01 horizontal blanking (bsc#1051510).\n- drm/radeon: Fix EEH during kexec (bsc#1051510).\n- drm/tilcdc: Register cpufreq notifier after we have initialized crtc (bsc#1051510).\n- drm/vmwgfx: Fix double free in vmw_recv_msg() (bsc#1051510).\n- drm: Flush output polling on shutdown (bsc#1051510).\n- e1000e: add workaround for possible stalled packet (bsc#1051510).\n- efi/memattr: Do not bail on zero VA if it equals the region\u0027s PA (bsc#1051510).\n- efi: cper: print AER info of pcie fatal error (bsc#1051510).\n- efivar/ssdt: Do not iterate over EFI vars if no SSDT override was specified (bsc#1051510).\n- firmware: dmi: Fix unlikely out-of-bounds read in save_mem_devices (git-fixes).\n- gpu: drm: radeon: Fix a possible null-pointer dereference in radeon_connector_set_property() (bsc#1051510).\n- hid: apple: Fix stuck function keys when using FN (bsc#1051510).\n- hid: fix error message in hid_open_report() (bsc#1051510).\n- hid: hidraw: Fix invalid read in hidraw_ioctl (bsc#1051510).\n- hid: logitech-hidpp: do all FF cleanup in hidpp_ff_destroy() (bsc#1051510).\n- hid: logitech: Fix general protection fault caused by Logitech driver (bsc#1051510).\n- hid: prodikeys: Fix general protection fault during probe (bsc#1051510).\n- hid: sony: Fix memory corruption issue on cleanup (bsc#1051510).\n- hso: fix NULL-deref on tty open (bsc#1051510).\n- hwmon: (acpi_power_meter) Change log level for \u0027unsafe software power cap\u0027 (bsc#1051510).\n- hwrng: core - do not wait on add_early_randomness() (git-fixes).\n- hyperv: set nvme msi interrupts to unmanaged (jsc#SLE-8953, jsc#SLE-9221, jsc#SLE-4941, bsc#1119461, bsc#1119465, bsc#1138190, bsc#1154905).\n- i2c: riic: Clear NACK in tend isr (bsc#1051510).\n- ib/core, ipoib: Do not overreact to SM LID change event (bsc#1154108)\n- ib/core: Add mitigation for Spectre V1 (bsc#1155671)\n- ib/hfi1: Remove overly conservative VM_EXEC flag check (bsc#1144449).\n- ib/mlx5: Consolidate use_umr checks into single function (bsc#1093205).\n- ib/mlx5: Fix MR re-registration flow to use UMR properly (bsc#1093205).\n- ib/mlx5: Report correctly tag matching rendezvous capability (bsc#1046305).\n- ieee802154: atusb: fix use-after-free at disconnect (bsc#1051510).\n- ieee802154: ca8210: prevent memory leak (bsc#1051510).\n- ieee802154: enforce CAP_NET_RAW for raw sockets (bsc#1051510).\n- iio: adc: ad799x: fix probe error handling (bsc#1051510).\n- iio: light: opt3001: fix mutex unlock race (bsc#1051510).\n- ima: always return negative code for error (bsc#1051510).\n- input: da9063 - fix capability and drop KEY_SLEEP (bsc#1051510).\n- input: synaptics-rmi4 - avoid processing unknown IRQs (bsc#1051510).\n- integrity: prevent deadlock during digsig verification (bsc#1090631).\n- iommu/amd: Apply the same IVRS IOAPIC workaround to Acer Aspire A315-41 (bsc#1137799).\n- iommu/amd: Check PM_LEVEL_SIZE() condition in locked section (bsc#1154608).\n- iommu/amd: Override wrong IVRS IOAPIC on Raven Ridge systems (bsc#1137799).\n- iommu/amd: Remove domain-\u003eupdated (bsc#1154610).\n- iommu/amd: Wait for completion of IOTLB flush in attach_device (bsc#1154611).\n- ipmi_si: Only schedule continuously in the thread in maintenance mode (bsc#1051510).\n- ipv6: Fix the link time qualifier of \u0027ping_v6_proc_exit_net()\u0027 (networking-stable-19_09_15).\n- ipv6: Handle missing host route in __ipv6_ifa_notify (networking-stable-19_10_05).\n- ipv6: drop incoming packets having a v4mapped source address (networking-stable-19_10_05).\n- ixgbe: Prevent u8 wrapping of ITR value to something less than 10us (bsc#1101674).\n- ixgbe: sync the first fragment unconditionally (bsc#1133140).\n- kABI workaround for crypto/af_alg changes (bsc#1154737).\n- kABI workaround for drm_vma_offset_node readonly field addition (bsc#1135967)\n- kABI workaround for snd_hda_pick_pin_fixup() changes (bsc#1051510).\n- kabi/severities: Whitelist functions internal to radix mm. To call these functions you have to first detect if you are running in radix mm mode which can\u0027t be expected of OOT code.\n- kabi: net: sched: act_sample: fix psample group handling on overwrite (networking-stable-19_09_05).\n- kernel-binary: Drop .kernel-binary.spec.buildenv (boo#1154578).\n- kernel-binary: check also bzImage on s390/s390x Starting with 4.19-rc1, uncompressed image is no longer built on s390x.\n- kernel-subpackage-build: create zero size ghost for uncompressed vmlinux (bsc#1154354). It is not strictly necessary to uncompress it so maybe the ghost file can be 0 size in this case.\n- kernel/sysctl.c: do not override max_threads provided by userspace (bnc#1150875).\n- ksm: cleanup stable_node chain collapse case (bnc#1144338).\n- ksm: fix use after free with merge_across_nodes = 0 (bnc#1144338).\n- ksm: introduce ksm_max_page_sharing per page deduplication limit (bnc#1144338).\n- ksm: optimize refile of stable_node_dup at the head of the chain (bnc#1144338).\n- ksm: swap the two output parameters of chain/chain_prune (bnc#1144338).\n- kvm: Convert kvm_lock to a mutex (bsc#1117665).\n- kvm: MMU: drop vcpu param in gpte_access (bsc#1117665).\n- kvm: PPC: Book3S HV: use smp_mb() when setting/clearing host_ipi flag (bsc#1061840).\n- kvm: vmx, svm: always run with EFER.NXE=1 when shadow paging is active (bsc#1117665).\n- kvm: x86, powerpc: do not allow clearing largepages debugfs entry (bsc#1117665).\n- kvm: x86: Do not release the page inside mmu_set_spte() (bsc#1117665).\n- kvm: x86: add tracepoints around __direct_map and FNAME(fetch) (bsc#1117665).\n- kvm: x86: adjust kvm_mmu_page member to save 8 bytes (bsc#1117665).\n- kvm: x86: change kvm_mmu_page_get_gfn BUG_ON to WARN_ON (bsc#1117665).\n- kvm: x86: make FNAME(fetch) and __direct_map more similar (bsc#1117665).\n- kvm: x86: mmu: Recovery of shattered NX large pages (bsc#1117665, CVE-2018-12207).\n- kvm: x86: remove now unneeded hugepage gfn adjustment (bsc#1117665).\n- lib/mpi: Fix karactx leak in mpi_powm (bsc#1051510).\n- libertas: Add missing sentinel at end of if_usb.c fw_table (bsc#1051510).\n- mISDN: enforce CAP_NET_RAW for raw sockets (bsc#1051510).\n- mac80211: Reject malformed SSID elements (bsc#1051510).\n- mac80211: accept deauth frames in ibSS mode (bsc#1051510).\n- mac80211: fix txq null pointer dereference (bsc#1051510).\n- macsec: drop skb sk before calling gro_cells_receive (bsc#1051510).\n- md/raid0: avoid RAID0 data corruption due to layout confusion (bsc#1140090).\n- md/raid0: fix warning message for parameter default_layout (bsc#1140090).\n- media: atmel: atmel-isc: fix asd memory allocation (bsc#1135642).\n- media: cpia2_usb: fix memory leaks (bsc#1051510).\n- media: dvb-core: fix a memory leak bug (bsc#1051510).\n- media: exynos4-is: fix leaked of_node references (bsc#1051510).\n- media: gspca: zero usb_buf on error (bsc#1051510).\n- media: hdpvr: Add device num check and handling (bsc#1051510).\n- media: hdpvr: add terminating 0 at end of string (bsc#1051510).\n- media: i2c: ov5645: Fix power sequence (bsc#1051510).\n- media: iguanair: add sanity checks (bsc#1051510).\n- media: omap3isp: Do not set streaming state on random subdevs (bsc#1051510).\n- media: omap3isp: Set device on omap3isp subdevs (bsc#1051510).\n- media: ov9650: add a sanity check (bsc#1051510).\n- media: radio/si470x: kill urb on error (bsc#1051510).\n- media: saa7134: fix terminology around saa7134_i2c_eeprom_md7134_gate() (bsc#1051510).\n- media: saa7146: add cleanup in hexium_attach() (bsc#1051510).\n- media: sn9c20x: Add MSI MS-1039 laptop to flip_dmi_table (bsc#1051510).\n- media: stkwebcam: fix runtime PM after driver unbind (bsc#1051510).\n- media: ttusb-dec: Fix info-leak in ttusb_dec_send_command() (bsc#1051510).\n- mem: /dev/mem: Bail out upon SIGKILL (git-fixes).\n- memstick: jmb38x_ms: Fix an error handling path in \u0027jmb38x_ms_probe()\u0027 (bsc#1051510).\n- mfd: intel-lpss: Remove D3cold delay (bsc#1051510).\n- mld: fix memory leak in mld_del_delrec() (networking-stable-19_09_05).\n- mmc: sdhci-of-esdhc: set DMA snooping based on DMA coherence (bsc#1051510).\n- mmc: sdhci: Fix incorrect switch to HS mode (bsc#1051510).\n- mmc: sdhci: improve ADMA error reporting (bsc#1051510).\n- net/ibmvnic: Fix EOI when running in XIVE mode (bsc#1089644, ltc#166495, ltc#165544, git-fixes).\n- net/mlx4_en: fix a memory leak bug (bsc#1046299).\n- net/mlx5: Add device ID of upcoming BlueField-2 (bsc#1046303 ).\n- net/mlx5: Fix error handling in mlx5_load() (bsc#1046305 ).\n- net/phy: fix DP83865 10 Mbps HDX loopback disable function (networking-stable-19_09_30).\n- net/rds: Fix error handling in rds_ib_add_one() (networking-stable-19_10_05).\n- net/rds: fix warn in rds_message_alloc_sgs (bsc#1154848).\n- net/rds: remove user triggered WARN_ON in rds_sendmsg (bsc#1154848).\n- net/sched: act_sample: do not push mac header on ip6gre ingress (networking-stable-19_09_30).\n- net: Fix null de-reference of device refcount (networking-stable-19_09_15).\n- net: Replace NF_CT_ASSERT() with WARN_ON() (bsc#1146612).\n- net: Unpublish sk from sk_reuseport_cb before call_rcu (networking-stable-19_10_05).\n- net: fix skb use after free in netpoll (networking-stable-19_09_05).\n- net: gso: Fix skb_segment splat when splitting gso_size mangled skb having linear-headed frag_list (networking-stable-19_09_15).\n- net: openvswitch: free vport unless register_netdevice() succeeds (git-fixes).\n- net: qlogic: Fix memory leak in ql_alloc_large_buffers (networking-stable-19_10_05).\n- net: qrtr: Stop rx_worker before freeing node (networking-stable-19_09_30).\n- net: sched: act_sample: fix psample group handling on overwrite (networking-stable-19_09_05).\n- net: stmmac: dwmac-rk: Do not fail if phy regulator is absent (networking-stable-19_09_05).\n- net_sched: add policy validation for action attributes (networking-stable-19_09_30).\n- net_sched: fix backward compatibility for TCA_ACT_KIND (git-fixes).\n- netfilter: nf_nat: do not bug when mapping already exists (bsc#1146612).\n- nfc: enforce CAP_NET_RAW for raw sockets (bsc#1152788 CVE-2019-17056).\n- nfc: fix attrs checks in netlink interface (bsc#1051510).\n- nfc: fix memory leak in llcp_sock_bind() (bsc#1051510).\n- nfc: pn533: fix use-after-free and memleaks (bsc#1051510).\n- nfs: NFSv4 Check the return value of update_open_stateid (boo#1154189 bsc#1154747).\n- nfsv4.1 - backchannel request should hold ref on xprt (bsc#1152624).\n- nl80211: fix null pointer dereference (bsc#1051510).\n- objtool: Clobber user CFLAGS variable (bsc#1153236).\n- openvswitch: change type of UPCALL_PID attribute to NLA_UNSPEC (networking-stable-19_09_30).\n- packaging: add support for riscv64\n- pci: Correct pci=resource_alignment parameter example (bsc#1051510).\n- pci: PM: Fix pci_power_up() (bsc#1051510).\n- pci: dra7xx: Fix legacy INTD IRQ handling (bsc#1087092).\n- pci: hv: Use bytes 4 and 5 from instance ID as the pci domain numbers (bsc#1153263).\n- pinctrl: tegra: Fix write barrier placement in pmx_writel (bsc#1051510).\n- platform/x86: classmate-laptop: remove unused variable (bsc#1051510).\n- platform/x86: pmc_atom: Add Siemens SIMATIC IPC277E to critclk_systems DMI table (bsc#1051510).\n- power: supply: sysfs: ratelimit property read error message (bsc#1051510).\n- powerpc/64s/pseries: radix flush translations before MMU is enabled at boot (bsc#1055186).\n- powerpc/64s/radix: keep kernel ERAT over local process/guest invalidates (bsc#1055186).\n- powerpc/64s/radix: tidy up TLB flushing code (bsc#1055186).\n- powerpc/64s: Rename PPC_INVALIDATE_ERAT to PPC_ISA_3_0_INVALIDATE_ERAT (bsc#1055186).\n- powerpc/mm/book3s64: Move book3s64 code to pgtable-book3s64 (bsc#1055186).\n- powerpc/mm/radix: mark __radix__flush_tlb_range_psize() as __always_inline (bsc#1055186).\n- powerpc/mm/radix: mark as __tlbie_pid() and friends as__always_inline (bsc#1055186).\n- powerpc/mm: Properly invalidate when setting process table base (bsc#1055186).\n- powerpc/mm: mark more tlb functions as __always_inline (bsc#1055186).\n- powerpc/pseries/mobility: use cond_resched when updating device tree (bsc#1153112 ltc#181778).\n- powerpc/pseries: Remove confusing warning message (bsc#1109158).\n- powerpc/rtas: allow rescheduling while changing cpu states (bsc#1153112 ltc#181778).\n- qed: iWARP - Fix default window size to be based on chip (bsc#1050536 bsc#1050545).\n- qed: iWARP - Fix tc for MPA ll2 connection (bsc#1050536 bsc#1050545).\n- qed: iWARP - Use READ_ONCE and smp_store_release to access ep-\u003estate (bsc#1050536 bsc#1050545).\n- qed: iWARP - fix uninitialized callback (bsc#1050536 bsc#1050545).\n- qmi_wwan: add support for Cinterion CLS8 devices (networking-stable-19_10_05).\n- r8152: Set macpassthru in reset_resume callback (bsc#1051510).\n- rdma/bnxt_re: Fix spelling mistake \u0027missin_resp\u0027 -\u003e \u0027missing_resp\u0027 (bsc#1050244).\n- rdma: Fix goto target to release the allocated memory (bsc#1050244).\n- rds: Fix warning (bsc#1154848).\n- rpm/config.sh: Enable livepatch.\n- rpm/constraints.in: lower disk space required for ARM With a requirement of 35GB, only 2 slow workers are usable for ARM. Current aarch64 build requires 27G and armv6/7 requires 14G. Set requirements respectively to 30GB and 20GB.\n- rpm/dtb.spec.in.in: do not make dtb directory inaccessible There is no reason to lock down the dtb directory for ordinary users.\n- rpm/kernel-binary.spec.in: Fix kernel-livepatch description typo.\n- rpm/kernel-binary.spec.in: build kernel-*-kgraft only for default SLE kernel RT and Azure variants are excluded for the moment. (bsc#1141600)\n- rpm/kernel-binary.spec.in: handle modules.builtin.modinfo It was added in 5.2.\n- rpm/kernel-binary.spec.in: support partial rt debug config.\n- rpm/kernel-subpackage-spec: Mention debuginfo in the subpackage description (bsc#1149119).\n- rpm/macros.kernel-source: KMPs should depend on kmod-compat to build. kmod-compat links are used in find-provides.ksyms, find-requires.ksyms, and find-supplements.ksyms in rpm-config-SUSE.\n- rpm/mkspec: Correct tarball URL for rc kernels.\n- rpm/mkspec: Make building DTBs optional.\n- rpm/modflist: Simplify compression support.\n- rpm: raise required disk space for binary packages Current disk space constraints (10 GB on s390x, 25 GB on other architectures) no longer suffice for 5.3 kernel builds. The statistics show ~30 GB of disk consumption on x86_64 and ~11 GB on s390x so raise the constraints to 35 GB in general and 14 GB on s390x.\n- rpm: support compressed modules Some of our scripts and scriptlets in rpm/ do not expect module files not ending with \u0027.ko\u0027 which currently leads to failure in preuninstall scriptlet of cluster-md-kmp-default (and probably also other subpackages). Let those which could be run on compressed module files recognize \u0027.ko.xz\u0027 in addition to \u0027.ko\u0027.\n- rtlwifi: rtl8192cu: Fix value set in descriptor (bsc#1142635).\n- s390/cmf: set_schib_wait add timeout (bsc#1153509, bsc#1153476).\n- sch_cbq: validate TCA_CBQ_WRROPT to avoid crash (networking-stable-19_10_05).\n- sch_dsmark: fix potential NULL deref in dsmark_init() (networking-stable-19_10_05).\n- sch_hhf: ensure quantum and hhf_non_hh_weight are non-zero (networking-stable-19_09_15).\n- sch_netem: fix a divide by zero in tabledist() (networking-stable-19_09_30).\n- sched/fair: Avoid divide by zero when rebalancing domains (bsc#1096254).\n- scripts/arch-symbols: add missing link.\n- scsi: lpfc: Fix devices that do not return after devloss followed by rediscovery (bsc#1137040).\n- scsi: lpfc: Fix null ptr oops updating lpfc_devloss_tmo via sysfs attribute (bsc#1140845).\n- scsi: lpfc: Fix propagation of devloss_tmo setting to nvme transport (bsc#1140883).\n- scsi: lpfc: Remove bg debugfs buffers (bsc#1144375).\n- scsi: qedf: Modify abort and tmf handler to handle edge condition and flush (bsc#1098291).\n- scsi: qedf: fc_rport_priv reference counting fixes (bsc#1098291).\n- scsi: qla2xxx: Add error handling for PLOGI ELS passthrough (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Capture FW dump on MPI heartbeat stop event (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Check for MB timeout while capturing ISP27/28xx FW dump (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Dual FCP-NVMe target port support (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Fix N2N link reset (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Fix N2N link up fail (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Fix partial flash write of MBI (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Fix stale mem access on driver unload (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Fix unbound sleep in fcport delete path (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Fix wait condition in loop (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Improve logging for scan thread (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Initialized mailbox to prevent driver load failure (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Optimize NPIV tear down process (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Set remove flag for all VP (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Silence fwdump template message (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Update driver version to 10.01.00.20-k (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: fix a potential NULL pointer dereference (bsc#1150457 CVE-2019-16233).\n- scsi: qla2xxx: fixup incorrect usage of host_byte (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: remove redundant assignment to pointer host (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: stop timer in shutdown path (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: storvsc: setup 1:1 mapping between hardware queue and CPU queue (bsc#1140729).\n- sctp: Fix the link time qualifier of \u0027sctp_ctrlsock_exit()\u0027 (networking-stable-19_09_15).\n- sctp: use transport pf_retrans in sctp_do_8_2_transport_strike (networking-stable-19_09_15).\n- skge: fix checksum byte order (networking-stable-19_09_30).\n- sock_diag: fix autoloading of the raw_diag module (bsc#1152791).\n- sock_diag: request _diag module only when the family or proto has been registered (bsc#1152791).\n- staging: vt6655: Fix memory leak in vt6655_probe (bsc#1051510).\n- staging: wlan-ng: fix exit return when sme-\u003ekey_idx \u003e= NUM_WEPKEYS (bsc#1051510).\n- supporte.conf: add efivarfs to kernel-default-base (bsc#1154858).\n- tcp: Do not dequeue SYN/FIN-segments from write-queue (git-gixes).\n- tcp: fix tcp_ecn_withdraw_cwr() to clear TCP_ECN_QUEUE_CWR (networking-stable-19_09_15).\n- tcp: inherit timestamp on mtu probe (networking-stable-19_09_05).\n- tcp: remove empty skb from write queue in error cases (networking-stable-19_09_05).\n- thermal: Fix use-after-free when unregistering thermal zone device (bsc#1051510).\n- thermal_hwmon: Sanitize thermal_zone type (bsc#1051510).\n- tipc: add NULL pointer check before calling kfree_rcu (networking-stable-19_09_15).\n- tipc: fix unlimited bundling of small messages (networking-stable-19_10_05).\n- tracing: Initialize iter-\u003eseq after zeroing in tracing_read_pipe() (bsc#1151508).\n- tun: fix use-after-free when register netdev failed (networking-stable-19_09_15).\n- tuntap: correctly set SOCKWQ_ASYNC_NOSPACE (bsc#1145099).\n- usb: adutux: fix NULL-derefs on disconnect (bsc#1142635).\n- usb: adutux: fix use-after-free on disconnect (bsc#1142635).\n- usb: adutux: fix use-after-free on release (bsc#1051510).\n- usb: chaoskey: fix use-after-free on release (bsc#1051510).\n- usb: dummy-hcd: fix power budget for SuperSpeed mode (bsc#1051510).\n- usb: iowarrior: fix use-after-free after driver unbind (bsc#1051510).\n- usb: iowarrior: fix use-after-free on disconnect (bsc#1051510).\n- usb: iowarrior: fix use-after-free on release (bsc#1051510).\n- usb: ldusb: fix NULL-derefs on driver unbind (bsc#1051510).\n- usb: ldusb: fix memleak on disconnect (bsc#1051510).\n- usb: ldusb: fix read info leaks (bsc#1051510).\n- usb: legousbtower: fix a signedness bug in tower_probe() (bsc#1051510).\n- usb: legousbtower: fix deadlock on disconnect (bsc#1142635).\n- usb: legousbtower: fix memleak on disconnect (bsc#1051510).\n- usb: legousbtower: fix open after failed reset request (bsc#1142635).\n- usb: legousbtower: fix potential NULL-deref on disconnect (bsc#1142635).\n- usb: legousbtower: fix slab info leak at probe (bsc#1142635).\n- usb: legousbtower: fix use-after-free on release (bsc#1051510).\n- usb: microtek: fix info-leak at probe (bsc#1142635).\n- usb: serial: fix runtime PM after driver unbind (bsc#1051510).\n- usb: serial: ftdi_sio: add device IDs for Sienna and Echelon PL-20 (bsc#1051510).\n- usb: serial: keyspan: fix NULL-derefs on open() and write() (bsc#1051510).\n- usb: serial: option: add Telit FN980 compositions (bsc#1051510).\n- usb: serial: option: add support for Cinterion CLS8 devices (bsc#1051510).\n- usb: serial: ti_usb_3410_5052: fix port-close races (bsc#1051510).\n- usb: udc: lpc32xx: fix bad bit shift operation (bsc#1051510).\n- usb: usb-skeleton: fix NULL-deref on disconnect (bsc#1051510).\n- usb: usb-skeleton: fix runtime PM after driver unbind (bsc#1051510).\n- usb: usb-skeleton: fix use-after-free after driver unbind (bsc#1051510).\n- usb: usblcd: fix I/O after disconnect (bsc#1142635).\n- usb: usblp: fix runtime PM after driver unbind (bsc#1051510).\n- usb: usblp: fix use-after-free on disconnect (bsc#1051510).\n- usb: xhci: wait for CNR controller not ready bit in xhci resume (bsc#1051510).\n- usb: yurex: Do not retry on unexpected errors (bsc#1051510).\n- usb: yurex: fix NULL-derefs on disconnect (bsc#1051510).\n- usbnet: ignore endpoints with invalid wMaxPacketSize (bsc#1051510).\n- usbnet: sanity checking of packet sizes and device mtu (bsc#1051510).\n- vfio_pci: Restore original state on release (bsc#1051510).\n- vfs: Make filldir[64]() verify the directory entry filename is valid (bsc#1144903).\n- vhost_net: conditionally enable tx polling (bsc#1145099).\n- video: of: display_timing: Add of_node_put() in of_get_display_timing() (bsc#1051510).\n- vsock: Fix a lockdep warning in __vsock_release() (networking-stable-19_10_05).\n- watchdog: imx2_wdt: fix min() calculation in imx2_wdt_set_timeout (bsc#1051510).\n- x86/asm: Fix MWAITX C-state hint value (bsc#1114279).\n- x86/boot/64: Make level2_kernel_pgt pages invalid outside kernel area (bnc#1153969).\n- x86/boot/64: Round memory hole size up to next PMD page (bnc#1153969).\n- x86/mm: Use WRITE_ONCE() when setting PTEs (bsc#1114279).\n- x86/tsx: Add config options to set tsx=on|off|auto (bsc#1139073, CVE-2019-11135).\n- xen/netback: fix error path of xenvif_connect_data() (bsc#1065600).\n- xen/pv: Fix Xen PV guest int3 handling (bsc#1153811).\n- xhci: Check all endpoints for LPM timeout (bsc#1051510).\n- xhci: Fix false warning message about wrong bounce buffer write length (bsc#1051510).\n- xhci: Increase STS_SAVE timeout in xhci_suspend() (bsc#1051510).\n- xhci: Prevent device initiated U1/U2 link pm if exit latency is too long (bsc#1051510).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2019-2946,SUSE-SLE-Module-Basesystem-15-2019-2946,SUSE-SLE-Module-Development-Tools-15-2019-2946,SUSE-SLE-Module-Development-Tools-OBS-15-2019-2946,SUSE-SLE-Module-Legacy-15-2019-2946,SUSE-SLE-Module-Live-Patching-15-2019-2946,SUSE-SLE-Product-HA-15-2019-2946,SUSE-SLE-Product-WE-15-2019-2946",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_2946-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2019:2946-1",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192946-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2019:2946-1",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192946-1.html"
},
{
"category": "self",
"summary": "SUSE Bug 1046299",
"url": "https://bugzilla.suse.com/1046299"
},
{
"category": "self",
"summary": "SUSE Bug 1046303",
"url": "https://bugzilla.suse.com/1046303"
},
{
"category": "self",
"summary": "SUSE Bug 1046305",
"url": "https://bugzilla.suse.com/1046305"
},
{
"category": "self",
"summary": "SUSE Bug 1050244",
"url": "https://bugzilla.suse.com/1050244"
},
{
"category": "self",
"summary": "SUSE Bug 1050536",
"url": "https://bugzilla.suse.com/1050536"
},
{
"category": "self",
"summary": "SUSE Bug 1050545",
"url": "https://bugzilla.suse.com/1050545"
},
{
"category": "self",
"summary": "SUSE Bug 1051510",
"url": "https://bugzilla.suse.com/1051510"
},
{
"category": "self",
"summary": "SUSE Bug 1055186",
"url": "https://bugzilla.suse.com/1055186"
},
{
"category": "self",
"summary": "SUSE Bug 1061840",
"url": "https://bugzilla.suse.com/1061840"
},
{
"category": "self",
"summary": "SUSE Bug 1064802",
"url": "https://bugzilla.suse.com/1064802"
},
{
"category": "self",
"summary": "SUSE Bug 1065600",
"url": "https://bugzilla.suse.com/1065600"
},
{
"category": "self",
"summary": "SUSE Bug 1066129",
"url": "https://bugzilla.suse.com/1066129"
},
{
"category": "self",
"summary": "SUSE Bug 1073513",
"url": "https://bugzilla.suse.com/1073513"
},
{
"category": "self",
"summary": "SUSE Bug 1082635",
"url": "https://bugzilla.suse.com/1082635"
},
{
"category": "self",
"summary": "SUSE Bug 1083647",
"url": "https://bugzilla.suse.com/1083647"
},
{
"category": "self",
"summary": "SUSE Bug 1086323",
"url": "https://bugzilla.suse.com/1086323"
},
{
"category": "self",
"summary": "SUSE Bug 1087092",
"url": "https://bugzilla.suse.com/1087092"
},
{
"category": "self",
"summary": "SUSE Bug 1089644",
"url": "https://bugzilla.suse.com/1089644"
},
{
"category": "self",
"summary": "SUSE Bug 1090631",
"url": "https://bugzilla.suse.com/1090631"
},
{
"category": "self",
"summary": "SUSE Bug 1093205",
"url": "https://bugzilla.suse.com/1093205"
},
{
"category": "self",
"summary": "SUSE Bug 1096254",
"url": "https://bugzilla.suse.com/1096254"
},
{
"category": "self",
"summary": "SUSE Bug 1097583",
"url": "https://bugzilla.suse.com/1097583"
},
{
"category": "self",
"summary": "SUSE Bug 1097584",
"url": "https://bugzilla.suse.com/1097584"
},
{
"category": "self",
"summary": "SUSE Bug 1097585",
"url": "https://bugzilla.suse.com/1097585"
},
{
"category": "self",
"summary": "SUSE Bug 1097586",
"url": "https://bugzilla.suse.com/1097586"
},
{
"category": "self",
"summary": "SUSE Bug 1097587",
"url": "https://bugzilla.suse.com/1097587"
},
{
"category": "self",
"summary": "SUSE Bug 1097588",
"url": "https://bugzilla.suse.com/1097588"
},
{
"category": "self",
"summary": "SUSE Bug 1098291",
"url": "https://bugzilla.suse.com/1098291"
},
{
"category": "self",
"summary": "SUSE Bug 1101674",
"url": "https://bugzilla.suse.com/1101674"
},
{
"category": "self",
"summary": "SUSE Bug 1109158",
"url": "https://bugzilla.suse.com/1109158"
},
{
"category": "self",
"summary": "SUSE Bug 1114279",
"url": "https://bugzilla.suse.com/1114279"
},
{
"category": "self",
"summary": "SUSE Bug 1117665",
"url": "https://bugzilla.suse.com/1117665"
},
{
"category": "self",
"summary": "SUSE Bug 1119461",
"url": "https://bugzilla.suse.com/1119461"
},
{
"category": "self",
"summary": "SUSE Bug 1119465",
"url": "https://bugzilla.suse.com/1119465"
},
{
"category": "self",
"summary": "SUSE Bug 1123034",
"url": "https://bugzilla.suse.com/1123034"
},
{
"category": "self",
"summary": "SUSE Bug 1123080",
"url": "https://bugzilla.suse.com/1123080"
},
{
"category": "self",
"summary": "SUSE Bug 1133140",
"url": "https://bugzilla.suse.com/1133140"
},
{
"category": "self",
"summary": "SUSE Bug 1134303",
"url": "https://bugzilla.suse.com/1134303"
},
{
"category": "self",
"summary": "SUSE Bug 1135642",
"url": "https://bugzilla.suse.com/1135642"
},
{
"category": "self",
"summary": "SUSE Bug 1135854",
"url": "https://bugzilla.suse.com/1135854"
},
{
"category": "self",
"summary": "SUSE Bug 1135873",
"url": "https://bugzilla.suse.com/1135873"
},
{
"category": "self",
"summary": "SUSE Bug 1135966",
"url": "https://bugzilla.suse.com/1135966"
},
{
"category": "self",
"summary": "SUSE Bug 1135967",
"url": "https://bugzilla.suse.com/1135967"
},
{
"category": "self",
"summary": "SUSE Bug 1137040",
"url": "https://bugzilla.suse.com/1137040"
},
{
"category": "self",
"summary": "SUSE Bug 1137799",
"url": "https://bugzilla.suse.com/1137799"
},
{
"category": "self",
"summary": "SUSE Bug 1138190",
"url": "https://bugzilla.suse.com/1138190"
},
{
"category": "self",
"summary": "SUSE Bug 1139073",
"url": "https://bugzilla.suse.com/1139073"
},
{
"category": "self",
"summary": "SUSE Bug 1140090",
"url": "https://bugzilla.suse.com/1140090"
},
{
"category": "self",
"summary": "SUSE Bug 1140729",
"url": "https://bugzilla.suse.com/1140729"
},
{
"category": "self",
"summary": "SUSE Bug 1140845",
"url": "https://bugzilla.suse.com/1140845"
},
{
"category": "self",
"summary": "SUSE Bug 1140883",
"url": "https://bugzilla.suse.com/1140883"
},
{
"category": "self",
"summary": "SUSE Bug 1141600",
"url": "https://bugzilla.suse.com/1141600"
},
{
"category": "self",
"summary": "SUSE Bug 1142635",
"url": "https://bugzilla.suse.com/1142635"
},
{
"category": "self",
"summary": "SUSE Bug 1142667",
"url": "https://bugzilla.suse.com/1142667"
},
{
"category": "self",
"summary": "SUSE Bug 1143706",
"url": "https://bugzilla.suse.com/1143706"
},
{
"category": "self",
"summary": "SUSE Bug 1144338",
"url": "https://bugzilla.suse.com/1144338"
},
{
"category": "self",
"summary": "SUSE Bug 1144375",
"url": "https://bugzilla.suse.com/1144375"
},
{
"category": "self",
"summary": "SUSE Bug 1144449",
"url": "https://bugzilla.suse.com/1144449"
},
{
"category": "self",
"summary": "SUSE Bug 1144903",
"url": "https://bugzilla.suse.com/1144903"
},
{
"category": "self",
"summary": "SUSE Bug 1145099",
"url": "https://bugzilla.suse.com/1145099"
},
{
"category": "self",
"summary": "SUSE Bug 1146612",
"url": "https://bugzilla.suse.com/1146612"
},
{
"category": "self",
"summary": "SUSE Bug 1148410",
"url": "https://bugzilla.suse.com/1148410"
},
{
"category": "self",
"summary": "SUSE Bug 1149119",
"url": "https://bugzilla.suse.com/1149119"
},
{
"category": "self",
"summary": "SUSE Bug 1150452",
"url": "https://bugzilla.suse.com/1150452"
},
{
"category": "self",
"summary": "SUSE Bug 1150457",
"url": "https://bugzilla.suse.com/1150457"
},
{
"category": "self",
"summary": "SUSE Bug 1150465",
"url": "https://bugzilla.suse.com/1150465"
},
{
"category": "self",
"summary": "SUSE Bug 1150875",
"url": "https://bugzilla.suse.com/1150875"
},
{
"category": "self",
"summary": "SUSE Bug 1151508",
"url": "https://bugzilla.suse.com/1151508"
},
{
"category": "self",
"summary": "SUSE Bug 1152624",
"url": "https://bugzilla.suse.com/1152624"
},
{
"category": "self",
"summary": "SUSE Bug 1152685",
"url": "https://bugzilla.suse.com/1152685"
},
{
"category": "self",
"summary": "SUSE Bug 1152788",
"url": "https://bugzilla.suse.com/1152788"
},
{
"category": "self",
"summary": "SUSE Bug 1152791",
"url": "https://bugzilla.suse.com/1152791"
},
{
"category": "self",
"summary": "SUSE Bug 1153112",
"url": "https://bugzilla.suse.com/1153112"
},
{
"category": "self",
"summary": "SUSE Bug 1153158",
"url": "https://bugzilla.suse.com/1153158"
},
{
"category": "self",
"summary": "SUSE Bug 1153236",
"url": "https://bugzilla.suse.com/1153236"
},
{
"category": "self",
"summary": "SUSE Bug 1153263",
"url": "https://bugzilla.suse.com/1153263"
},
{
"category": "self",
"summary": "SUSE Bug 1153476",
"url": "https://bugzilla.suse.com/1153476"
},
{
"category": "self",
"summary": "SUSE Bug 1153509",
"url": "https://bugzilla.suse.com/1153509"
},
{
"category": "self",
"summary": "SUSE Bug 1153646",
"url": "https://bugzilla.suse.com/1153646"
},
{
"category": "self",
"summary": "SUSE Bug 1153713",
"url": "https://bugzilla.suse.com/1153713"
},
{
"category": "self",
"summary": "SUSE Bug 1153717",
"url": "https://bugzilla.suse.com/1153717"
},
{
"category": "self",
"summary": "SUSE Bug 1153718",
"url": "https://bugzilla.suse.com/1153718"
},
{
"category": "self",
"summary": "SUSE Bug 1153719",
"url": "https://bugzilla.suse.com/1153719"
},
{
"category": "self",
"summary": "SUSE Bug 1153811",
"url": "https://bugzilla.suse.com/1153811"
},
{
"category": "self",
"summary": "SUSE Bug 1153969",
"url": "https://bugzilla.suse.com/1153969"
},
{
"category": "self",
"summary": "SUSE Bug 1154108",
"url": "https://bugzilla.suse.com/1154108"
},
{
"category": "self",
"summary": "SUSE Bug 1154189",
"url": "https://bugzilla.suse.com/1154189"
},
{
"category": "self",
"summary": "SUSE Bug 1154354",
"url": "https://bugzilla.suse.com/1154354"
},
{
"category": "self",
"summary": "SUSE Bug 1154372",
"url": "https://bugzilla.suse.com/1154372"
},
{
"category": "self",
"summary": "SUSE Bug 1154578",
"url": "https://bugzilla.suse.com/1154578"
},
{
"category": "self",
"summary": "SUSE Bug 1154607",
"url": "https://bugzilla.suse.com/1154607"
},
{
"category": "self",
"summary": "SUSE Bug 1154608",
"url": "https://bugzilla.suse.com/1154608"
},
{
"category": "self",
"summary": "SUSE Bug 1154610",
"url": "https://bugzilla.suse.com/1154610"
},
{
"category": "self",
"summary": "SUSE Bug 1154611",
"url": "https://bugzilla.suse.com/1154611"
},
{
"category": "self",
"summary": "SUSE Bug 1154651",
"url": "https://bugzilla.suse.com/1154651"
},
{
"category": "self",
"summary": "SUSE Bug 1154737",
"url": "https://bugzilla.suse.com/1154737"
},
{
"category": "self",
"summary": "SUSE Bug 1154747",
"url": "https://bugzilla.suse.com/1154747"
},
{
"category": "self",
"summary": "SUSE Bug 1154848",
"url": "https://bugzilla.suse.com/1154848"
},
{
"category": "self",
"summary": "SUSE Bug 1154858",
"url": "https://bugzilla.suse.com/1154858"
},
{
"category": "self",
"summary": "SUSE Bug 1154905",
"url": "https://bugzilla.suse.com/1154905"
},
{
"category": "self",
"summary": "SUSE Bug 1155178",
"url": "https://bugzilla.suse.com/1155178"
},
{
"category": "self",
"summary": "SUSE Bug 1155179",
"url": "https://bugzilla.suse.com/1155179"
},
{
"category": "self",
"summary": "SUSE Bug 1155184",
"url": "https://bugzilla.suse.com/1155184"
},
{
"category": "self",
"summary": "SUSE Bug 1155186",
"url": "https://bugzilla.suse.com/1155186"
},
{
"category": "self",
"summary": "SUSE Bug 1155671",
"url": "https://bugzilla.suse.com/1155671"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-12207 page",
"url": "https://www.suse.com/security/cve/CVE-2018-12207/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-0154 page",
"url": "https://www.suse.com/security/cve/CVE-2019-0154/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-0155 page",
"url": "https://www.suse.com/security/cve/CVE-2019-0155/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-10220 page",
"url": "https://www.suse.com/security/cve/CVE-2019-10220/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11135 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11135/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-16232 page",
"url": "https://www.suse.com/security/cve/CVE-2019-16232/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-16233 page",
"url": "https://www.suse.com/security/cve/CVE-2019-16233/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-16234 page",
"url": "https://www.suse.com/security/cve/CVE-2019-16234/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-16995 page",
"url": "https://www.suse.com/security/cve/CVE-2019-16995/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-17056 page",
"url": "https://www.suse.com/security/cve/CVE-2019-17056/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-17133 page",
"url": "https://www.suse.com/security/cve/CVE-2019-17133/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-17666 page",
"url": "https://www.suse.com/security/cve/CVE-2019-17666/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2019-11-28T19:49:52Z",
"generator": {
"date": "2019-11-28T19:49:52Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2019:2946-1",
"initial_release_date": "2019-11-28T19:49:52Z",
"revision_history": [
{
"date": "2019-11-28T19:49:52Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-150.41.1.aarch64",
"product": {
"name": "cluster-md-kmp-default-4.12.14-150.41.1.aarch64",
"product_id": "cluster-md-kmp-default-4.12.14-150.41.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-150.41.1.aarch64",
"product": {
"name": "dlm-kmp-default-4.12.14-150.41.1.aarch64",
"product_id": "dlm-kmp-default-4.12.14-150.41.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-150.41.1.aarch64",
"product": {
"name": "gfs2-kmp-default-4.12.14-150.41.1.aarch64",
"product_id": "gfs2-kmp-default-4.12.14-150.41.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-150.41.1.aarch64",
"product": {
"name": "kernel-default-4.12.14-150.41.1.aarch64",
"product_id": "kernel-default-4.12.14-150.41.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-150.41.1.aarch64",
"product": {
"name": "kernel-default-base-4.12.14-150.41.1.aarch64",
"product_id": "kernel-default-base-4.12.14-150.41.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-150.41.1.aarch64",
"product": {
"name": "kernel-default-devel-4.12.14-150.41.1.aarch64",
"product_id": "kernel-default-devel-4.12.14-150.41.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-150.41.1.aarch64",
"product": {
"name": "kernel-default-extra-4.12.14-150.41.1.aarch64",
"product_id": "kernel-default-extra-4.12.14-150.41.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-4.12.14-150.41.1.aarch64",
"product": {
"name": "kernel-default-livepatch-4.12.14-150.41.1.aarch64",
"product_id": "kernel-default-livepatch-4.12.14-150.41.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-4.12.14-150.41.1.aarch64",
"product": {
"name": "kernel-default-livepatch-devel-4.12.14-150.41.1.aarch64",
"product_id": "kernel-default-livepatch-devel-4.12.14-150.41.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-150.41.1.aarch64",
"product": {
"name": "kernel-obs-build-4.12.14-150.41.1.aarch64",
"product_id": "kernel-obs-build-4.12.14-150.41.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-150.41.1.aarch64",
"product": {
"name": "kernel-obs-qa-4.12.14-150.41.1.aarch64",
"product_id": "kernel-obs-qa-4.12.14-150.41.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-150.41.1.aarch64",
"product": {
"name": "kernel-syms-4.12.14-150.41.1.aarch64",
"product_id": "kernel-syms-4.12.14-150.41.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-150.41.1.aarch64",
"product": {
"name": "kernel-vanilla-4.12.14-150.41.1.aarch64",
"product_id": "kernel-vanilla-4.12.14-150.41.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-150.41.1.aarch64",
"product": {
"name": "kernel-vanilla-base-4.12.14-150.41.1.aarch64",
"product_id": "kernel-vanilla-base-4.12.14-150.41.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-150.41.1.aarch64",
"product": {
"name": "kernel-vanilla-devel-4.12.14-150.41.1.aarch64",
"product_id": "kernel-vanilla-devel-4.12.14-150.41.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-livepatch-devel-4.12.14-150.41.1.aarch64",
"product": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-150.41.1.aarch64",
"product_id": "kernel-vanilla-livepatch-devel-4.12.14-150.41.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-150.41.1.aarch64",
"product": {
"name": "kselftests-kmp-default-4.12.14-150.41.1.aarch64",
"product_id": "kselftests-kmp-default-4.12.14-150.41.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-150.41.1.aarch64",
"product": {
"name": "ocfs2-kmp-default-4.12.14-150.41.1.aarch64",
"product_id": "ocfs2-kmp-default-4.12.14-150.41.1.aarch64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-4.12.14-150.41.1.aarch64",
"product": {
"name": "reiserfs-kmp-default-4.12.14-150.41.1.aarch64",
"product_id": "reiserfs-kmp-default-4.12.14-150.41.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-4.12.14-150.41.1.noarch",
"product": {
"name": "kernel-devel-4.12.14-150.41.1.noarch",
"product_id": "kernel-devel-4.12.14-150.41.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-4.12.14-150.41.1.noarch",
"product": {
"name": "kernel-docs-4.12.14-150.41.1.noarch",
"product_id": "kernel-docs-4.12.14-150.41.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-html-4.12.14-150.41.1.noarch",
"product": {
"name": "kernel-docs-html-4.12.14-150.41.1.noarch",
"product_id": "kernel-docs-html-4.12.14-150.41.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-4.12.14-150.41.1.noarch",
"product": {
"name": "kernel-macros-4.12.14-150.41.1.noarch",
"product_id": "kernel-macros-4.12.14-150.41.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-4.12.14-150.41.1.noarch",
"product": {
"name": "kernel-source-4.12.14-150.41.1.noarch",
"product_id": "kernel-source-4.12.14-150.41.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-4.12.14-150.41.1.noarch",
"product": {
"name": "kernel-source-vanilla-4.12.14-150.41.1.noarch",
"product_id": "kernel-source-vanilla-4.12.14-150.41.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-150.41.1.ppc64le",
"product": {
"name": "cluster-md-kmp-default-4.12.14-150.41.1.ppc64le",
"product_id": "cluster-md-kmp-default-4.12.14-150.41.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-150.41.1.ppc64le",
"product": {
"name": "dlm-kmp-default-4.12.14-150.41.1.ppc64le",
"product_id": "dlm-kmp-default-4.12.14-150.41.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-150.41.1.ppc64le",
"product": {
"name": "gfs2-kmp-default-4.12.14-150.41.1.ppc64le",
"product_id": "gfs2-kmp-default-4.12.14-150.41.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-4.12.14-150.41.1.ppc64le",
"product": {
"name": "kernel-debug-4.12.14-150.41.1.ppc64le",
"product_id": "kernel-debug-4.12.14-150.41.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-4.12.14-150.41.1.ppc64le",
"product": {
"name": "kernel-debug-base-4.12.14-150.41.1.ppc64le",
"product_id": "kernel-debug-base-4.12.14-150.41.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-4.12.14-150.41.1.ppc64le",
"product": {
"name": "kernel-debug-devel-4.12.14-150.41.1.ppc64le",
"product_id": "kernel-debug-devel-4.12.14-150.41.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-livepatch-devel-4.12.14-150.41.1.ppc64le",
"product": {
"name": "kernel-debug-livepatch-devel-4.12.14-150.41.1.ppc64le",
"product_id": "kernel-debug-livepatch-devel-4.12.14-150.41.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-150.41.1.ppc64le",
"product": {
"name": "kernel-default-4.12.14-150.41.1.ppc64le",
"product_id": "kernel-default-4.12.14-150.41.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-150.41.1.ppc64le",
"product": {
"name": "kernel-default-base-4.12.14-150.41.1.ppc64le",
"product_id": "kernel-default-base-4.12.14-150.41.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-150.41.1.ppc64le",
"product": {
"name": "kernel-default-devel-4.12.14-150.41.1.ppc64le",
"product_id": "kernel-default-devel-4.12.14-150.41.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-150.41.1.ppc64le",
"product": {
"name": "kernel-default-extra-4.12.14-150.41.1.ppc64le",
"product_id": "kernel-default-extra-4.12.14-150.41.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-4.12.14-150.41.1.ppc64le",
"product": {
"name": "kernel-default-livepatch-4.12.14-150.41.1.ppc64le",
"product_id": "kernel-default-livepatch-4.12.14-150.41.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-4.12.14-150.41.1.ppc64le",
"product": {
"name": "kernel-default-livepatch-devel-4.12.14-150.41.1.ppc64le",
"product_id": "kernel-default-livepatch-devel-4.12.14-150.41.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-150_41-default-1-1.3.1.ppc64le",
"product": {
"name": "kernel-livepatch-4_12_14-150_41-default-1-1.3.1.ppc64le",
"product_id": "kernel-livepatch-4_12_14-150_41-default-1-1.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-150.41.1.ppc64le",
"product": {
"name": "kernel-obs-build-4.12.14-150.41.1.ppc64le",
"product_id": "kernel-obs-build-4.12.14-150.41.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-150.41.1.ppc64le",
"product": {
"name": "kernel-obs-qa-4.12.14-150.41.1.ppc64le",
"product_id": "kernel-obs-qa-4.12.14-150.41.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-150.41.1.ppc64le",
"product": {
"name": "kernel-syms-4.12.14-150.41.1.ppc64le",
"product_id": "kernel-syms-4.12.14-150.41.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-150.41.1.ppc64le",
"product": {
"name": "kernel-vanilla-4.12.14-150.41.1.ppc64le",
"product_id": "kernel-vanilla-4.12.14-150.41.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-150.41.1.ppc64le",
"product": {
"name": "kernel-vanilla-base-4.12.14-150.41.1.ppc64le",
"product_id": "kernel-vanilla-base-4.12.14-150.41.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-150.41.1.ppc64le",
"product": {
"name": "kernel-vanilla-devel-4.12.14-150.41.1.ppc64le",
"product_id": "kernel-vanilla-devel-4.12.14-150.41.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-livepatch-devel-4.12.14-150.41.1.ppc64le",
"product": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-150.41.1.ppc64le",
"product_id": "kernel-vanilla-livepatch-devel-4.12.14-150.41.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-150.41.1.ppc64le",
"product": {
"name": "kselftests-kmp-default-4.12.14-150.41.1.ppc64le",
"product_id": "kselftests-kmp-default-4.12.14-150.41.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-150.41.1.ppc64le",
"product": {
"name": "ocfs2-kmp-default-4.12.14-150.41.1.ppc64le",
"product_id": "ocfs2-kmp-default-4.12.14-150.41.1.ppc64le"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-4.12.14-150.41.1.ppc64le",
"product": {
"name": "reiserfs-kmp-default-4.12.14-150.41.1.ppc64le",
"product_id": "reiserfs-kmp-default-4.12.14-150.41.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-150.41.1.s390x",
"product": {
"name": "cluster-md-kmp-default-4.12.14-150.41.1.s390x",
"product_id": "cluster-md-kmp-default-4.12.14-150.41.1.s390x"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-150.41.1.s390x",
"product": {
"name": "dlm-kmp-default-4.12.14-150.41.1.s390x",
"product_id": "dlm-kmp-default-4.12.14-150.41.1.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-150.41.1.s390x",
"product": {
"name": "gfs2-kmp-default-4.12.14-150.41.1.s390x",
"product_id": "gfs2-kmp-default-4.12.14-150.41.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-150.41.1.s390x",
"product": {
"name": "kernel-default-4.12.14-150.41.1.s390x",
"product_id": "kernel-default-4.12.14-150.41.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-150.41.1.s390x",
"product": {
"name": "kernel-default-base-4.12.14-150.41.1.s390x",
"product_id": "kernel-default-base-4.12.14-150.41.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-150.41.1.s390x",
"product": {
"name": "kernel-default-devel-4.12.14-150.41.1.s390x",
"product_id": "kernel-default-devel-4.12.14-150.41.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-150.41.1.s390x",
"product": {
"name": "kernel-default-extra-4.12.14-150.41.1.s390x",
"product_id": "kernel-default-extra-4.12.14-150.41.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-4.12.14-150.41.1.s390x",
"product": {
"name": "kernel-default-livepatch-4.12.14-150.41.1.s390x",
"product_id": "kernel-default-livepatch-4.12.14-150.41.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-4.12.14-150.41.1.s390x",
"product": {
"name": "kernel-default-livepatch-devel-4.12.14-150.41.1.s390x",
"product_id": "kernel-default-livepatch-devel-4.12.14-150.41.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-man-4.12.14-150.41.1.s390x",
"product": {
"name": "kernel-default-man-4.12.14-150.41.1.s390x",
"product_id": "kernel-default-man-4.12.14-150.41.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-150.41.1.s390x",
"product": {
"name": "kernel-obs-build-4.12.14-150.41.1.s390x",
"product_id": "kernel-obs-build-4.12.14-150.41.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-150.41.1.s390x",
"product": {
"name": "kernel-obs-qa-4.12.14-150.41.1.s390x",
"product_id": "kernel-obs-qa-4.12.14-150.41.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-150.41.1.s390x",
"product": {
"name": "kernel-syms-4.12.14-150.41.1.s390x",
"product_id": "kernel-syms-4.12.14-150.41.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-150.41.1.s390x",
"product": {
"name": "kernel-vanilla-4.12.14-150.41.1.s390x",
"product_id": "kernel-vanilla-4.12.14-150.41.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-150.41.1.s390x",
"product": {
"name": "kernel-vanilla-base-4.12.14-150.41.1.s390x",
"product_id": "kernel-vanilla-base-4.12.14-150.41.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-150.41.1.s390x",
"product": {
"name": "kernel-vanilla-devel-4.12.14-150.41.1.s390x",
"product_id": "kernel-vanilla-devel-4.12.14-150.41.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-livepatch-devel-4.12.14-150.41.1.s390x",
"product": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-150.41.1.s390x",
"product_id": "kernel-vanilla-livepatch-devel-4.12.14-150.41.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-4.12.14-150.41.1.s390x",
"product": {
"name": "kernel-zfcpdump-4.12.14-150.41.1.s390x",
"product_id": "kernel-zfcpdump-4.12.14-150.41.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-man-4.12.14-150.41.1.s390x",
"product": {
"name": "kernel-zfcpdump-man-4.12.14-150.41.1.s390x",
"product_id": "kernel-zfcpdump-man-4.12.14-150.41.1.s390x"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-150.41.1.s390x",
"product": {
"name": "kselftests-kmp-default-4.12.14-150.41.1.s390x",
"product_id": "kselftests-kmp-default-4.12.14-150.41.1.s390x"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-150.41.1.s390x",
"product": {
"name": "ocfs2-kmp-default-4.12.14-150.41.1.s390x",
"product_id": "ocfs2-kmp-default-4.12.14-150.41.1.s390x"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-4.12.14-150.41.1.s390x",
"product": {
"name": "reiserfs-kmp-default-4.12.14-150.41.1.s390x",
"product_id": "reiserfs-kmp-default-4.12.14-150.41.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-150.41.1.x86_64",
"product": {
"name": "cluster-md-kmp-default-4.12.14-150.41.1.x86_64",
"product_id": "cluster-md-kmp-default-4.12.14-150.41.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-150.41.1.x86_64",
"product": {
"name": "dlm-kmp-default-4.12.14-150.41.1.x86_64",
"product_id": "dlm-kmp-default-4.12.14-150.41.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-150.41.1.x86_64",
"product": {
"name": "gfs2-kmp-default-4.12.14-150.41.1.x86_64",
"product_id": "gfs2-kmp-default-4.12.14-150.41.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-4.12.14-150.41.1.x86_64",
"product": {
"name": "kernel-debug-4.12.14-150.41.1.x86_64",
"product_id": "kernel-debug-4.12.14-150.41.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-4.12.14-150.41.1.x86_64",
"product": {
"name": "kernel-debug-base-4.12.14-150.41.1.x86_64",
"product_id": "kernel-debug-base-4.12.14-150.41.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-4.12.14-150.41.1.x86_64",
"product": {
"name": "kernel-debug-devel-4.12.14-150.41.1.x86_64",
"product_id": "kernel-debug-devel-4.12.14-150.41.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-livepatch-devel-4.12.14-150.41.1.x86_64",
"product": {
"name": "kernel-debug-livepatch-devel-4.12.14-150.41.1.x86_64",
"product_id": "kernel-debug-livepatch-devel-4.12.14-150.41.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-150.41.1.x86_64",
"product": {
"name": "kernel-default-4.12.14-150.41.1.x86_64",
"product_id": "kernel-default-4.12.14-150.41.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-150.41.1.x86_64",
"product": {
"name": "kernel-default-base-4.12.14-150.41.1.x86_64",
"product_id": "kernel-default-base-4.12.14-150.41.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-150.41.1.x86_64",
"product": {
"name": "kernel-default-devel-4.12.14-150.41.1.x86_64",
"product_id": "kernel-default-devel-4.12.14-150.41.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-150.41.1.x86_64",
"product": {
"name": "kernel-default-extra-4.12.14-150.41.1.x86_64",
"product_id": "kernel-default-extra-4.12.14-150.41.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-4.12.14-150.41.1.x86_64",
"product": {
"name": "kernel-default-livepatch-4.12.14-150.41.1.x86_64",
"product_id": "kernel-default-livepatch-4.12.14-150.41.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-4.12.14-150.41.1.x86_64",
"product": {
"name": "kernel-default-livepatch-devel-4.12.14-150.41.1.x86_64",
"product_id": "kernel-default-livepatch-devel-4.12.14-150.41.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-4.12.14-150.41.1.x86_64",
"product": {
"name": "kernel-kvmsmall-4.12.14-150.41.1.x86_64",
"product_id": "kernel-kvmsmall-4.12.14-150.41.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-base-4.12.14-150.41.1.x86_64",
"product": {
"name": "kernel-kvmsmall-base-4.12.14-150.41.1.x86_64",
"product_id": "kernel-kvmsmall-base-4.12.14-150.41.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-4.12.14-150.41.1.x86_64",
"product": {
"name": "kernel-kvmsmall-devel-4.12.14-150.41.1.x86_64",
"product_id": "kernel-kvmsmall-devel-4.12.14-150.41.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-livepatch-devel-4.12.14-150.41.1.x86_64",
"product": {
"name": "kernel-kvmsmall-livepatch-devel-4.12.14-150.41.1.x86_64",
"product_id": "kernel-kvmsmall-livepatch-devel-4.12.14-150.41.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-150_41-default-1-1.3.1.x86_64",
"product": {
"name": "kernel-livepatch-4_12_14-150_41-default-1-1.3.1.x86_64",
"product_id": "kernel-livepatch-4_12_14-150_41-default-1-1.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-150.41.1.x86_64",
"product": {
"name": "kernel-obs-build-4.12.14-150.41.1.x86_64",
"product_id": "kernel-obs-build-4.12.14-150.41.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-150.41.1.x86_64",
"product": {
"name": "kernel-obs-qa-4.12.14-150.41.1.x86_64",
"product_id": "kernel-obs-qa-4.12.14-150.41.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-150.41.1.x86_64",
"product": {
"name": "kernel-syms-4.12.14-150.41.1.x86_64",
"product_id": "kernel-syms-4.12.14-150.41.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-150.41.1.x86_64",
"product": {
"name": "kernel-vanilla-4.12.14-150.41.1.x86_64",
"product_id": "kernel-vanilla-4.12.14-150.41.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-150.41.1.x86_64",
"product": {
"name": "kernel-vanilla-base-4.12.14-150.41.1.x86_64",
"product_id": "kernel-vanilla-base-4.12.14-150.41.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-150.41.1.x86_64",
"product": {
"name": "kernel-vanilla-devel-4.12.14-150.41.1.x86_64",
"product_id": "kernel-vanilla-devel-4.12.14-150.41.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-livepatch-devel-4.12.14-150.41.1.x86_64",
"product": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-150.41.1.x86_64",
"product_id": "kernel-vanilla-livepatch-devel-4.12.14-150.41.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-150.41.1.x86_64",
"product": {
"name": "kselftests-kmp-default-4.12.14-150.41.1.x86_64",
"product_id": "kselftests-kmp-default-4.12.14-150.41.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-150.41.1.x86_64",
"product": {
"name": "ocfs2-kmp-default-4.12.14-150.41.1.x86_64",
"product_id": "ocfs2-kmp-default-4.12.14-150.41.1.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-4.12.14-150.41.1.x86_64",
"product": {
"name": "reiserfs-kmp-default-4.12.14-150.41.1.x86_64",
"product_id": "reiserfs-kmp-default-4.12.14-150.41.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Basesystem 15",
"product": {
"name": "SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-basesystem:15"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Development Tools 15",
"product": {
"name": "SUSE Linux Enterprise Module for Development Tools 15",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-development-tools:15"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Legacy 15",
"product": {
"name": "SUSE Linux Enterprise Module for Legacy 15",
"product_id": "SUSE Linux Enterprise Module for Legacy 15",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-legacy:15"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Availability Extension 15",
"product": {
"name": "SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-ha:15"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Workstation Extension 15",
"product": {
"name": "SUSE Linux Enterprise Workstation Extension 15",
"product_id": "SUSE Linux Enterprise Workstation Extension 15",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-we:15"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150.41.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.aarch64"
},
"product_reference": "kernel-default-4.12.14-150.41.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150.41.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.ppc64le"
},
"product_reference": "kernel-default-4.12.14-150.41.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150.41.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.s390x"
},
"product_reference": "kernel-default-4.12.14-150.41.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150.41.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-150.41.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150.41.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.aarch64"
},
"product_reference": "kernel-default-base-4.12.14-150.41.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150.41.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.ppc64le"
},
"product_reference": "kernel-default-base-4.12.14-150.41.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150.41.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.s390x"
},
"product_reference": "kernel-default-base-4.12.14-150.41.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150.41.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-150.41.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150.41.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.aarch64"
},
"product_reference": "kernel-default-devel-4.12.14-150.41.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150.41.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.ppc64le"
},
"product_reference": "kernel-default-devel-4.12.14-150.41.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150.41.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.s390x"
},
"product_reference": "kernel-default-devel-4.12.14-150.41.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150.41.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-150.41.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-4.12.14-150.41.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.41.1.s390x"
},
"product_reference": "kernel-default-man-4.12.14-150.41.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-150.41.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.41.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-150.41.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-150.41.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.41.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-150.41.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-4.12.14-150.41.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.41.1.s390x"
},
"product_reference": "kernel-zfcpdump-4.12.14-150.41.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.12.14-150.41.1.noarch as component of SUSE Linux Enterprise Module for Development Tools 15",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.41.1.noarch"
},
"product_reference": "kernel-docs-4.12.14-150.41.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150.41.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.aarch64"
},
"product_reference": "kernel-obs-build-4.12.14-150.41.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150.41.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.ppc64le"
},
"product_reference": "kernel-obs-build-4.12.14-150.41.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150.41.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.s390x"
},
"product_reference": "kernel-obs-build-4.12.14-150.41.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150.41.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.x86_64"
},
"product_reference": "kernel-obs-build-4.12.14-150.41.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-150.41.1.noarch as component of SUSE Linux Enterprise Module for Development Tools 15",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.41.1.noarch"
},
"product_reference": "kernel-source-4.12.14-150.41.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150.41.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.aarch64"
},
"product_reference": "kernel-syms-4.12.14-150.41.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150.41.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.ppc64le"
},
"product_reference": "kernel-syms-4.12.14-150.41.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150.41.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.s390x"
},
"product_reference": "kernel-syms-4.12.14-150.41.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150.41.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-150.41.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-150.41.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.aarch64"
},
"product_reference": "kernel-vanilla-base-4.12.14-150.41.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-150.41.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.ppc64le"
},
"product_reference": "kernel-vanilla-base-4.12.14-150.41.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-150.41.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.s390x"
},
"product_reference": "kernel-vanilla-base-4.12.14-150.41.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-150.41.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.x86_64"
},
"product_reference": "kernel-vanilla-base-4.12.14-150.41.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-150.41.1.aarch64 as component of SUSE Linux Enterprise Module for Legacy 15",
"product_id": "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.aarch64"
},
"product_reference": "reiserfs-kmp-default-4.12.14-150.41.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-150.41.1.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15",
"product_id": "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.ppc64le"
},
"product_reference": "reiserfs-kmp-default-4.12.14-150.41.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-150.41.1.s390x as component of SUSE Linux Enterprise Module for Legacy 15",
"product_id": "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.s390x"
},
"product_reference": "reiserfs-kmp-default-4.12.14-150.41.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-150.41.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15",
"product_id": "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.x86_64"
},
"product_reference": "reiserfs-kmp-default-4.12.14-150.41.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-4.12.14-150.41.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.41.1.ppc64le"
},
"product_reference": "kernel-default-livepatch-4.12.14-150.41.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-4.12.14-150.41.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.41.1.x86_64"
},
"product_reference": "kernel-default-livepatch-4.12.14-150.41.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_41-default-1-1.3.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-1-1.3.1.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150_41-default-1-1.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150_41-default-1-1.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-1-1.3.1.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150_41-default-1-1.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-150.41.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.aarch64"
},
"product_reference": "cluster-md-kmp-default-4.12.14-150.41.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-150.41.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.ppc64le"
},
"product_reference": "cluster-md-kmp-default-4.12.14-150.41.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-150.41.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.s390x"
},
"product_reference": "cluster-md-kmp-default-4.12.14-150.41.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-150.41.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.x86_64"
},
"product_reference": "cluster-md-kmp-default-4.12.14-150.41.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-150.41.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.aarch64"
},
"product_reference": "dlm-kmp-default-4.12.14-150.41.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-150.41.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.ppc64le"
},
"product_reference": "dlm-kmp-default-4.12.14-150.41.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-150.41.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.s390x"
},
"product_reference": "dlm-kmp-default-4.12.14-150.41.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-150.41.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.x86_64"
},
"product_reference": "dlm-kmp-default-4.12.14-150.41.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-150.41.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.aarch64"
},
"product_reference": "gfs2-kmp-default-4.12.14-150.41.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-150.41.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.ppc64le"
},
"product_reference": "gfs2-kmp-default-4.12.14-150.41.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-150.41.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.s390x"
},
"product_reference": "gfs2-kmp-default-4.12.14-150.41.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-150.41.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.x86_64"
},
"product_reference": "gfs2-kmp-default-4.12.14-150.41.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-150.41.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.aarch64"
},
"product_reference": "ocfs2-kmp-default-4.12.14-150.41.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-150.41.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.ppc64le"
},
"product_reference": "ocfs2-kmp-default-4.12.14-150.41.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-150.41.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.s390x"
},
"product_reference": "ocfs2-kmp-default-4.12.14-150.41.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-150.41.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.x86_64"
},
"product_reference": "ocfs2-kmp-default-4.12.14-150.41.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-4.12.14-150.41.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15",
"product_id": "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.41.1.x86_64"
},
"product_reference": "kernel-default-extra-4.12.14-150.41.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 15"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-12207",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-12207"
}
],
"notes": [
{
"category": "general",
"text": "Improper invalidation for page table updates by a virtual guest operating system for multiple Intel(R) Processors may allow an authenticated user to potentially enable denial of service of the host system via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.41.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.41.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.41.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.41.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.41.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-12207",
"url": "https://www.suse.com/security/cve/CVE-2018-12207"
},
{
"category": "external",
"summary": "SUSE Bug 1117665 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1117665"
},
{
"category": "external",
"summary": "SUSE Bug 1139073 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1139073"
},
{
"category": "external",
"summary": "SUSE Bug 1152505 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1152505"
},
{
"category": "external",
"summary": "SUSE Bug 1155812 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1155812"
},
{
"category": "external",
"summary": "SUSE Bug 1155817 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1155817"
},
{
"category": "external",
"summary": "SUSE Bug 1155945 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1155945"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1201877"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.41.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.41.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.41.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.41.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.41.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.41.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.41.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.41.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.41.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.41.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-28T19:49:52Z",
"details": "moderate"
}
],
"title": "CVE-2018-12207"
},
{
"cve": "CVE-2019-0154",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-0154"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient access control in subsystem for Intel (R) processor graphics in 6th, 7th, 8th and 9th Generation Intel(R) Core(TM) Processor Families; Intel(R) Pentium(R) Processor J, N, Silver and Gold Series; Intel(R) Celeron(R) Processor J, N, G3900 and G4900 Series; Intel(R) Atom(R) Processor A and E3900 Series; Intel(R) Xeon(R) Processor E3-1500 v5 and v6 and E-2100 Processor Families may allow an authenticated user to potentially enable denial of service via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.41.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.41.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.41.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.41.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.41.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-0154",
"url": "https://www.suse.com/security/cve/CVE-2019-0154"
},
{
"category": "external",
"summary": "SUSE Bug 1135966 for CVE-2019-0154",
"url": "https://bugzilla.suse.com/1135966"
},
{
"category": "external",
"summary": "SUSE Bug 1181720 for CVE-2019-0154",
"url": "https://bugzilla.suse.com/1181720"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.41.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.41.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.41.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.41.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.41.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.41.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.41.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.41.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.41.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.41.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-28T19:49:52Z",
"details": "important"
}
],
"title": "CVE-2019-0154"
},
{
"cve": "CVE-2019-0155",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-0155"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient access control in a subsystem for Intel (R) processor graphics in 6th, 7th, 8th and 9th Generation Intel(R) Core(TM) Processor Families; Intel(R) Pentium(R) Processor J, N, Silver and Gold Series; Intel(R) Celeron(R) Processor J, N, G3900 and G4900 Series; Intel(R) Atom(R) Processor A and E3900 Series; Intel(R) Xeon(R) Processor E3-1500 v5 and v6, E-2100 and E-2200 Processor Families; Intel(R) Graphics Driver for Windows before 26.20.100.6813 (DCH) or 26.20.100.6812 and before 21.20.x.5077 (aka15.45.5077), i915 Linux Driver for Intel(R) Processor Graphics before versions 5.4-rc7, 5.3.11, 4.19.84, 4.14.154, 4.9.201, 4.4.201 may allow an authenticated user to potentially enable escalation of privilege via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.41.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.41.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.41.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.41.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.41.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-0155",
"url": "https://www.suse.com/security/cve/CVE-2019-0155"
},
{
"category": "external",
"summary": "SUSE Bug 1135966 for CVE-2019-0155",
"url": "https://bugzilla.suse.com/1135966"
},
{
"category": "external",
"summary": "SUSE Bug 1135967 for CVE-2019-0155",
"url": "https://bugzilla.suse.com/1135967"
},
{
"category": "external",
"summary": "SUSE Bug 1173663 for CVE-2019-0155",
"url": "https://bugzilla.suse.com/1173663"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.41.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.41.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.41.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.41.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.41.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.41.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.41.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.41.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.41.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.41.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-28T19:49:52Z",
"details": "important"
}
],
"title": "CVE-2019-0155"
},
{
"cve": "CVE-2019-10220",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-10220"
}
],
"notes": [
{
"category": "general",
"text": "Linux kernel CIFS implementation, version 4.9.0 is vulnerable to a relative paths injection in directory entry lists.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.41.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.41.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.41.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.41.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.41.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-10220",
"url": "https://www.suse.com/security/cve/CVE-2019-10220"
},
{
"category": "external",
"summary": "SUSE Bug 1144903 for CVE-2019-10220",
"url": "https://bugzilla.suse.com/1144903"
},
{
"category": "external",
"summary": "SUSE Bug 1153108 for CVE-2019-10220",
"url": "https://bugzilla.suse.com/1153108"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.41.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.41.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.41.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.41.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.41.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.41.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.41.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.41.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.41.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.41.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-28T19:49:52Z",
"details": "important"
}
],
"title": "CVE-2019-10220"
},
{
"cve": "CVE-2019-11135",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11135"
}
],
"notes": [
{
"category": "general",
"text": "TSX Asynchronous Abort condition on some CPUs utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.41.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.41.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.41.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.41.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.41.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11135",
"url": "https://www.suse.com/security/cve/CVE-2019-11135"
},
{
"category": "external",
"summary": "SUSE Bug 1139073 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1139073"
},
{
"category": "external",
"summary": "SUSE Bug 1152497 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1152497"
},
{
"category": "external",
"summary": "SUSE Bug 1152505 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1152505"
},
{
"category": "external",
"summary": "SUSE Bug 1152506 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1152506"
},
{
"category": "external",
"summary": "SUSE Bug 1160120 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1160120"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1201877"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.41.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.41.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.41.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.41.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.41.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.41.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.41.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.41.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.41.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.41.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-28T19:49:52Z",
"details": "moderate"
}
],
"title": "CVE-2019-11135"
},
{
"cve": "CVE-2019-16232",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-16232"
}
],
"notes": [
{
"category": "general",
"text": "drivers/net/wireless/marvell/libertas/if_sdio.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.41.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.41.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.41.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.41.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.41.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-16232",
"url": "https://www.suse.com/security/cve/CVE-2019-16232"
},
{
"category": "external",
"summary": "SUSE Bug 1150465 for CVE-2019-16232",
"url": "https://bugzilla.suse.com/1150465"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.41.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.41.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.41.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.41.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.41.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.41.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.41.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.41.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.41.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.41.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-28T19:49:52Z",
"details": "low"
}
],
"title": "CVE-2019-16232"
},
{
"cve": "CVE-2019-16233",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-16233"
}
],
"notes": [
{
"category": "general",
"text": "drivers/scsi/qla2xxx/qla_os.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.41.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.41.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.41.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.41.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.41.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-16233",
"url": "https://www.suse.com/security/cve/CVE-2019-16233"
},
{
"category": "external",
"summary": "SUSE Bug 1150457 for CVE-2019-16233",
"url": "https://bugzilla.suse.com/1150457"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.41.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.41.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.41.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.41.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.41.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.41.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.41.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.41.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.41.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.41.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-28T19:49:52Z",
"details": "low"
}
],
"title": "CVE-2019-16233"
},
{
"cve": "CVE-2019-16234",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-16234"
}
],
"notes": [
{
"category": "general",
"text": "drivers/net/wireless/intel/iwlwifi/pcie/trans.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.41.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.41.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.41.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.41.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.41.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-16234",
"url": "https://www.suse.com/security/cve/CVE-2019-16234"
},
{
"category": "external",
"summary": "SUSE Bug 1150452 for CVE-2019-16234",
"url": "https://bugzilla.suse.com/1150452"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.41.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.41.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.41.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.41.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.41.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.41.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.41.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.41.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.41.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.41.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-28T19:49:52Z",
"details": "low"
}
],
"title": "CVE-2019-16234"
},
{
"cve": "CVE-2019-16995",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-16995"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel before 5.0.3, a memory leak exits in hsr_dev_finalize() in net/hsr/hsr_device.c if hsr_add_port fails to add a port, which may cause denial of service, aka CID-6caabe7f197d.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.41.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.41.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.41.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.41.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.41.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-16995",
"url": "https://www.suse.com/security/cve/CVE-2019-16995"
},
{
"category": "external",
"summary": "SUSE Bug 1152685 for CVE-2019-16995",
"url": "https://bugzilla.suse.com/1152685"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.41.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.41.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.41.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.41.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.41.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.41.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.41.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.41.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.41.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.41.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-28T19:49:52Z",
"details": "moderate"
}
],
"title": "CVE-2019-16995"
},
{
"cve": "CVE-2019-17056",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-17056"
}
],
"notes": [
{
"category": "general",
"text": "llcp_sock_create in net/nfc/llcp_sock.c in the AF_NFC network module in the Linux kernel through 5.3.2 does not enforce CAP_NET_RAW, which means that unprivileged users can create a raw socket, aka CID-3a359798b176.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.41.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.41.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.41.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.41.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.41.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-17056",
"url": "https://www.suse.com/security/cve/CVE-2019-17056"
},
{
"category": "external",
"summary": "SUSE Bug 1152788 for CVE-2019-17056",
"url": "https://bugzilla.suse.com/1152788"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.41.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.41.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.41.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.41.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.41.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.41.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.41.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.41.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.41.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.41.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-28T19:49:52Z",
"details": "moderate"
}
],
"title": "CVE-2019-17056"
},
{
"cve": "CVE-2019-17133",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-17133"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel through 5.3.2, cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c does not reject a long SSID IE, leading to a Buffer Overflow.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.41.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.41.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.41.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.41.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.41.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-17133",
"url": "https://www.suse.com/security/cve/CVE-2019-17133"
},
{
"category": "external",
"summary": "SUSE Bug 1153158 for CVE-2019-17133",
"url": "https://bugzilla.suse.com/1153158"
},
{
"category": "external",
"summary": "SUSE Bug 1153161 for CVE-2019-17133",
"url": "https://bugzilla.suse.com/1153161"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.41.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.41.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.41.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.41.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.41.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.41.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.41.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.41.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.41.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.41.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-28T19:49:52Z",
"details": "important"
}
],
"title": "CVE-2019-17133"
},
{
"cve": "CVE-2019-17666",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-17666"
}
],
"notes": [
{
"category": "general",
"text": "rtl_p2p_noa_ie in drivers/net/wireless/realtek/rtlwifi/ps.c in the Linux kernel through 5.3.6 lacks a certain upper-bound check, leading to a buffer overflow.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.41.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.41.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.41.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.41.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.41.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-17666",
"url": "https://www.suse.com/security/cve/CVE-2019-17666"
},
{
"category": "external",
"summary": "SUSE Bug 1154372 for CVE-2019-17666",
"url": "https://bugzilla.suse.com/1154372"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.41.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.41.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.41.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.41.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.41.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-1-1.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_41-default-1-1.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.41.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.41.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.41.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.41.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.41.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.41.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-28T19:49:52Z",
"details": "moderate"
}
],
"title": "CVE-2019-17666"
}
]
}
suse-su-2019:3348-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for spectre-meltdown-checker",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for spectre-meltdown-checker fixes the following issues:\n\n - feat: implement TAA detection (CVE-2019-11135 bsc#1139073)\n - feat: implement MCEPSC / iTLB Multihit detection (CVE-2018-12207 bsc#1117665)\n - feat: taa: add TSX_CTRL MSR detection in hardware info\n - feat: fwdb: use both Intel GitHub repo and MCEdb to build our firmware version database\n - feat: use --live with --kernel/--config/--map to override file detection in live mode\n - enh: rework the vuln logic of MDS with --paranoid (fixes #307)\n - enh: explain that Enhanced IBRS is better for performance than classic IBRS\n - enh: kernel: autodetect customized arch kernels from cmdline\n - enh: kernel decompression: better tolerance against missing tools\n - enh: mock: implement reading from /proc/cmdline\n - fix: variant3a: Silvermont CPUs are not vulnerable to variant 3a\n - fix: lockdown: detect Red Hat locked down kernels (impacts MSR writes)\n - fix: lockdown: detect locked down mode in vanilla 5.4+ kernels\n - fix: sgx: on locked down kernels, fallback to CPUID bit for detection\n - fix: fwdb: builtin version takes precedence if the local cached version is older\n - fix: pteinv: don\u0027t check kernel image if not available\n - fix: silence useless error from grep (fixes #322)\n - fix: msr: fix msr module detection under Ubuntu 19.10 (fixes #316)\n - fix: mocking value for read_msr\n - chore: rename mcedb cmdline parameters to fwdb, and change db version scheme\n - chore: fwdb: update to v130.20191104+i20191027\n - chore: add GitHub check workflow\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2019-3348,SUSE-SLE-Module-Basesystem-15-SP1-2019-3348",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_3348-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2019:3348-1",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20193348-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2019:3348-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2019-December/006275.html"
},
{
"category": "self",
"summary": "SUSE Bug 1117665",
"url": "https://bugzilla.suse.com/1117665"
},
{
"category": "self",
"summary": "SUSE Bug 1139073",
"url": "https://bugzilla.suse.com/1139073"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-12207 page",
"url": "https://www.suse.com/security/cve/CVE-2018-12207/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11135 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11135/"
}
],
"title": "Security update for spectre-meltdown-checker",
"tracking": {
"current_release_date": "2019-12-19T15:13:05Z",
"generator": {
"date": "2019-12-19T15:13:05Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2019:3348-1",
"initial_release_date": "2019-12-19T15:13:05Z",
"revision_history": [
{
"date": "2019-12-19T15:13:05Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "spectre-meltdown-checker-0.43-3.3.1.i586",
"product": {
"name": "spectre-meltdown-checker-0.43-3.3.1.i586",
"product_id": "spectre-meltdown-checker-0.43-3.3.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "spectre-meltdown-checker-0.43-3.3.1.x86_64",
"product": {
"name": "spectre-meltdown-checker-0.43-3.3.1.x86_64",
"product_id": "spectre-meltdown-checker-0.43-3.3.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product": {
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-basesystem:15:sp1"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "spectre-meltdown-checker-0.43-3.3.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:spectre-meltdown-checker-0.43-3.3.1.x86_64"
},
"product_reference": "spectre-meltdown-checker-0.43-3.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-12207",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-12207"
}
],
"notes": [
{
"category": "general",
"text": "Improper invalidation for page table updates by a virtual guest operating system for multiple Intel(R) Processors may allow an authenticated user to potentially enable denial of service of the host system via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:spectre-meltdown-checker-0.43-3.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-12207",
"url": "https://www.suse.com/security/cve/CVE-2018-12207"
},
{
"category": "external",
"summary": "SUSE Bug 1117665 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1117665"
},
{
"category": "external",
"summary": "SUSE Bug 1139073 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1139073"
},
{
"category": "external",
"summary": "SUSE Bug 1152505 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1152505"
},
{
"category": "external",
"summary": "SUSE Bug 1155812 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1155812"
},
{
"category": "external",
"summary": "SUSE Bug 1155817 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1155817"
},
{
"category": "external",
"summary": "SUSE Bug 1155945 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1155945"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1201877"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:spectre-meltdown-checker-0.43-3.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:spectre-meltdown-checker-0.43-3.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-12-19T15:13:05Z",
"details": "moderate"
}
],
"title": "CVE-2018-12207"
},
{
"cve": "CVE-2019-11135",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11135"
}
],
"notes": [
{
"category": "general",
"text": "TSX Asynchronous Abort condition on some CPUs utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:spectre-meltdown-checker-0.43-3.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11135",
"url": "https://www.suse.com/security/cve/CVE-2019-11135"
},
{
"category": "external",
"summary": "SUSE Bug 1139073 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1139073"
},
{
"category": "external",
"summary": "SUSE Bug 1152497 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1152497"
},
{
"category": "external",
"summary": "SUSE Bug 1152505 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1152505"
},
{
"category": "external",
"summary": "SUSE Bug 1152506 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1152506"
},
{
"category": "external",
"summary": "SUSE Bug 1160120 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1160120"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1201877"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:spectre-meltdown-checker-0.43-3.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:spectre-meltdown-checker-0.43-3.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-12-19T15:13:05Z",
"details": "moderate"
}
],
"title": "CVE-2019-11135"
}
]
}
suse-su-2019:3297-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for xen",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for xen fixes the following issues:\n\n- CVE-2019-19581: Fixed a potential out of bounds on 32-bit Arm (bsc#1158003 XSA-307).\n- CVE-2019-19582: Fixed a potential infinite loop when x86 accesses to bitmaps with \n a compile time known size of 64 (bsc#1158003 XSA-307).\n- CVE-2019-19583: Fixed improper checks which could have allowed HVM/PVH guest userspace \n code to crash the guest,leading to a guest denial of service (bsc#1158004 XSA-308).\n- CVE-2019-19578: Fixed an issue where a malicious or buggy PV guest could have caused\n hypervisor crash resulting in denial of service affecting the entire host (bsc#1158005 XSA-309).\n- CVE-2019-19580: Fixed a privilege escalation where a malicious PV guest administrator \n could have been able to escalate their privilege to that of the host (bsc#1158006 XSA-310).\n- CVE-2019-19577: Fixed an issue where a malicious guest administrator could have caused Xen \n to access data structures while they are being modified leading to a crash (bsc#1158007 XSA-311). \n- CVE-2019-19579: Fixed a privilege escaltion where an untrusted domain with access \n to a physical device can DMA into host memory (bsc#1157888 XSA-306).\n- CVE-2019-18420: Malicious x86 PV guests may have caused a hypervisor crash, \n resulting in a denial of service (bsc#1154448 XSA-296)\n- CVE-2019-18425: 32-bit PV guest user mode could elevate its privileges to that \n of the guest kernel. (bsc#1154456 XSA-298).\n- CVE-2019-18421: A malicious PV guest administrator may have been able to\n escalate their privilege to that of the host. (bsc#1154458 XSA-299).\n- CVE-2019-18423: A malicious guest administrator may cause a hypervisor crash,\n resulting in a denial of service (bsc#1154460 XSA-301).\n- CVE-2019-18422: A malicious ARM guest might contrive to arrange for critical \n Xen code to run with interrupts erroneously enabled. This could lead to data\n corruption, denial of service, or possibly even privilege escalation. However\n a precise attack technique has not been identified. (bsc#1154464 XSA-303)\n- CVE-2019-18424: An untrusted domain with access to a physical device can DMA \n into host memory, leading to privilege escalation. (bsc#1154461 XSA-302). \n- CVE-2018-12207: Untrusted virtual machines on Intel CPUs could exploit a race\n condition in the Instruction Fetch Unit of the Intel CPU to cause a Machine\n Exception during Page Size Change, causing the CPU core to be non-functional.\n (bsc#1155945 XSA-304) \n- CVE-2019-11135: Aborting an asynchronous TSX operation on Intel CPUs with\n Transactional Memory support could be used to facilitate sidechannel\n information leaks out of microarchitectural buffers, similar to the\n previously described \u0027Microarchitectural Data Sampling\u0027 attack. (bsc#1152497 XSA-305). \n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "HPE-Helion-OpenStack-8-2019-3297,SUSE-2019-3297,SUSE-OpenStack-Cloud-8-2019-3297,SUSE-OpenStack-Cloud-Crowbar-8-2019-3297,SUSE-SLE-SAP-12-SP3-2019-3297,SUSE-SLE-SERVER-12-SP3-2019-3297,SUSE-SLE-SERVER-12-SP3-BCL-2019-3297,SUSE-Storage-5-2019-3297",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_3297-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2019:3297-1",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20193297-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2019:3297-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2019-December/006253.html"
},
{
"category": "self",
"summary": "SUSE Bug 1152497",
"url": "https://bugzilla.suse.com/1152497"
},
{
"category": "self",
"summary": "SUSE Bug 1154448",
"url": "https://bugzilla.suse.com/1154448"
},
{
"category": "self",
"summary": "SUSE Bug 1154456",
"url": "https://bugzilla.suse.com/1154456"
},
{
"category": "self",
"summary": "SUSE Bug 1154458",
"url": "https://bugzilla.suse.com/1154458"
},
{
"category": "self",
"summary": "SUSE Bug 1154460",
"url": "https://bugzilla.suse.com/1154460"
},
{
"category": "self",
"summary": "SUSE Bug 1154461",
"url": "https://bugzilla.suse.com/1154461"
},
{
"category": "self",
"summary": "SUSE Bug 1154464",
"url": "https://bugzilla.suse.com/1154464"
},
{
"category": "self",
"summary": "SUSE Bug 1155945",
"url": "https://bugzilla.suse.com/1155945"
},
{
"category": "self",
"summary": "SUSE Bug 1157888",
"url": "https://bugzilla.suse.com/1157888"
},
{
"category": "self",
"summary": "SUSE Bug 1158003",
"url": "https://bugzilla.suse.com/1158003"
},
{
"category": "self",
"summary": "SUSE Bug 1158004",
"url": "https://bugzilla.suse.com/1158004"
},
{
"category": "self",
"summary": "SUSE Bug 1158005",
"url": "https://bugzilla.suse.com/1158005"
},
{
"category": "self",
"summary": "SUSE Bug 1158006",
"url": "https://bugzilla.suse.com/1158006"
},
{
"category": "self",
"summary": "SUSE Bug 1158007",
"url": "https://bugzilla.suse.com/1158007"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-12207 page",
"url": "https://www.suse.com/security/cve/CVE-2018-12207/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11135 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11135/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-18420 page",
"url": "https://www.suse.com/security/cve/CVE-2019-18420/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-18421 page",
"url": "https://www.suse.com/security/cve/CVE-2019-18421/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-18422 page",
"url": "https://www.suse.com/security/cve/CVE-2019-18422/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-18423 page",
"url": "https://www.suse.com/security/cve/CVE-2019-18423/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-18424 page",
"url": "https://www.suse.com/security/cve/CVE-2019-18424/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-18425 page",
"url": "https://www.suse.com/security/cve/CVE-2019-18425/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-19577 page",
"url": "https://www.suse.com/security/cve/CVE-2019-19577/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-19578 page",
"url": "https://www.suse.com/security/cve/CVE-2019-19578/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-19579 page",
"url": "https://www.suse.com/security/cve/CVE-2019-19579/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-19580 page",
"url": "https://www.suse.com/security/cve/CVE-2019-19580/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-19581 page",
"url": "https://www.suse.com/security/cve/CVE-2019-19581/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-19582 page",
"url": "https://www.suse.com/security/cve/CVE-2019-19582/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-19583 page",
"url": "https://www.suse.com/security/cve/CVE-2019-19583/"
}
],
"title": "Security update for xen",
"tracking": {
"current_release_date": "2019-12-13T17:31:37Z",
"generator": {
"date": "2019-12-13T17:31:37Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2019:3297-1",
"initial_release_date": "2019-12-13T17:31:37Z",
"revision_history": [
{
"date": "2019-12-13T17:31:37Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "xen-4.9.4_06-3.59.1.aarch64",
"product": {
"name": "xen-4.9.4_06-3.59.1.aarch64",
"product_id": "xen-4.9.4_06-3.59.1.aarch64"
}
},
{
"category": "product_version",
"name": "xen-devel-4.9.4_06-3.59.1.aarch64",
"product": {
"name": "xen-devel-4.9.4_06-3.59.1.aarch64",
"product_id": "xen-devel-4.9.4_06-3.59.1.aarch64"
}
},
{
"category": "product_version",
"name": "xen-doc-html-4.9.4_06-3.59.1.aarch64",
"product": {
"name": "xen-doc-html-4.9.4_06-3.59.1.aarch64",
"product_id": "xen-doc-html-4.9.4_06-3.59.1.aarch64"
}
},
{
"category": "product_version",
"name": "xen-libs-4.9.4_06-3.59.1.aarch64",
"product": {
"name": "xen-libs-4.9.4_06-3.59.1.aarch64",
"product_id": "xen-libs-4.9.4_06-3.59.1.aarch64"
}
},
{
"category": "product_version",
"name": "xen-tools-4.9.4_06-3.59.1.aarch64",
"product": {
"name": "xen-tools-4.9.4_06-3.59.1.aarch64",
"product_id": "xen-tools-4.9.4_06-3.59.1.aarch64"
}
},
{
"category": "product_version",
"name": "xen-tools-domU-4.9.4_06-3.59.1.aarch64",
"product": {
"name": "xen-tools-domU-4.9.4_06-3.59.1.aarch64",
"product_id": "xen-tools-domU-4.9.4_06-3.59.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "xen-libs-64bit-4.9.4_06-3.59.1.aarch64_ilp32",
"product": {
"name": "xen-libs-64bit-4.9.4_06-3.59.1.aarch64_ilp32",
"product_id": "xen-libs-64bit-4.9.4_06-3.59.1.aarch64_ilp32"
}
}
],
"category": "architecture",
"name": "aarch64_ilp32"
},
{
"branches": [
{
"category": "product_version",
"name": "xen-devel-4.9.4_06-3.59.1.i586",
"product": {
"name": "xen-devel-4.9.4_06-3.59.1.i586",
"product_id": "xen-devel-4.9.4_06-3.59.1.i586"
}
},
{
"category": "product_version",
"name": "xen-libs-4.9.4_06-3.59.1.i586",
"product": {
"name": "xen-libs-4.9.4_06-3.59.1.i586",
"product_id": "xen-libs-4.9.4_06-3.59.1.i586"
}
},
{
"category": "product_version",
"name": "xen-tools-domU-4.9.4_06-3.59.1.i586",
"product": {
"name": "xen-tools-domU-4.9.4_06-3.59.1.i586",
"product_id": "xen-tools-domU-4.9.4_06-3.59.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "xen-4.9.4_06-3.59.1.x86_64",
"product": {
"name": "xen-4.9.4_06-3.59.1.x86_64",
"product_id": "xen-4.9.4_06-3.59.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-doc-html-4.9.4_06-3.59.1.x86_64",
"product": {
"name": "xen-doc-html-4.9.4_06-3.59.1.x86_64",
"product_id": "xen-doc-html-4.9.4_06-3.59.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-libs-4.9.4_06-3.59.1.x86_64",
"product": {
"name": "xen-libs-4.9.4_06-3.59.1.x86_64",
"product_id": "xen-libs-4.9.4_06-3.59.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"product": {
"name": "xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"product_id": "xen-libs-32bit-4.9.4_06-3.59.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-tools-4.9.4_06-3.59.1.x86_64",
"product": {
"name": "xen-tools-4.9.4_06-3.59.1.x86_64",
"product_id": "xen-tools-4.9.4_06-3.59.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"product": {
"name": "xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"product_id": "xen-tools-domU-4.9.4_06-3.59.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-devel-4.9.4_06-3.59.1.x86_64",
"product": {
"name": "xen-devel-4.9.4_06-3.59.1.x86_64",
"product_id": "xen-devel-4.9.4_06-3.59.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "HPE Helion OpenStack 8",
"product": {
"name": "HPE Helion OpenStack 8",
"product_id": "HPE Helion OpenStack 8",
"product_identification_helper": {
"cpe": "cpe:/o:suse:hpe-helion-openstack:8"
}
}
},
{
"category": "product_name",
"name": "SUSE OpenStack Cloud 8",
"product": {
"name": "SUSE OpenStack Cloud 8",
"product_id": "SUSE OpenStack Cloud 8",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-openstack-cloud:8"
}
}
},
{
"category": "product_name",
"name": "SUSE OpenStack Cloud Crowbar 8",
"product": {
"name": "SUSE OpenStack Cloud Crowbar 8",
"product_id": "SUSE OpenStack Cloud Crowbar 8",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-openstack-cloud-crowbar:8"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP3-BCL",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP3-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP3-BCL",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-bcl:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Enterprise Storage 5",
"product": {
"name": "SUSE Enterprise Storage 5",
"product_id": "SUSE Enterprise Storage 5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:ses:5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-4.9.4_06-3.59.1.x86_64 as component of HPE Helion OpenStack 8",
"product_id": "HPE Helion OpenStack 8:xen-4.9.4_06-3.59.1.x86_64"
},
"product_reference": "xen-4.9.4_06-3.59.1.x86_64",
"relates_to_product_reference": "HPE Helion OpenStack 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-doc-html-4.9.4_06-3.59.1.x86_64 as component of HPE Helion OpenStack 8",
"product_id": "HPE Helion OpenStack 8:xen-doc-html-4.9.4_06-3.59.1.x86_64"
},
"product_reference": "xen-doc-html-4.9.4_06-3.59.1.x86_64",
"relates_to_product_reference": "HPE Helion OpenStack 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.9.4_06-3.59.1.x86_64 as component of HPE Helion OpenStack 8",
"product_id": "HPE Helion OpenStack 8:xen-libs-4.9.4_06-3.59.1.x86_64"
},
"product_reference": "xen-libs-4.9.4_06-3.59.1.x86_64",
"relates_to_product_reference": "HPE Helion OpenStack 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-32bit-4.9.4_06-3.59.1.x86_64 as component of HPE Helion OpenStack 8",
"product_id": "HPE Helion OpenStack 8:xen-libs-32bit-4.9.4_06-3.59.1.x86_64"
},
"product_reference": "xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"relates_to_product_reference": "HPE Helion OpenStack 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-4.9.4_06-3.59.1.x86_64 as component of HPE Helion OpenStack 8",
"product_id": "HPE Helion OpenStack 8:xen-tools-4.9.4_06-3.59.1.x86_64"
},
"product_reference": "xen-tools-4.9.4_06-3.59.1.x86_64",
"relates_to_product_reference": "HPE Helion OpenStack 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-domU-4.9.4_06-3.59.1.x86_64 as component of HPE Helion OpenStack 8",
"product_id": "HPE Helion OpenStack 8:xen-tools-domU-4.9.4_06-3.59.1.x86_64"
},
"product_reference": "xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"relates_to_product_reference": "HPE Helion OpenStack 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-4.9.4_06-3.59.1.x86_64 as component of SUSE OpenStack Cloud 8",
"product_id": "SUSE OpenStack Cloud 8:xen-4.9.4_06-3.59.1.x86_64"
},
"product_reference": "xen-4.9.4_06-3.59.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-doc-html-4.9.4_06-3.59.1.x86_64 as component of SUSE OpenStack Cloud 8",
"product_id": "SUSE OpenStack Cloud 8:xen-doc-html-4.9.4_06-3.59.1.x86_64"
},
"product_reference": "xen-doc-html-4.9.4_06-3.59.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.9.4_06-3.59.1.x86_64 as component of SUSE OpenStack Cloud 8",
"product_id": "SUSE OpenStack Cloud 8:xen-libs-4.9.4_06-3.59.1.x86_64"
},
"product_reference": "xen-libs-4.9.4_06-3.59.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-32bit-4.9.4_06-3.59.1.x86_64 as component of SUSE OpenStack Cloud 8",
"product_id": "SUSE OpenStack Cloud 8:xen-libs-32bit-4.9.4_06-3.59.1.x86_64"
},
"product_reference": "xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-4.9.4_06-3.59.1.x86_64 as component of SUSE OpenStack Cloud 8",
"product_id": "SUSE OpenStack Cloud 8:xen-tools-4.9.4_06-3.59.1.x86_64"
},
"product_reference": "xen-tools-4.9.4_06-3.59.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-domU-4.9.4_06-3.59.1.x86_64 as component of SUSE OpenStack Cloud 8",
"product_id": "SUSE OpenStack Cloud 8:xen-tools-domU-4.9.4_06-3.59.1.x86_64"
},
"product_reference": "xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-4.9.4_06-3.59.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8",
"product_id": "SUSE OpenStack Cloud Crowbar 8:xen-4.9.4_06-3.59.1.x86_64"
},
"product_reference": "xen-4.9.4_06-3.59.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-doc-html-4.9.4_06-3.59.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8",
"product_id": "SUSE OpenStack Cloud Crowbar 8:xen-doc-html-4.9.4_06-3.59.1.x86_64"
},
"product_reference": "xen-doc-html-4.9.4_06-3.59.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.9.4_06-3.59.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8",
"product_id": "SUSE OpenStack Cloud Crowbar 8:xen-libs-4.9.4_06-3.59.1.x86_64"
},
"product_reference": "xen-libs-4.9.4_06-3.59.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-32bit-4.9.4_06-3.59.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8",
"product_id": "SUSE OpenStack Cloud Crowbar 8:xen-libs-32bit-4.9.4_06-3.59.1.x86_64"
},
"product_reference": "xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-4.9.4_06-3.59.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8",
"product_id": "SUSE OpenStack Cloud Crowbar 8:xen-tools-4.9.4_06-3.59.1.x86_64"
},
"product_reference": "xen-tools-4.9.4_06-3.59.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-domU-4.9.4_06-3.59.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8",
"product_id": "SUSE OpenStack Cloud Crowbar 8:xen-tools-domU-4.9.4_06-3.59.1.x86_64"
},
"product_reference": "xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-4.9.4_06-3.59.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.4_06-3.59.1.x86_64"
},
"product_reference": "xen-4.9.4_06-3.59.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-doc-html-4.9.4_06-3.59.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.4_06-3.59.1.x86_64"
},
"product_reference": "xen-doc-html-4.9.4_06-3.59.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.9.4_06-3.59.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.4_06-3.59.1.x86_64"
},
"product_reference": "xen-libs-4.9.4_06-3.59.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-32bit-4.9.4_06-3.59.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.4_06-3.59.1.x86_64"
},
"product_reference": "xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-4.9.4_06-3.59.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.4_06-3.59.1.x86_64"
},
"product_reference": "xen-tools-4.9.4_06-3.59.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-domU-4.9.4_06-3.59.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.4_06-3.59.1.x86_64"
},
"product_reference": "xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-4.9.4_06-3.59.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-4.9.4_06-3.59.1.x86_64"
},
"product_reference": "xen-4.9.4_06-3.59.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-doc-html-4.9.4_06-3.59.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-doc-html-4.9.4_06-3.59.1.x86_64"
},
"product_reference": "xen-doc-html-4.9.4_06-3.59.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.9.4_06-3.59.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-4.9.4_06-3.59.1.x86_64"
},
"product_reference": "xen-libs-4.9.4_06-3.59.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-32bit-4.9.4_06-3.59.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-32bit-4.9.4_06-3.59.1.x86_64"
},
"product_reference": "xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-4.9.4_06-3.59.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-4.9.4_06-3.59.1.x86_64"
},
"product_reference": "xen-tools-4.9.4_06-3.59.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-domU-4.9.4_06-3.59.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-domU-4.9.4_06-3.59.1.x86_64"
},
"product_reference": "xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-4.9.4_06-3.59.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:xen-4.9.4_06-3.59.1.x86_64"
},
"product_reference": "xen-4.9.4_06-3.59.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-doc-html-4.9.4_06-3.59.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:xen-doc-html-4.9.4_06-3.59.1.x86_64"
},
"product_reference": "xen-doc-html-4.9.4_06-3.59.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.9.4_06-3.59.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-4.9.4_06-3.59.1.x86_64"
},
"product_reference": "xen-libs-4.9.4_06-3.59.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-32bit-4.9.4_06-3.59.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-32bit-4.9.4_06-3.59.1.x86_64"
},
"product_reference": "xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-4.9.4_06-3.59.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-4.9.4_06-3.59.1.x86_64"
},
"product_reference": "xen-tools-4.9.4_06-3.59.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-domU-4.9.4_06-3.59.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-domU-4.9.4_06-3.59.1.x86_64"
},
"product_reference": "xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-4.9.4_06-3.59.1.x86_64 as component of SUSE Enterprise Storage 5",
"product_id": "SUSE Enterprise Storage 5:xen-4.9.4_06-3.59.1.x86_64"
},
"product_reference": "xen-4.9.4_06-3.59.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-doc-html-4.9.4_06-3.59.1.x86_64 as component of SUSE Enterprise Storage 5",
"product_id": "SUSE Enterprise Storage 5:xen-doc-html-4.9.4_06-3.59.1.x86_64"
},
"product_reference": "xen-doc-html-4.9.4_06-3.59.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.9.4_06-3.59.1.x86_64 as component of SUSE Enterprise Storage 5",
"product_id": "SUSE Enterprise Storage 5:xen-libs-4.9.4_06-3.59.1.x86_64"
},
"product_reference": "xen-libs-4.9.4_06-3.59.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-32bit-4.9.4_06-3.59.1.x86_64 as component of SUSE Enterprise Storage 5",
"product_id": "SUSE Enterprise Storage 5:xen-libs-32bit-4.9.4_06-3.59.1.x86_64"
},
"product_reference": "xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-4.9.4_06-3.59.1.x86_64 as component of SUSE Enterprise Storage 5",
"product_id": "SUSE Enterprise Storage 5:xen-tools-4.9.4_06-3.59.1.x86_64"
},
"product_reference": "xen-tools-4.9.4_06-3.59.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-domU-4.9.4_06-3.59.1.x86_64 as component of SUSE Enterprise Storage 5",
"product_id": "SUSE Enterprise Storage 5:xen-tools-domU-4.9.4_06-3.59.1.x86_64"
},
"product_reference": "xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-12207",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-12207"
}
],
"notes": [
{
"category": "general",
"text": "Improper invalidation for page table updates by a virtual guest operating system for multiple Intel(R) Processors may allow an authenticated user to potentially enable denial of service of the host system via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:xen-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-libs-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-tools-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-tools-domU-4.9.4_06-3.59.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-12207",
"url": "https://www.suse.com/security/cve/CVE-2018-12207"
},
{
"category": "external",
"summary": "SUSE Bug 1117665 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1117665"
},
{
"category": "external",
"summary": "SUSE Bug 1139073 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1139073"
},
{
"category": "external",
"summary": "SUSE Bug 1152505 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1152505"
},
{
"category": "external",
"summary": "SUSE Bug 1155812 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1155812"
},
{
"category": "external",
"summary": "SUSE Bug 1155817 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1155817"
},
{
"category": "external",
"summary": "SUSE Bug 1155945 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1155945"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1201877"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:xen-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-libs-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-tools-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-tools-domU-4.9.4_06-3.59.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"HPE Helion OpenStack 8:xen-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-libs-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-tools-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-tools-domU-4.9.4_06-3.59.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-12-13T17:31:37Z",
"details": "moderate"
}
],
"title": "CVE-2018-12207"
},
{
"cve": "CVE-2019-11135",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11135"
}
],
"notes": [
{
"category": "general",
"text": "TSX Asynchronous Abort condition on some CPUs utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:xen-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-libs-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-tools-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-tools-domU-4.9.4_06-3.59.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11135",
"url": "https://www.suse.com/security/cve/CVE-2019-11135"
},
{
"category": "external",
"summary": "SUSE Bug 1139073 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1139073"
},
{
"category": "external",
"summary": "SUSE Bug 1152497 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1152497"
},
{
"category": "external",
"summary": "SUSE Bug 1152505 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1152505"
},
{
"category": "external",
"summary": "SUSE Bug 1152506 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1152506"
},
{
"category": "external",
"summary": "SUSE Bug 1160120 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1160120"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1201877"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:xen-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-libs-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-tools-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-tools-domU-4.9.4_06-3.59.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"HPE Helion OpenStack 8:xen-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-libs-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-tools-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-tools-domU-4.9.4_06-3.59.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-12-13T17:31:37Z",
"details": "moderate"
}
],
"title": "CVE-2019-11135"
},
{
"cve": "CVE-2019-18420",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-18420"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Xen through 4.12.x allowing x86 PV guest OS users to cause a denial of service via a VCPUOP_initialise hypercall. hypercall_create_continuation() is a variadic function which uses a printf-like format string to interpret its parameters. Error handling for a bad format character was done using BUG(), which crashes Xen. One path, via the VCPUOP_initialise hypercall, has a bad format character. The BUG() can be hit if VCPUOP_initialise executes for a sufficiently long period of time for a continuation to be created. Malicious guests may cause a hypervisor crash, resulting in a Denial of Service (DoS). Xen versions 4.6 and newer are vulnerable. Xen versions 4.5 and earlier are not vulnerable. Only x86 PV guests can exploit the vulnerability. HVM and PVH guests, and guests on ARM systems, cannot exploit the vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:xen-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-libs-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-tools-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-tools-domU-4.9.4_06-3.59.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-18420",
"url": "https://www.suse.com/security/cve/CVE-2019-18420"
},
{
"category": "external",
"summary": "SUSE Bug 1154448 for CVE-2019-18420",
"url": "https://bugzilla.suse.com/1154448"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:xen-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-libs-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-tools-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-tools-domU-4.9.4_06-3.59.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"HPE Helion OpenStack 8:xen-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-libs-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-tools-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-tools-domU-4.9.4_06-3.59.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-12-13T17:31:37Z",
"details": "important"
}
],
"title": "CVE-2019-18420"
},
{
"cve": "CVE-2019-18421",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-18421"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Xen through 4.12.x allowing x86 PV guest OS users to gain host OS privileges by leveraging race conditions in pagetable promotion and demotion operations. There are issues with restartable PV type change operations. To avoid using shadow pagetables for PV guests, Xen exposes the actual hardware pagetables to the guest. In order to prevent the guest from modifying these page tables directly, Xen keeps track of how pages are used using a type system; pages must be \"promoted\" before being used as a pagetable, and \"demoted\" before being used for any other type. Xen also allows for \"recursive\" promotions: i.e., an operating system promoting a page to an L4 pagetable may end up causing pages to be promoted to L3s, which may in turn cause pages to be promoted to L2s, and so on. These operations may take an arbitrarily large amount of time, and so must be re-startable. Unfortunately, making recursive pagetable promotion and demotion operations restartable is incredibly complicated, and the code contains several races which, if triggered, can cause Xen to drop or retain extra type counts, potentially allowing guests to get write access to in-use pagetables. A malicious PV guest administrator may be able to escalate their privilege to that of the host. All x86 systems with untrusted PV guests are vulnerable. HVM and PVH guests cannot exercise this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:xen-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-libs-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-tools-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-tools-domU-4.9.4_06-3.59.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-18421",
"url": "https://www.suse.com/security/cve/CVE-2019-18421"
},
{
"category": "external",
"summary": "SUSE Bug 1154458 for CVE-2019-18421",
"url": "https://bugzilla.suse.com/1154458"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2019-18421",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:xen-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-libs-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-tools-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-tools-domU-4.9.4_06-3.59.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"HPE Helion OpenStack 8:xen-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-libs-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-tools-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-tools-domU-4.9.4_06-3.59.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-12-13T17:31:37Z",
"details": "important"
}
],
"title": "CVE-2019-18421"
},
{
"cve": "CVE-2019-18422",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-18422"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Xen through 4.12.x allowing ARM guest OS users to cause a denial of service or gain privileges by leveraging the erroneous enabling of interrupts. Interrupts are unconditionally unmasked in exception handlers. When an exception occurs on an ARM system which is handled without changing processor level, some interrupts are unconditionally enabled during exception entry. So exceptions which occur when interrupts are masked will effectively unmask the interrupts. A malicious guest might contrive to arrange for critical Xen code to run with interrupts erroneously enabled. This could lead to data corruption, denial of service, or possibly even privilege escalation. However a precise attack technique has not been identified.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:xen-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-libs-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-tools-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-tools-domU-4.9.4_06-3.59.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-18422",
"url": "https://www.suse.com/security/cve/CVE-2019-18422"
},
{
"category": "external",
"summary": "SUSE Bug 1154464 for CVE-2019-18422",
"url": "https://bugzilla.suse.com/1154464"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:xen-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-libs-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-tools-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-tools-domU-4.9.4_06-3.59.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:xen-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-libs-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-tools-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-tools-domU-4.9.4_06-3.59.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-12-13T17:31:37Z",
"details": "important"
}
],
"title": "CVE-2019-18422"
},
{
"cve": "CVE-2019-18423",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-18423"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Xen through 4.12.x allowing ARM guest OS users to cause a denial of service via a XENMEM_add_to_physmap hypercall. p2m-\u003emax_mapped_gfn is used by the functions p2m_resolve_translation_fault() and p2m_get_entry() to sanity check guest physical frame. The rest of the code in the two functions will assume that there is a valid root table and check that with BUG_ON(). The function p2m_get_root_pointer() will ignore the unused top bits of a guest physical frame. This means that the function p2m_set_entry() will alias the frame. However, p2m-\u003emax_mapped_gfn will be updated using the original frame. It would be possible to set p2m-\u003emax_mapped_gfn high enough to cover a frame that would lead p2m_get_root_pointer() to return NULL in p2m_get_entry() and p2m_resolve_translation_fault(). Additionally, the sanity check on p2m-\u003emax_mapped_gfn is off-by-one allowing \"highest mapped + 1\" to be considered valid. However, p2m_get_root_pointer() will return NULL. The problem could be triggered with a specially crafted hypercall XENMEM_add_to_physmap{, _batch} followed by an access to an address (via hypercall or direct access) that passes the sanity check but cause p2m_get_root_pointer() to return NULL. A malicious guest administrator may cause a hypervisor crash, resulting in a Denial of Service (DoS). Xen version 4.8 and newer are vulnerable. Only Arm systems are vulnerable. x86 systems are not affected.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:xen-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-libs-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-tools-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-tools-domU-4.9.4_06-3.59.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-18423",
"url": "https://www.suse.com/security/cve/CVE-2019-18423"
},
{
"category": "external",
"summary": "SUSE Bug 1154460 for CVE-2019-18423",
"url": "https://bugzilla.suse.com/1154460"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:xen-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-libs-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-tools-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-tools-domU-4.9.4_06-3.59.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:xen-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-libs-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-tools-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-tools-domU-4.9.4_06-3.59.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-12-13T17:31:37Z",
"details": "important"
}
],
"title": "CVE-2019-18423"
},
{
"cve": "CVE-2019-18424",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-18424"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Xen through 4.12.x allowing attackers to gain host OS privileges via DMA in a situation where an untrusted domain has access to a physical device. This occurs because passed through PCI devices may corrupt host memory after deassignment. When a PCI device is assigned to an untrusted domain, it is possible for that domain to program the device to DMA to an arbitrary address. The IOMMU is used to protect the host from malicious DMA by making sure that the device addresses can only target memory assigned to the guest. However, when the guest domain is torn down, or the device is deassigned, the device is assigned back to dom0, thus allowing any in-flight DMA to potentially target critical host data. An untrusted domain with access to a physical device can DMA into host memory, leading to privilege escalation. Only systems where guests are given direct access to physical devices capable of DMA (PCI pass-through) are vulnerable. Systems which do not use PCI pass-through are not vulnerable.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:xen-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-libs-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-tools-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-tools-domU-4.9.4_06-3.59.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-18424",
"url": "https://www.suse.com/security/cve/CVE-2019-18424"
},
{
"category": "external",
"summary": "SUSE Bug 1154461 for CVE-2019-18424",
"url": "https://bugzilla.suse.com/1154461"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:xen-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-libs-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-tools-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-tools-domU-4.9.4_06-3.59.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.6,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:xen-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-libs-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-tools-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-tools-domU-4.9.4_06-3.59.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-12-13T17:31:37Z",
"details": "important"
}
],
"title": "CVE-2019-18424"
},
{
"cve": "CVE-2019-18425",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-18425"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Xen through 4.12.x allowing 32-bit PV guest OS users to gain guest OS privileges by installing and using descriptors. There is missing descriptor table limit checking in x86 PV emulation. When emulating certain PV guest operations, descriptor table accesses are performed by the emulating code. Such accesses should respect the guest specified limits, unless otherwise guaranteed to fail in such a case. Without this, emulation of 32-bit guest user mode calls through call gates would allow guest user mode to install and then use descriptors of their choice, as long as the guest kernel did not itself install an LDT. (Most OSes don\u0027t install any LDT by default). 32-bit PV guest user mode can elevate its privileges to that of the guest kernel. Xen versions from at least 3.2 onwards are affected. Only 32-bit PV guest user mode can leverage this vulnerability. HVM, PVH, as well as 64-bit PV guests cannot leverage this vulnerability. Arm systems are unaffected.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:xen-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-libs-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-tools-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-tools-domU-4.9.4_06-3.59.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-18425",
"url": "https://www.suse.com/security/cve/CVE-2019-18425"
},
{
"category": "external",
"summary": "SUSE Bug 1154456 for CVE-2019-18425",
"url": "https://bugzilla.suse.com/1154456"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2019-18425",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:xen-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-libs-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-tools-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-tools-domU-4.9.4_06-3.59.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"HPE Helion OpenStack 8:xen-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-libs-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-tools-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-tools-domU-4.9.4_06-3.59.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-12-13T17:31:37Z",
"details": "important"
}
],
"title": "CVE-2019-18425"
},
{
"cve": "CVE-2019-19577",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-19577"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Xen through 4.12.x allowing x86 AMD HVM guest OS users to cause a denial of service or possibly gain privileges by triggering data-structure access during pagetable-height updates. When running on AMD systems with an IOMMU, Xen attempted to dynamically adapt the number of levels of pagetables (the pagetable height) in the IOMMU according to the guest\u0027s address space size. The code to select and update the height had several bugs. Notably, the update was done without taking a lock which is necessary for safe operation. A malicious guest administrator can cause Xen to access data structures while they are being modified, causing Xen to crash. Privilege escalation is thought to be very difficult but cannot be ruled out. Additionally, there is a potential memory leak of 4kb per guest boot, under memory pressure. Only Xen on AMD CPUs is vulnerable. Xen running on Intel CPUs is not vulnerable. ARM systems are not vulnerable. Only systems where guests are given direct access to physical devices are vulnerable. Systems which do not use PCI pass-through are not vulnerable. Only HVM guests can exploit the vulnerability. PV and PVH guests cannot. All versions of Xen with IOMMU support are vulnerable.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:xen-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-libs-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-tools-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-tools-domU-4.9.4_06-3.59.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-19577",
"url": "https://www.suse.com/security/cve/CVE-2019-19577"
},
{
"category": "external",
"summary": "SUSE Bug 1158007 for CVE-2019-19577",
"url": "https://bugzilla.suse.com/1158007"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:xen-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-libs-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-tools-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-tools-domU-4.9.4_06-3.59.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:xen-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-libs-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-tools-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-tools-domU-4.9.4_06-3.59.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-12-13T17:31:37Z",
"details": "important"
}
],
"title": "CVE-2019-19577"
},
{
"cve": "CVE-2019-19578",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-19578"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Xen through 4.12.x allowing x86 PV guest OS users to cause a denial of service via degenerate chains of linear pagetables, because of an incorrect fix for CVE-2017-15595. \"Linear pagetables\" is a technique which involves either pointing a pagetable at itself, or to another pagetable of the same or higher level. Xen has limited support for linear pagetables: A page may either point to itself, or point to another pagetable of the same level (i.e., L2 to L2, L3 to L3, and so on). XSA-240 introduced an additional restriction that limited the \"depth\" of such chains by allowing pages to either *point to* other pages of the same level, or *be pointed to* by other pages of the same level, but not both. To implement this, we keep track of the number of outstanding times a page points to or is pointed to another page table, to prevent both from happening at the same time. Unfortunately, the original commit introducing this reset this count when resuming validation of a partially-validated pagetable, incorrectly dropping some \"linear_pt_entry\" counts. If an attacker could engineer such a situation to occur, they might be able to make loops or other arbitrary chains of linear pagetables, as described in XSA-240. A malicious or buggy PV guest may cause the hypervisor to crash, resulting in Denial of Service (DoS) affecting the entire host. Privilege escalation and information leaks cannot be excluded. All versions of Xen are vulnerable. Only x86 systems are affected. Arm systems are not affected. Only x86 PV guests can leverage the vulnerability. x86 HVM and PVH guests cannot leverage the vulnerability. Only systems which have enabled linear pagetables are vulnerable. Systems which have disabled linear pagetables, either by selecting CONFIG_PV_LINEAR_PT=n when building the hypervisor, or adding pv-linear-pt=false on the command-line, are not vulnerable.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:xen-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-libs-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-tools-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-tools-domU-4.9.4_06-3.59.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-19578",
"url": "https://www.suse.com/security/cve/CVE-2019-19578"
},
{
"category": "external",
"summary": "SUSE Bug 1158005 for CVE-2019-19578",
"url": "https://bugzilla.suse.com/1158005"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2019-19578",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:xen-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-libs-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-tools-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-tools-domU-4.9.4_06-3.59.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:xen-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-libs-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-tools-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-tools-domU-4.9.4_06-3.59.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-12-13T17:31:37Z",
"details": "important"
}
],
"title": "CVE-2019-19578"
},
{
"cve": "CVE-2019-19579",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-19579"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Xen through 4.12.x allowing attackers to gain host OS privileges via DMA in a situation where an untrusted domain has access to a physical device (and assignable-add is not used), because of an incomplete fix for CVE-2019-18424. XSA-302 relies on the use of libxl\u0027s \"assignable-add\" feature to prepare devices to be assigned to untrusted guests. Unfortunately, this is not considered a strictly required step for device assignment. The PCI passthrough documentation on the wiki describes alternate ways of preparing devices for assignment, and libvirt uses its own ways as well. Hosts where these \"alternate\" methods are used will still leave the system in a vulnerable state after the device comes back from a guest. An untrusted domain with access to a physical device can DMA into host memory, leading to privilege escalation. Only systems where guests are given direct access to physical devices capable of DMA (PCI pass-through) are vulnerable. Systems which do not use PCI pass-through are not vulnerable.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:xen-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-libs-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-tools-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-tools-domU-4.9.4_06-3.59.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-19579",
"url": "https://www.suse.com/security/cve/CVE-2019-19579"
},
{
"category": "external",
"summary": "SUSE Bug 1157888 for CVE-2019-19579",
"url": "https://bugzilla.suse.com/1157888"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:xen-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-libs-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-tools-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-tools-domU-4.9.4_06-3.59.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:xen-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-libs-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-tools-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-tools-domU-4.9.4_06-3.59.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-12-13T17:31:37Z",
"details": "moderate"
}
],
"title": "CVE-2019-19579"
},
{
"cve": "CVE-2019-19580",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-19580"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Xen through 4.12.x allowing x86 PV guest OS users to gain host OS privileges by leveraging race conditions in pagetable promotion and demotion operations, because of an incomplete fix for CVE-2019-18421. XSA-299 addressed several critical issues in restartable PV type change operations. Despite extensive testing and auditing, some corner cases were missed. A malicious PV guest administrator may be able to escalate their privilege to that of the host. All security-supported versions of Xen are vulnerable. Only x86 systems are affected. Arm systems are not affected. Only x86 PV guests can leverage the vulnerability. x86 HVM and PVH guests cannot leverage the vulnerability. Note that these attacks require very precise timing, which may be difficult to exploit in practice.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:xen-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-libs-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-tools-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-tools-domU-4.9.4_06-3.59.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-19580",
"url": "https://www.suse.com/security/cve/CVE-2019-19580"
},
{
"category": "external",
"summary": "SUSE Bug 1158006 for CVE-2019-19580",
"url": "https://bugzilla.suse.com/1158006"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2019-19580",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:xen-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-libs-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-tools-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-tools-domU-4.9.4_06-3.59.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:xen-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-libs-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-tools-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-tools-domU-4.9.4_06-3.59.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-12-13T17:31:37Z",
"details": "moderate"
}
],
"title": "CVE-2019-19580"
},
{
"cve": "CVE-2019-19581",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-19581"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Xen through 4.12.x allowing 32-bit Arm guest OS users to cause a denial of service (out-of-bounds access) because certain bit iteration is mishandled. In a number of places bitmaps are being used by the hypervisor to track certain state. Iteration over all bits involves functions which may misbehave in certain corner cases: On 32-bit Arm accesses to bitmaps with bit a count which is a multiple of 32, an out of bounds access may occur. A malicious guest may cause a hypervisor crash or hang, resulting in a Denial of Service (DoS). All versions of Xen are vulnerable. 32-bit Arm systems are vulnerable. 64-bit Arm systems are not vulnerable.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:xen-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-libs-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-tools-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-tools-domU-4.9.4_06-3.59.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-19581",
"url": "https://www.suse.com/security/cve/CVE-2019-19581"
},
{
"category": "external",
"summary": "SUSE Bug 1158003 for CVE-2019-19581",
"url": "https://bugzilla.suse.com/1158003"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:xen-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-libs-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-tools-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-tools-domU-4.9.4_06-3.59.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:xen-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-libs-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-tools-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-tools-domU-4.9.4_06-3.59.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-12-13T17:31:37Z",
"details": "moderate"
}
],
"title": "CVE-2019-19581"
},
{
"cve": "CVE-2019-19582",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-19582"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Xen through 4.12.x allowing x86 guest OS users to cause a denial of service (infinite loop) because certain bit iteration is mishandled. In a number of places bitmaps are being used by the hypervisor to track certain state. Iteration over all bits involves functions which may misbehave in certain corner cases: On x86 accesses to bitmaps with a compile time known size of 64 may incur undefined behavior, which may in particular result in infinite loops. A malicious guest may cause a hypervisor crash or hang, resulting in a Denial of Service (DoS). All versions of Xen are vulnerable. x86 systems with 64 or more nodes are vulnerable (there might not be any such systems that Xen would run on). x86 systems with less than 64 nodes are not vulnerable.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:xen-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-libs-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-tools-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-tools-domU-4.9.4_06-3.59.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-19582",
"url": "https://www.suse.com/security/cve/CVE-2019-19582"
},
{
"category": "external",
"summary": "SUSE Bug 1158003 for CVE-2019-19582",
"url": "https://bugzilla.suse.com/1158003"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:xen-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-libs-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-tools-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-tools-domU-4.9.4_06-3.59.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:xen-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-libs-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-tools-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-tools-domU-4.9.4_06-3.59.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-12-13T17:31:37Z",
"details": "moderate"
}
],
"title": "CVE-2019-19582"
},
{
"cve": "CVE-2019-19583",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-19583"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Xen through 4.12.x allowing x86 HVM/PVH guest OS users to cause a denial of service (guest OS crash) because VMX VMEntry checks mishandle a certain case. Please see XSA-260 for background on the MovSS shadow. Please see XSA-156 for background on the need for #DB interception. The VMX VMEntry checks do not like the exact combination of state which occurs when #DB in intercepted, Single Stepping is active, and blocked by STI/MovSS is active, despite this being a legitimate state to be in. The resulting VMEntry failure is fatal to the guest. HVM/PVH guest userspace code may be able to crash the guest, resulting in a guest Denial of Service. All versions of Xen are affected. Only systems supporting VMX hardware virtual extensions (Intel, Cyrix, or Zhaoxin CPUs) are affected. Arm and AMD systems are unaffected. Only HVM/PVH guests are affected. PV guests cannot leverage the vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:xen-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-libs-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-tools-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-tools-domU-4.9.4_06-3.59.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-19583",
"url": "https://www.suse.com/security/cve/CVE-2019-19583"
},
{
"category": "external",
"summary": "SUSE Bug 1158004 for CVE-2019-19583",
"url": "https://bugzilla.suse.com/1158004"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2019-19583",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:xen-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-libs-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-tools-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-tools-domU-4.9.4_06-3.59.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:xen-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-libs-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-tools-4.9.4_06-3.59.1.x86_64",
"HPE Helion OpenStack 8:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Enterprise Storage 5:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud 8:xen-tools-domU-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-doc-html-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-libs-32bit-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-libs-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-tools-4.9.4_06-3.59.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:xen-tools-domU-4.9.4_06-3.59.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-12-13T17:31:37Z",
"details": "important"
}
],
"title": "CVE-2019-19583"
}
]
}
suse-su-2019:2984-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\n\nThe SUSE Linux Enterprise 12 SP2 kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2018-12207: Untrusted virtual machines on Intel CPUs could exploit a race\n condition in the Instruction Fetch Unit of the Intel CPU to cause a Machine\n Exception during Page Size Change, causing the CPU core to be non-functional.\n\n The Linux Kernel kvm hypervisor was adjusted to avoid page size changes in\n executable pages by splitting / merging huge pages into small pages as\n needed. More information can be found on https://www.suse.com/support/kb/doc/?id=7023735\n\n- CVE-2019-16995: Fix a memory leak in hsr_dev_finalize() if hsr_add_port\n failed to add a port, which may have caused denial of service (bsc#1152685).\n\n- CVE-2019-11135: Aborting an asynchronous TSX operation on Intel CPUs with\n Transactional Memory support could be used to facilitate sidechannel\n information leaks out of microarchitectural buffers, similar to the\n previously described \u0027Microarchitectural Data Sampling\u0027 attack.\n\n The Linux kernel was supplemented with the option to disable TSX operation\n altogether (requiring CPU Microcode updates on older systems) and better\n flushing of microarchitectural buffers (VERW).\n\n The set of options available is described in our TID at https://www.suse.com/support/kb/doc/?id=7024251\n\n- CVE-2019-16233: drivers/scsi/qla2xxx/qla_os.c did not check the\n alloc_workqueue return value, leading to a NULL pointer dereference.\n (bsc#1150457).\n\n- CVE-2019-10220: Added sanity checks on the pathnames passed to the user\n space. (bsc#1144903).\n\n- CVE-2019-17666: rtlwifi: Fix potential overflow in P2P code (bsc#1154372).\n\n- CVE-2019-17133: cfg80211 wireless extension did not reject a long SSID IE,\n leading to a Buffer Overflow (bsc#1153158).\n\n- CVE-2019-16232: Fix a potential NULL pointer dereference in the Marwell\n libertas driver (bsc#1150465).\n\n- CVE-2019-16234: iwlwifi pcie driver did not check the alloc_workqueue return\n value, leading to a NULL pointer dereference. (bsc#1150452).\n\n- CVE-2019-17055: The AF_ISDN network module in the Linux kernel did not\n enforce CAP_NET_RAW, which meant that unprivileged users could create a raw\n socket (bnc#1152782).\n\n- CVE-2019-17056: The AF_NFC network module did not enforce CAP_NET_RAW, which\n meant that unprivileged users could create a raw socket (bsc#1152788).\n\n- CVE-2019-16413: The 9p filesystem did not protect i_size_write() properly,\n which caused an i_size_read() infinite loop and denial of service on SMP\n systems (bnc#1151347).\n\n- CVE-2019-15902: A backporting issue was discovered that re-introduced the\n Spectre vulnerability it had aimed to eliminate. This occurred because the\n backport process depends on cherry picking specific commits, and because two\n (correctly ordered) code lines were swapped (bnc#1149376).\n\n- CVE-2019-15291: Fixed a NULL pointer dereference issue that could be caused\n by a malicious USB device (bnc#1146519).\n\n- CVE-2019-15807: Fixed a memory leak in the SCSI module that could be abused\n to cause denial of service (bnc#1148938).\n\n- CVE-2019-13272: Fixed a mishandled the recording of the credentials of a\n process that wants to create a ptrace relationship, which allowed local users\n to obtain root access by leveraging certain scenarios with a parent-child\n process relationship, where a parent drops privileges and calls execve\n (potentially allowing control by an attacker). (bnc#1140671).\n\n- CVE-2019-14821: An out-of-bounds access issue was fixed in the kernel\u0027s kvm\n hypervisor. An unprivileged host user or process with access to \u0027/dev/kvm\u0027\n device could use this flaw to crash the host kernel, resulting in a denial of\n service or potentially escalating privileges on the system (bnc#1151350).\n\n- CVE-2019-15505: An out-of-bounds issue had been fixed that could be caused by\n crafted USB device traffic (bnc#1147122).\n\n- CVE-2017-18595: A double free in allocate_trace_buffer was fixed\n (bnc#1149555).\n\n- CVE-2019-14835: A buffer overflow flaw was found in the kernel\u0027s vhost\n functionality that translates virtqueue buffers to IOVs. A privileged guest\n user able to pass descriptors with invalid length to the host could use this\n flaw to increase their privileges on the host (bnc#1150112).\n\n- CVE-2019-15216: A NULL pointer dereference was fixed that could be malicious\n USB device (bnc#1146361).\n\n- CVE-2019-15924: A a NULL pointer dereference has been fixed in the\n drivers/net/ethernet/intel/fm10k module (bnc#1149612).\n\n- CVE-2019-9456: An out-of-bounds write in the USB monitor driver has been\n fixed. This issue could lead to local escalation of privilege with System\n execution privileges needed. (bnc#1150025).\n\n- CVE-2019-15926: An out-of-bounds access was fixed in the\n drivers/net/wireless/ath/ath6kl module. (bnc#1149527).\n\n- CVE-2019-15927: An out-of-bounds access was fixed in the sound/usb/mixer\n module (bnc#1149522).\n\n- CVE-2019-15666: There was an out-of-bounds array access in the net/xfrm\n module that could cause denial of service (bnc#1148394).\n\n- CVE-2019-15219: A NULL pointer dereference was fixed that could be abused by\n a malicious USB device (bnc#1146519 1146524).\n\n- CVE-2019-15220: A use-after-free issue was fixed that could be caused by a\n malicious USB device (bnc#1146519 1146526).\n\n- CVE-2019-15221: A NULL pointer dereference was fixed that could be caused by\n a malicious USB device (bnc#1146519 1146529).\n\n- CVE-2019-14814: A heap-based buffer overflow was fixed in the marvell wifi\n chip driver. That issue allowed local users to cause a denial of service\n (system crash) or possibly execute arbitrary code (bnc#1146512).\n\n- CVE-2019-14815: A missing length check while parsing WMM IEs was fixed\n (bsc#1146512, bsc#1146514, bsc#1146516).\n\n- CVE-2019-14816: A heap-based buffer overflow in the marvell wifi chip driver\n was fixed. Local users would have abused this issue to cause a denial of\n service (system crash) or possibly execute arbitrary code (bnc#1146516).\n\n- CVE-2017-18509: An issue in net/ipv6 as fixed. By setting a specific socket\n option, an attacker could control a pointer in kernel land and cause an\n inet_csk_listen_stop general protection fault, or potentially execute\n arbitrary code under certain circumstances. The issue can be triggered as\n root (e.g., inside a default LXC container or with the CAP_NET_ADMIN\n capability) or after namespace unsharing. (bnc#1145477)\n\n- CVE-2019-9506: The Bluetooth BR/EDR specification used to permit sufficiently\n low encryption key length and did not prevent an attacker from influencing\n the key length negotiation. This allowed practical brute-force attacks (aka\n \u0027KNOB\u0027) that could decrypt traffic and inject arbitrary ciphertext without\n the victim noticing (bnc#1137865).\n\n- CVE-2019-15098: A NULL pointer dereference in drivers/net/wireless/ath was\n fixed (bnc#1146378).\n\n- CVE-2019-15290: A NULL pointer dereference in ath6kl_usb_alloc_urb_from_pipe\n was fixed (bsc#1146378).\n\n- CVE-2019-15212: A double-free issue was fixed in drivers/usb driver\n (bnc#1146391).\n\n- CVE-2016-10906: A use-after-free issue was fixed in drivers/net/ethernet/arc\n (bnc#1146584).\n\n- CVE-2019-15211: A use-after-free issue caused by a malicious USB device was\n fixed in the drivers/media/v4l2-core driver (bnc#1146519).\n\n- CVE-2019-15217: A a NULL pointer dereference issue caused by a malicious USB\n device was fixed in the drivers/media/usb/zr364xx driver (bnc#1146519).\n\n- CVE-2019-15214: An a use-after-free issue in the sound subsystem was fixed\n (bnc#1146519).\n\n- CVE-2019-15218: A NULL pointer dereference caused by a malicious USB device\n was fixed in the drivers/media/usb/siano driver (bnc#1146413).\n\n- CVE-2019-15215: A use-after-free issue caused by a malicious USB device was\n fixed in the drivers/media/usb/cpia2 driver (bnc#1146425).\n\n- CVE-2018-20976: A use-after-free issue was fixed in the fs/xfs driver\n (bnc#1146285).\n\n- CVE-2019-0154: An unprotected read access to i915 registers has been fixed\n that could have been abused to facilitate a local denial-of-service attack.\n (bsc#1135966)\n\n- CVE-2019-0155: A privilege escalation vulnerability has been fixed in the\n i915 module that allowed batch buffers from user mode to gain super user\n privileges. (bsc#1135967)\n\n- CVE-2019-16231: The fjes driver did not check the alloc_workqueue return value, leading to a NULL pointer dereference. (bnc#1150466)\n\n- CVE-2019-18805: Fix signed integer overflow in tcp_ack_update_rtt() that could have lead to a denial of service or possibly unspecified other impact (bsc#1156187)\n\n- CVE-2019-18680: A NULL pointer dereference in rds_tcp_kill_sock() could cause denial of service (bnc#1155898)\n\nThe following non-security bugs were fixed:\n\n- cpu/speculation: Uninline and export CPU mitigations helpers (bnc#1117665).\n- documentation: Add ITLB_MULTIHIT documentation (bnc#1117665).\n- ib/core: Add mitigation for Spectre V1 (bsc#1155671)\n- ib/core: array_index_nospec: Sanitize speculative array (bsc#1155671)\n- ipv6: Update ipv6 defrag code (add bsc#1141054).\n- ksm: cleanup stable_node chain collapse case (bnc#1144338).\n- ksm: fix use after free with merge_across_nodes = 0 (bnc#1144338).\n- ksm: introduce ksm_max_page_sharing per page deduplication limit (bnc#1144338).\n- ksm: optimize refile of stable_node_dup at the head of the chain (bnc#1144338).\n- ksm: swap the two output parameters of chain/chain_prune (bnc#1144338).\n- kvm kABI Fix for NX patches (bsc#1117665).\n- kvm: Convert kvm_lock to a mutex (bsc#1117665).\n- kvm: MMU: drop vcpu param in gpte_access (bsc#1117665).\n- kvm: MMU: introduce kvm_mmu_gfn_{allow,disallow}_lpage (bsc#1117665).\n- kvm: MMU: rename has_wrprotected_page to mmu_gfn_lpage_is_disallowed (bsc#1117665).\n- kvm: vmx, svm: always run with EFER.NXE=1 when shadow paging is active (bsc#1117665).\n- kvm: x86, powerpc: do not allow clearing largepages debugfs entry (bsc#1117665).\n- kvm: x86: Do not release the page inside mmu_set_spte() (bsc#1117665).\n- kvm: x86: MMU: Consolidate quickly_check_mmio_pf() and is_mmio_page_fault() (bsc#1117665).\n- kvm: x86: MMU: Encapsulate the type of rmap-chain head in a new struct (bsc#1117665).\n- kvm: x86: MMU: Move handle_mmio_page_fault() call to kvm_mmu_page_fault() (bsc#1117665).\n- kvm: x86: MMU: Move initialization of parent_ptes out from kvm_mmu_alloc_page() (bsc#1117665).\n- kvm: x86: MMU: Move parent_pte handling from kvm_mmu_get_page() to link_shadow_page() (bsc#1117665).\n- kvm: x86: MMU: Remove unused parameter parent_pte from kvm_mmu_get_page() (bsc#1117665).\n- kvm: x86: MMU: always set accessed bit in shadow PTEs (bsc#1117665).\n- kvm: x86: add tracepoints around __direct_map and FNAME(fetch) (bsc#1117665).\n- kvm: x86: adjust kvm_mmu_page member to save 8 bytes (bsc#1117665).\n- kvm: x86: change kvm_mmu_page_get_gfn BUG_ON to WARN_ON (bsc#1117665).\n- kvm: x86: extend usage of RET_MMIO_PF_* constants (bsc#1117665).\n- kvm: x86: make FNAME(fetch) and __direct_map more similar (bsc#1117665).\n- kvm: x86: mmu: Apply global mitigations knob to ITLB_MULTIHIT (bnc#1117665).\n- kvm: x86: remove now unneeded hugepage gfn adjustment (bsc#1117665).\n- kvm: x86: simplify ept_misconfig (bsc#1117665).\n- media: smsusb: better handle optional alignment (bsc#1146413).\n- mm: use upstream patch for bsc#1106913\n- scsi: scsi_transport_fc: Drop double list_del() (bsc#1084878)\n- x86/bugs: correctly force-disable IBRS on !SKL systems (bsc#1068032, bsc#1092497).\n- x86/cpu: Add Atom Tremont (Jacobsville) (bsc#1117665).\n- x86/headers: Do not include asm/processor.h in asm/atomic.h (bsc#1150223).\n- x86/mitigations: Backport the STIBP pile See bsc#1139550\n- xen-blkfront: avoid ENOMEM in blkif_recover after migration (bsc#1149849).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2019-2984,SUSE-OpenStack-Cloud-7-2019-2984,SUSE-SLE-HA-12-SP2-2019-2984,SUSE-SLE-SAP-12-SP2-2019-2984,SUSE-SLE-SERVER-12-SP2-2019-2984,SUSE-SLE-SERVER-12-SP2-BCL-2019-2984",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_2984-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2019:2984-1",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192984-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2019:2984-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2019-November/006143.html"
},
{
"category": "self",
"summary": "SUSE Bug 1068032",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "self",
"summary": "SUSE Bug 1084878",
"url": "https://bugzilla.suse.com/1084878"
},
{
"category": "self",
"summary": "SUSE Bug 1092497",
"url": "https://bugzilla.suse.com/1092497"
},
{
"category": "self",
"summary": "SUSE Bug 1106913",
"url": "https://bugzilla.suse.com/1106913"
},
{
"category": "self",
"summary": "SUSE Bug 1117665",
"url": "https://bugzilla.suse.com/1117665"
},
{
"category": "self",
"summary": "SUSE Bug 1135966",
"url": "https://bugzilla.suse.com/1135966"
},
{
"category": "self",
"summary": "SUSE Bug 1135967",
"url": "https://bugzilla.suse.com/1135967"
},
{
"category": "self",
"summary": "SUSE Bug 1137865",
"url": "https://bugzilla.suse.com/1137865"
},
{
"category": "self",
"summary": "SUSE Bug 1139550",
"url": "https://bugzilla.suse.com/1139550"
},
{
"category": "self",
"summary": "SUSE Bug 1140671",
"url": "https://bugzilla.suse.com/1140671"
},
{
"category": "self",
"summary": "SUSE Bug 1141054",
"url": "https://bugzilla.suse.com/1141054"
},
{
"category": "self",
"summary": "SUSE Bug 1144338",
"url": "https://bugzilla.suse.com/1144338"
},
{
"category": "self",
"summary": "SUSE Bug 1144903",
"url": "https://bugzilla.suse.com/1144903"
},
{
"category": "self",
"summary": "SUSE Bug 1145477",
"url": "https://bugzilla.suse.com/1145477"
},
{
"category": "self",
"summary": "SUSE Bug 1146285",
"url": "https://bugzilla.suse.com/1146285"
},
{
"category": "self",
"summary": "SUSE Bug 1146361",
"url": "https://bugzilla.suse.com/1146361"
},
{
"category": "self",
"summary": "SUSE Bug 1146378",
"url": "https://bugzilla.suse.com/1146378"
},
{
"category": "self",
"summary": "SUSE Bug 1146391",
"url": "https://bugzilla.suse.com/1146391"
},
{
"category": "self",
"summary": "SUSE Bug 1146413",
"url": "https://bugzilla.suse.com/1146413"
},
{
"category": "self",
"summary": "SUSE Bug 1146425",
"url": "https://bugzilla.suse.com/1146425"
},
{
"category": "self",
"summary": "SUSE Bug 1146512",
"url": "https://bugzilla.suse.com/1146512"
},
{
"category": "self",
"summary": "SUSE Bug 1146514",
"url": "https://bugzilla.suse.com/1146514"
},
{
"category": "self",
"summary": "SUSE Bug 1146516",
"url": "https://bugzilla.suse.com/1146516"
},
{
"category": "self",
"summary": "SUSE Bug 1146519",
"url": "https://bugzilla.suse.com/1146519"
},
{
"category": "self",
"summary": "SUSE Bug 1146584",
"url": "https://bugzilla.suse.com/1146584"
},
{
"category": "self",
"summary": "SUSE Bug 1147122",
"url": "https://bugzilla.suse.com/1147122"
},
{
"category": "self",
"summary": "SUSE Bug 1148394",
"url": "https://bugzilla.suse.com/1148394"
},
{
"category": "self",
"summary": "SUSE Bug 1148938",
"url": "https://bugzilla.suse.com/1148938"
},
{
"category": "self",
"summary": "SUSE Bug 1149376",
"url": "https://bugzilla.suse.com/1149376"
},
{
"category": "self",
"summary": "SUSE Bug 1149522",
"url": "https://bugzilla.suse.com/1149522"
},
{
"category": "self",
"summary": "SUSE Bug 1149527",
"url": "https://bugzilla.suse.com/1149527"
},
{
"category": "self",
"summary": "SUSE Bug 1149555",
"url": "https://bugzilla.suse.com/1149555"
},
{
"category": "self",
"summary": "SUSE Bug 1149612",
"url": "https://bugzilla.suse.com/1149612"
},
{
"category": "self",
"summary": "SUSE Bug 1149849",
"url": "https://bugzilla.suse.com/1149849"
},
{
"category": "self",
"summary": "SUSE Bug 1150025",
"url": "https://bugzilla.suse.com/1150025"
},
{
"category": "self",
"summary": "SUSE Bug 1150112",
"url": "https://bugzilla.suse.com/1150112"
},
{
"category": "self",
"summary": "SUSE Bug 1150223",
"url": "https://bugzilla.suse.com/1150223"
},
{
"category": "self",
"summary": "SUSE Bug 1150452",
"url": "https://bugzilla.suse.com/1150452"
},
{
"category": "self",
"summary": "SUSE Bug 1150457",
"url": "https://bugzilla.suse.com/1150457"
},
{
"category": "self",
"summary": "SUSE Bug 1150465",
"url": "https://bugzilla.suse.com/1150465"
},
{
"category": "self",
"summary": "SUSE Bug 1150466",
"url": "https://bugzilla.suse.com/1150466"
},
{
"category": "self",
"summary": "SUSE Bug 1151347",
"url": "https://bugzilla.suse.com/1151347"
},
{
"category": "self",
"summary": "SUSE Bug 1151350",
"url": "https://bugzilla.suse.com/1151350"
},
{
"category": "self",
"summary": "SUSE Bug 1152685",
"url": "https://bugzilla.suse.com/1152685"
},
{
"category": "self",
"summary": "SUSE Bug 1152782",
"url": "https://bugzilla.suse.com/1152782"
},
{
"category": "self",
"summary": "SUSE Bug 1152788",
"url": "https://bugzilla.suse.com/1152788"
},
{
"category": "self",
"summary": "SUSE Bug 1153158",
"url": "https://bugzilla.suse.com/1153158"
},
{
"category": "self",
"summary": "SUSE Bug 1154372",
"url": "https://bugzilla.suse.com/1154372"
},
{
"category": "self",
"summary": "SUSE Bug 1155671",
"url": "https://bugzilla.suse.com/1155671"
},
{
"category": "self",
"summary": "SUSE Bug 1155898",
"url": "https://bugzilla.suse.com/1155898"
},
{
"category": "self",
"summary": "SUSE Bug 1156187",
"url": "https://bugzilla.suse.com/1156187"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-10906 page",
"url": "https://www.suse.com/security/cve/CVE-2016-10906/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-18509 page",
"url": "https://www.suse.com/security/cve/CVE-2017-18509/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-18595 page",
"url": "https://www.suse.com/security/cve/CVE-2017-18595/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-12207 page",
"url": "https://www.suse.com/security/cve/CVE-2018-12207/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-20976 page",
"url": "https://www.suse.com/security/cve/CVE-2018-20976/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-0154 page",
"url": "https://www.suse.com/security/cve/CVE-2019-0154/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-0155 page",
"url": "https://www.suse.com/security/cve/CVE-2019-0155/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-10220 page",
"url": "https://www.suse.com/security/cve/CVE-2019-10220/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11135 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11135/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-13272 page",
"url": "https://www.suse.com/security/cve/CVE-2019-13272/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-14814 page",
"url": "https://www.suse.com/security/cve/CVE-2019-14814/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-14815 page",
"url": "https://www.suse.com/security/cve/CVE-2019-14815/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-14816 page",
"url": "https://www.suse.com/security/cve/CVE-2019-14816/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-14821 page",
"url": "https://www.suse.com/security/cve/CVE-2019-14821/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-14835 page",
"url": "https://www.suse.com/security/cve/CVE-2019-14835/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15098 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15098/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15211 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15211/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15212 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15212/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15214 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15214/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15215 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15215/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15216 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15216/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15217 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15217/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15218 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15218/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15219 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15219/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15220 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15220/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15221 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15221/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15290 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15290/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15291 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15291/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15505 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15505/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15666 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15666/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15807 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15807/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15902 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15902/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15924 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15924/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15926 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15926/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15927 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15927/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-16231 page",
"url": "https://www.suse.com/security/cve/CVE-2019-16231/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-16232 page",
"url": "https://www.suse.com/security/cve/CVE-2019-16232/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-16233 page",
"url": "https://www.suse.com/security/cve/CVE-2019-16233/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-16234 page",
"url": "https://www.suse.com/security/cve/CVE-2019-16234/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-16413 page",
"url": "https://www.suse.com/security/cve/CVE-2019-16413/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-16995 page",
"url": "https://www.suse.com/security/cve/CVE-2019-16995/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-17055 page",
"url": "https://www.suse.com/security/cve/CVE-2019-17055/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-17056 page",
"url": "https://www.suse.com/security/cve/CVE-2019-17056/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-17133 page",
"url": "https://www.suse.com/security/cve/CVE-2019-17133/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-17666 page",
"url": "https://www.suse.com/security/cve/CVE-2019-17666/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-18680 page",
"url": "https://www.suse.com/security/cve/CVE-2019-18680/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-18805 page",
"url": "https://www.suse.com/security/cve/CVE-2019-18805/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-9456 page",
"url": "https://www.suse.com/security/cve/CVE-2019-9456/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-9506 page",
"url": "https://www.suse.com/security/cve/CVE-2019-9506/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2019-11-20T10:32:05Z",
"generator": {
"date": "2019-11-20T10:32:05Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2019:2984-1",
"initial_release_date": "2019-11-20T10:32:05Z",
"revision_history": [
{
"date": "2019-11-20T10:32:05Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.4.121-92.125.1.aarch64",
"product": {
"name": "cluster-md-kmp-default-4.4.121-92.125.1.aarch64",
"product_id": "cluster-md-kmp-default-4.4.121-92.125.1.aarch64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-vanilla-4.4.121-92.125.1.aarch64",
"product": {
"name": "cluster-md-kmp-vanilla-4.4.121-92.125.1.aarch64",
"product_id": "cluster-md-kmp-vanilla-4.4.121-92.125.1.aarch64"
}
},
{
"category": "product_version",
"name": "cluster-network-kmp-default-4.4.121-92.125.1.aarch64",
"product": {
"name": "cluster-network-kmp-default-4.4.121-92.125.1.aarch64",
"product_id": "cluster-network-kmp-default-4.4.121-92.125.1.aarch64"
}
},
{
"category": "product_version",
"name": "cluster-network-kmp-vanilla-4.4.121-92.125.1.aarch64",
"product": {
"name": "cluster-network-kmp-vanilla-4.4.121-92.125.1.aarch64",
"product_id": "cluster-network-kmp-vanilla-4.4.121-92.125.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.4.121-92.125.1.aarch64",
"product": {
"name": "dlm-kmp-default-4.4.121-92.125.1.aarch64",
"product_id": "dlm-kmp-default-4.4.121-92.125.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-vanilla-4.4.121-92.125.1.aarch64",
"product": {
"name": "dlm-kmp-vanilla-4.4.121-92.125.1.aarch64",
"product_id": "dlm-kmp-vanilla-4.4.121-92.125.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.4.121-92.125.1.aarch64",
"product": {
"name": "gfs2-kmp-default-4.4.121-92.125.1.aarch64",
"product_id": "gfs2-kmp-default-4.4.121-92.125.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-vanilla-4.4.121-92.125.1.aarch64",
"product": {
"name": "gfs2-kmp-vanilla-4.4.121-92.125.1.aarch64",
"product_id": "gfs2-kmp-vanilla-4.4.121-92.125.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-4.4.121-92.125.1.aarch64",
"product": {
"name": "kernel-default-4.4.121-92.125.1.aarch64",
"product_id": "kernel-default-4.4.121-92.125.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.4.121-92.125.1.aarch64",
"product": {
"name": "kernel-default-base-4.4.121-92.125.1.aarch64",
"product_id": "kernel-default-base-4.4.121-92.125.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.4.121-92.125.1.aarch64",
"product": {
"name": "kernel-default-devel-4.4.121-92.125.1.aarch64",
"product_id": "kernel-default-devel-4.4.121-92.125.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.4.121-92.125.1.aarch64",
"product": {
"name": "kernel-default-extra-4.4.121-92.125.1.aarch64",
"product_id": "kernel-default-extra-4.4.121-92.125.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.4.121-92.125.1.aarch64",
"product": {
"name": "kernel-default-kgraft-4.4.121-92.125.1.aarch64",
"product_id": "kernel-default-kgraft-4.4.121-92.125.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.4.121-92.125.1.aarch64",
"product": {
"name": "kernel-obs-build-4.4.121-92.125.1.aarch64",
"product_id": "kernel-obs-build-4.4.121-92.125.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.4.121-92.125.1.aarch64",
"product": {
"name": "kernel-obs-qa-4.4.121-92.125.1.aarch64",
"product_id": "kernel-obs-qa-4.4.121-92.125.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.4.121-92.125.1.aarch64",
"product": {
"name": "kernel-syms-4.4.121-92.125.1.aarch64",
"product_id": "kernel-syms-4.4.121-92.125.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.4.121-92.125.1.aarch64",
"product": {
"name": "kernel-vanilla-4.4.121-92.125.1.aarch64",
"product_id": "kernel-vanilla-4.4.121-92.125.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.4.121-92.125.1.aarch64",
"product": {
"name": "kernel-vanilla-base-4.4.121-92.125.1.aarch64",
"product_id": "kernel-vanilla-base-4.4.121-92.125.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.4.121-92.125.1.aarch64",
"product": {
"name": "kernel-vanilla-devel-4.4.121-92.125.1.aarch64",
"product_id": "kernel-vanilla-devel-4.4.121-92.125.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.4.121-92.125.1.aarch64",
"product": {
"name": "ocfs2-kmp-default-4.4.121-92.125.1.aarch64",
"product_id": "ocfs2-kmp-default-4.4.121-92.125.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-vanilla-4.4.121-92.125.1.aarch64",
"product": {
"name": "ocfs2-kmp-vanilla-4.4.121-92.125.1.aarch64",
"product_id": "ocfs2-kmp-vanilla-4.4.121-92.125.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-4.4.121-92.125.1.noarch",
"product": {
"name": "kernel-devel-4.4.121-92.125.1.noarch",
"product_id": "kernel-devel-4.4.121-92.125.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-4.4.121-92.125.1.noarch",
"product": {
"name": "kernel-docs-4.4.121-92.125.1.noarch",
"product_id": "kernel-docs-4.4.121-92.125.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-html-4.4.121-92.125.1.noarch",
"product": {
"name": "kernel-docs-html-4.4.121-92.125.1.noarch",
"product_id": "kernel-docs-html-4.4.121-92.125.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-pdf-4.4.121-92.125.1.noarch",
"product": {
"name": "kernel-docs-pdf-4.4.121-92.125.1.noarch",
"product_id": "kernel-docs-pdf-4.4.121-92.125.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-4.4.121-92.125.1.noarch",
"product": {
"name": "kernel-macros-4.4.121-92.125.1.noarch",
"product_id": "kernel-macros-4.4.121-92.125.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-4.4.121-92.125.1.noarch",
"product": {
"name": "kernel-source-4.4.121-92.125.1.noarch",
"product_id": "kernel-source-4.4.121-92.125.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-4.4.121-92.125.1.noarch",
"product": {
"name": "kernel-source-vanilla-4.4.121-92.125.1.noarch",
"product_id": "kernel-source-vanilla-4.4.121-92.125.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-debug-4.4.121-92.125.1.ppc64le",
"product": {
"name": "cluster-md-kmp-debug-4.4.121-92.125.1.ppc64le",
"product_id": "cluster-md-kmp-debug-4.4.121-92.125.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.4.121-92.125.1.ppc64le",
"product": {
"name": "cluster-md-kmp-default-4.4.121-92.125.1.ppc64le",
"product_id": "cluster-md-kmp-default-4.4.121-92.125.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-vanilla-4.4.121-92.125.1.ppc64le",
"product": {
"name": "cluster-md-kmp-vanilla-4.4.121-92.125.1.ppc64le",
"product_id": "cluster-md-kmp-vanilla-4.4.121-92.125.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cluster-network-kmp-debug-4.4.121-92.125.1.ppc64le",
"product": {
"name": "cluster-network-kmp-debug-4.4.121-92.125.1.ppc64le",
"product_id": "cluster-network-kmp-debug-4.4.121-92.125.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cluster-network-kmp-default-4.4.121-92.125.1.ppc64le",
"product": {
"name": "cluster-network-kmp-default-4.4.121-92.125.1.ppc64le",
"product_id": "cluster-network-kmp-default-4.4.121-92.125.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cluster-network-kmp-vanilla-4.4.121-92.125.1.ppc64le",
"product": {
"name": "cluster-network-kmp-vanilla-4.4.121-92.125.1.ppc64le",
"product_id": "cluster-network-kmp-vanilla-4.4.121-92.125.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-debug-4.4.121-92.125.1.ppc64le",
"product": {
"name": "dlm-kmp-debug-4.4.121-92.125.1.ppc64le",
"product_id": "dlm-kmp-debug-4.4.121-92.125.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.4.121-92.125.1.ppc64le",
"product": {
"name": "dlm-kmp-default-4.4.121-92.125.1.ppc64le",
"product_id": "dlm-kmp-default-4.4.121-92.125.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-vanilla-4.4.121-92.125.1.ppc64le",
"product": {
"name": "dlm-kmp-vanilla-4.4.121-92.125.1.ppc64le",
"product_id": "dlm-kmp-vanilla-4.4.121-92.125.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-debug-4.4.121-92.125.1.ppc64le",
"product": {
"name": "gfs2-kmp-debug-4.4.121-92.125.1.ppc64le",
"product_id": "gfs2-kmp-debug-4.4.121-92.125.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"product": {
"name": "gfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"product_id": "gfs2-kmp-default-4.4.121-92.125.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-vanilla-4.4.121-92.125.1.ppc64le",
"product": {
"name": "gfs2-kmp-vanilla-4.4.121-92.125.1.ppc64le",
"product_id": "gfs2-kmp-vanilla-4.4.121-92.125.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-4.4.121-92.125.1.ppc64le",
"product": {
"name": "kernel-debug-4.4.121-92.125.1.ppc64le",
"product_id": "kernel-debug-4.4.121-92.125.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-4.4.121-92.125.1.ppc64le",
"product": {
"name": "kernel-debug-base-4.4.121-92.125.1.ppc64le",
"product_id": "kernel-debug-base-4.4.121-92.125.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-4.4.121-92.125.1.ppc64le",
"product": {
"name": "kernel-debug-devel-4.4.121-92.125.1.ppc64le",
"product_id": "kernel-debug-devel-4.4.121-92.125.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-extra-4.4.121-92.125.1.ppc64le",
"product": {
"name": "kernel-debug-extra-4.4.121-92.125.1.ppc64le",
"product_id": "kernel-debug-extra-4.4.121-92.125.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-kgraft-4.4.121-92.125.1.ppc64le",
"product": {
"name": "kernel-debug-kgraft-4.4.121-92.125.1.ppc64le",
"product_id": "kernel-debug-kgraft-4.4.121-92.125.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-4.4.121-92.125.1.ppc64le",
"product": {
"name": "kernel-default-4.4.121-92.125.1.ppc64le",
"product_id": "kernel-default-4.4.121-92.125.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.4.121-92.125.1.ppc64le",
"product": {
"name": "kernel-default-base-4.4.121-92.125.1.ppc64le",
"product_id": "kernel-default-base-4.4.121-92.125.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.4.121-92.125.1.ppc64le",
"product": {
"name": "kernel-default-devel-4.4.121-92.125.1.ppc64le",
"product_id": "kernel-default-devel-4.4.121-92.125.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.4.121-92.125.1.ppc64le",
"product": {
"name": "kernel-default-extra-4.4.121-92.125.1.ppc64le",
"product_id": "kernel-default-extra-4.4.121-92.125.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.4.121-92.125.1.ppc64le",
"product": {
"name": "kernel-default-kgraft-4.4.121-92.125.1.ppc64le",
"product_id": "kernel-default-kgraft-4.4.121-92.125.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.4.121-92.125.1.ppc64le",
"product": {
"name": "kernel-obs-build-4.4.121-92.125.1.ppc64le",
"product_id": "kernel-obs-build-4.4.121-92.125.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.4.121-92.125.1.ppc64le",
"product": {
"name": "kernel-obs-qa-4.4.121-92.125.1.ppc64le",
"product_id": "kernel-obs-qa-4.4.121-92.125.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.4.121-92.125.1.ppc64le",
"product": {
"name": "kernel-syms-4.4.121-92.125.1.ppc64le",
"product_id": "kernel-syms-4.4.121-92.125.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.4.121-92.125.1.ppc64le",
"product": {
"name": "kernel-vanilla-4.4.121-92.125.1.ppc64le",
"product_id": "kernel-vanilla-4.4.121-92.125.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.4.121-92.125.1.ppc64le",
"product": {
"name": "kernel-vanilla-base-4.4.121-92.125.1.ppc64le",
"product_id": "kernel-vanilla-base-4.4.121-92.125.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.4.121-92.125.1.ppc64le",
"product": {
"name": "kernel-vanilla-devel-4.4.121-92.125.1.ppc64le",
"product_id": "kernel-vanilla-devel-4.4.121-92.125.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"product": {
"name": "kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"product_id": "kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-debug-4.4.121-92.125.1.ppc64le",
"product": {
"name": "ocfs2-kmp-debug-4.4.121-92.125.1.ppc64le",
"product_id": "ocfs2-kmp-debug-4.4.121-92.125.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"product": {
"name": "ocfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"product_id": "ocfs2-kmp-default-4.4.121-92.125.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-vanilla-4.4.121-92.125.1.ppc64le",
"product": {
"name": "ocfs2-kmp-vanilla-4.4.121-92.125.1.ppc64le",
"product_id": "ocfs2-kmp-vanilla-4.4.121-92.125.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.4.121-92.125.1.s390x",
"product": {
"name": "cluster-md-kmp-default-4.4.121-92.125.1.s390x",
"product_id": "cluster-md-kmp-default-4.4.121-92.125.1.s390x"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-vanilla-4.4.121-92.125.1.s390x",
"product": {
"name": "cluster-md-kmp-vanilla-4.4.121-92.125.1.s390x",
"product_id": "cluster-md-kmp-vanilla-4.4.121-92.125.1.s390x"
}
},
{
"category": "product_version",
"name": "cluster-network-kmp-default-4.4.121-92.125.1.s390x",
"product": {
"name": "cluster-network-kmp-default-4.4.121-92.125.1.s390x",
"product_id": "cluster-network-kmp-default-4.4.121-92.125.1.s390x"
}
},
{
"category": "product_version",
"name": "cluster-network-kmp-vanilla-4.4.121-92.125.1.s390x",
"product": {
"name": "cluster-network-kmp-vanilla-4.4.121-92.125.1.s390x",
"product_id": "cluster-network-kmp-vanilla-4.4.121-92.125.1.s390x"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.4.121-92.125.1.s390x",
"product": {
"name": "dlm-kmp-default-4.4.121-92.125.1.s390x",
"product_id": "dlm-kmp-default-4.4.121-92.125.1.s390x"
}
},
{
"category": "product_version",
"name": "dlm-kmp-vanilla-4.4.121-92.125.1.s390x",
"product": {
"name": "dlm-kmp-vanilla-4.4.121-92.125.1.s390x",
"product_id": "dlm-kmp-vanilla-4.4.121-92.125.1.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.4.121-92.125.1.s390x",
"product": {
"name": "gfs2-kmp-default-4.4.121-92.125.1.s390x",
"product_id": "gfs2-kmp-default-4.4.121-92.125.1.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-vanilla-4.4.121-92.125.1.s390x",
"product": {
"name": "gfs2-kmp-vanilla-4.4.121-92.125.1.s390x",
"product_id": "gfs2-kmp-vanilla-4.4.121-92.125.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-4.4.121-92.125.1.s390x",
"product": {
"name": "kernel-default-4.4.121-92.125.1.s390x",
"product_id": "kernel-default-4.4.121-92.125.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.4.121-92.125.1.s390x",
"product": {
"name": "kernel-default-base-4.4.121-92.125.1.s390x",
"product_id": "kernel-default-base-4.4.121-92.125.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.4.121-92.125.1.s390x",
"product": {
"name": "kernel-default-devel-4.4.121-92.125.1.s390x",
"product_id": "kernel-default-devel-4.4.121-92.125.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.4.121-92.125.1.s390x",
"product": {
"name": "kernel-default-extra-4.4.121-92.125.1.s390x",
"product_id": "kernel-default-extra-4.4.121-92.125.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.4.121-92.125.1.s390x",
"product": {
"name": "kernel-default-kgraft-4.4.121-92.125.1.s390x",
"product_id": "kernel-default-kgraft-4.4.121-92.125.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-man-4.4.121-92.125.1.s390x",
"product": {
"name": "kernel-default-man-4.4.121-92.125.1.s390x",
"product_id": "kernel-default-man-4.4.121-92.125.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.4.121-92.125.1.s390x",
"product": {
"name": "kernel-obs-build-4.4.121-92.125.1.s390x",
"product_id": "kernel-obs-build-4.4.121-92.125.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.4.121-92.125.1.s390x",
"product": {
"name": "kernel-obs-qa-4.4.121-92.125.1.s390x",
"product_id": "kernel-obs-qa-4.4.121-92.125.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.4.121-92.125.1.s390x",
"product": {
"name": "kernel-syms-4.4.121-92.125.1.s390x",
"product_id": "kernel-syms-4.4.121-92.125.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.4.121-92.125.1.s390x",
"product": {
"name": "kernel-vanilla-4.4.121-92.125.1.s390x",
"product_id": "kernel-vanilla-4.4.121-92.125.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.4.121-92.125.1.s390x",
"product": {
"name": "kernel-vanilla-base-4.4.121-92.125.1.s390x",
"product_id": "kernel-vanilla-base-4.4.121-92.125.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.4.121-92.125.1.s390x",
"product": {
"name": "kernel-vanilla-devel-4.4.121-92.125.1.s390x",
"product_id": "kernel-vanilla-devel-4.4.121-92.125.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-4.4.121-92.125.1.s390x",
"product": {
"name": "kernel-zfcpdump-4.4.121-92.125.1.s390x",
"product_id": "kernel-zfcpdump-4.4.121-92.125.1.s390x"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.4.121-92.125.1.s390x",
"product": {
"name": "ocfs2-kmp-default-4.4.121-92.125.1.s390x",
"product_id": "ocfs2-kmp-default-4.4.121-92.125.1.s390x"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-vanilla-4.4.121-92.125.1.s390x",
"product": {
"name": "ocfs2-kmp-vanilla-4.4.121-92.125.1.s390x",
"product_id": "ocfs2-kmp-vanilla-4.4.121-92.125.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-debug-4.4.121-92.125.1.x86_64",
"product": {
"name": "cluster-md-kmp-debug-4.4.121-92.125.1.x86_64",
"product_id": "cluster-md-kmp-debug-4.4.121-92.125.1.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.4.121-92.125.1.x86_64",
"product": {
"name": "cluster-md-kmp-default-4.4.121-92.125.1.x86_64",
"product_id": "cluster-md-kmp-default-4.4.121-92.125.1.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-vanilla-4.4.121-92.125.1.x86_64",
"product": {
"name": "cluster-md-kmp-vanilla-4.4.121-92.125.1.x86_64",
"product_id": "cluster-md-kmp-vanilla-4.4.121-92.125.1.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-network-kmp-debug-4.4.121-92.125.1.x86_64",
"product": {
"name": "cluster-network-kmp-debug-4.4.121-92.125.1.x86_64",
"product_id": "cluster-network-kmp-debug-4.4.121-92.125.1.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-network-kmp-default-4.4.121-92.125.1.x86_64",
"product": {
"name": "cluster-network-kmp-default-4.4.121-92.125.1.x86_64",
"product_id": "cluster-network-kmp-default-4.4.121-92.125.1.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-network-kmp-vanilla-4.4.121-92.125.1.x86_64",
"product": {
"name": "cluster-network-kmp-vanilla-4.4.121-92.125.1.x86_64",
"product_id": "cluster-network-kmp-vanilla-4.4.121-92.125.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-debug-4.4.121-92.125.1.x86_64",
"product": {
"name": "dlm-kmp-debug-4.4.121-92.125.1.x86_64",
"product_id": "dlm-kmp-debug-4.4.121-92.125.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.4.121-92.125.1.x86_64",
"product": {
"name": "dlm-kmp-default-4.4.121-92.125.1.x86_64",
"product_id": "dlm-kmp-default-4.4.121-92.125.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-vanilla-4.4.121-92.125.1.x86_64",
"product": {
"name": "dlm-kmp-vanilla-4.4.121-92.125.1.x86_64",
"product_id": "dlm-kmp-vanilla-4.4.121-92.125.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-debug-4.4.121-92.125.1.x86_64",
"product": {
"name": "gfs2-kmp-debug-4.4.121-92.125.1.x86_64",
"product_id": "gfs2-kmp-debug-4.4.121-92.125.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.4.121-92.125.1.x86_64",
"product": {
"name": "gfs2-kmp-default-4.4.121-92.125.1.x86_64",
"product_id": "gfs2-kmp-default-4.4.121-92.125.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-vanilla-4.4.121-92.125.1.x86_64",
"product": {
"name": "gfs2-kmp-vanilla-4.4.121-92.125.1.x86_64",
"product_id": "gfs2-kmp-vanilla-4.4.121-92.125.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-4.4.121-92.125.1.x86_64",
"product": {
"name": "kernel-debug-4.4.121-92.125.1.x86_64",
"product_id": "kernel-debug-4.4.121-92.125.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-4.4.121-92.125.1.x86_64",
"product": {
"name": "kernel-debug-base-4.4.121-92.125.1.x86_64",
"product_id": "kernel-debug-base-4.4.121-92.125.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-4.4.121-92.125.1.x86_64",
"product": {
"name": "kernel-debug-devel-4.4.121-92.125.1.x86_64",
"product_id": "kernel-debug-devel-4.4.121-92.125.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-extra-4.4.121-92.125.1.x86_64",
"product": {
"name": "kernel-debug-extra-4.4.121-92.125.1.x86_64",
"product_id": "kernel-debug-extra-4.4.121-92.125.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-kgraft-4.4.121-92.125.1.x86_64",
"product": {
"name": "kernel-debug-kgraft-4.4.121-92.125.1.x86_64",
"product_id": "kernel-debug-kgraft-4.4.121-92.125.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-4.4.121-92.125.1.x86_64",
"product": {
"name": "kernel-default-4.4.121-92.125.1.x86_64",
"product_id": "kernel-default-4.4.121-92.125.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.4.121-92.125.1.x86_64",
"product": {
"name": "kernel-default-base-4.4.121-92.125.1.x86_64",
"product_id": "kernel-default-base-4.4.121-92.125.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.4.121-92.125.1.x86_64",
"product": {
"name": "kernel-default-devel-4.4.121-92.125.1.x86_64",
"product_id": "kernel-default-devel-4.4.121-92.125.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.4.121-92.125.1.x86_64",
"product": {
"name": "kernel-default-extra-4.4.121-92.125.1.x86_64",
"product_id": "kernel-default-extra-4.4.121-92.125.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.4.121-92.125.1.x86_64",
"product": {
"name": "kernel-default-kgraft-4.4.121-92.125.1.x86_64",
"product_id": "kernel-default-kgraft-4.4.121-92.125.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.4.121-92.125.1.x86_64",
"product": {
"name": "kernel-obs-build-4.4.121-92.125.1.x86_64",
"product_id": "kernel-obs-build-4.4.121-92.125.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.4.121-92.125.1.x86_64",
"product": {
"name": "kernel-obs-qa-4.4.121-92.125.1.x86_64",
"product_id": "kernel-obs-qa-4.4.121-92.125.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.4.121-92.125.1.x86_64",
"product": {
"name": "kernel-syms-4.4.121-92.125.1.x86_64",
"product_id": "kernel-syms-4.4.121-92.125.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.4.121-92.125.1.x86_64",
"product": {
"name": "kernel-vanilla-4.4.121-92.125.1.x86_64",
"product_id": "kernel-vanilla-4.4.121-92.125.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.4.121-92.125.1.x86_64",
"product": {
"name": "kernel-vanilla-base-4.4.121-92.125.1.x86_64",
"product_id": "kernel-vanilla-base-4.4.121-92.125.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.4.121-92.125.1.x86_64",
"product": {
"name": "kernel-vanilla-devel-4.4.121-92.125.1.x86_64",
"product_id": "kernel-vanilla-devel-4.4.121-92.125.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"product": {
"name": "kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"product_id": "kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-debug-4.4.121-92.125.1.x86_64",
"product": {
"name": "ocfs2-kmp-debug-4.4.121-92.125.1.x86_64",
"product_id": "ocfs2-kmp-debug-4.4.121-92.125.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.4.121-92.125.1.x86_64",
"product": {
"name": "ocfs2-kmp-default-4.4.121-92.125.1.x86_64",
"product_id": "ocfs2-kmp-default-4.4.121-92.125.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-vanilla-4.4.121-92.125.1.x86_64",
"product": {
"name": "ocfs2-kmp-vanilla-4.4.121-92.125.1.x86_64",
"product_id": "ocfs2-kmp-vanilla-4.4.121-92.125.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE OpenStack Cloud 7",
"product": {
"name": "SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-openstack-cloud:7"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Availability Extension 12 SP2",
"product": {
"name": "SUSE Linux Enterprise High Availability Extension 12 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-ha:12:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP2-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP2-BCL",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-bcl:12:sp2"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.121-92.125.1.s390x as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x"
},
"product_reference": "kernel-default-4.4.121-92.125.1.s390x",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.121-92.125.1.x86_64 as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64"
},
"product_reference": "kernel-default-4.4.121-92.125.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.121-92.125.1.s390x as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x"
},
"product_reference": "kernel-default-base-4.4.121-92.125.1.s390x",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.121-92.125.1.x86_64 as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64"
},
"product_reference": "kernel-default-base-4.4.121-92.125.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.121-92.125.1.s390x as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x"
},
"product_reference": "kernel-default-devel-4.4.121-92.125.1.s390x",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.121-92.125.1.x86_64 as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64"
},
"product_reference": "kernel-default-devel-4.4.121-92.125.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-4.4.121-92.125.1.s390x as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x"
},
"product_reference": "kernel-default-man-4.4.121-92.125.1.s390x",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.4.121-92.125.1.noarch as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch"
},
"product_reference": "kernel-devel-4.4.121-92.125.1.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.4.121-92.125.1.noarch as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch"
},
"product_reference": "kernel-macros-4.4.121-92.125.1.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.4.121-92.125.1.noarch as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch"
},
"product_reference": "kernel-source-4.4.121-92.125.1.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.121-92.125.1.s390x as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x"
},
"product_reference": "kernel-syms-4.4.121-92.125.1.s390x",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.121-92.125.1.x86_64 as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64"
},
"product_reference": "kernel-syms-4.4.121-92.125.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64 as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.4.121-92.125.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le"
},
"product_reference": "cluster-md-kmp-default-4.4.121-92.125.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.4.121-92.125.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x"
},
"product_reference": "cluster-md-kmp-default-4.4.121-92.125.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.4.121-92.125.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64"
},
"product_reference": "cluster-md-kmp-default-4.4.121-92.125.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-network-kmp-default-4.4.121-92.125.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le"
},
"product_reference": "cluster-network-kmp-default-4.4.121-92.125.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-network-kmp-default-4.4.121-92.125.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x"
},
"product_reference": "cluster-network-kmp-default-4.4.121-92.125.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-network-kmp-default-4.4.121-92.125.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64"
},
"product_reference": "cluster-network-kmp-default-4.4.121-92.125.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.4.121-92.125.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le"
},
"product_reference": "dlm-kmp-default-4.4.121-92.125.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.4.121-92.125.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x"
},
"product_reference": "dlm-kmp-default-4.4.121-92.125.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.4.121-92.125.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64"
},
"product_reference": "dlm-kmp-default-4.4.121-92.125.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.4.121-92.125.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le"
},
"product_reference": "gfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.4.121-92.125.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x"
},
"product_reference": "gfs2-kmp-default-4.4.121-92.125.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.4.121-92.125.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64"
},
"product_reference": "gfs2-kmp-default-4.4.121-92.125.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.4.121-92.125.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le"
},
"product_reference": "ocfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.4.121-92.125.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x"
},
"product_reference": "ocfs2-kmp-default-4.4.121-92.125.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.4.121-92.125.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64"
},
"product_reference": "ocfs2-kmp-default-4.4.121-92.125.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.121-92.125.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le"
},
"product_reference": "kernel-default-4.4.121-92.125.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.121-92.125.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64"
},
"product_reference": "kernel-default-4.4.121-92.125.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.121-92.125.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le"
},
"product_reference": "kernel-default-base-4.4.121-92.125.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.121-92.125.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64"
},
"product_reference": "kernel-default-base-4.4.121-92.125.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.121-92.125.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le"
},
"product_reference": "kernel-default-devel-4.4.121-92.125.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.121-92.125.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64"
},
"product_reference": "kernel-default-devel-4.4.121-92.125.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.4.121-92.125.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch"
},
"product_reference": "kernel-devel-4.4.121-92.125.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.4.121-92.125.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch"
},
"product_reference": "kernel-macros-4.4.121-92.125.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.4.121-92.125.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch"
},
"product_reference": "kernel-source-4.4.121-92.125.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.121-92.125.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le"
},
"product_reference": "kernel-syms-4.4.121-92.125.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.121-92.125.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64"
},
"product_reference": "kernel-syms-4.4.121-92.125.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.121-92.125.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le"
},
"product_reference": "kernel-default-4.4.121-92.125.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.121-92.125.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x"
},
"product_reference": "kernel-default-4.4.121-92.125.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.121-92.125.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64"
},
"product_reference": "kernel-default-4.4.121-92.125.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.121-92.125.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le"
},
"product_reference": "kernel-default-base-4.4.121-92.125.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.121-92.125.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x"
},
"product_reference": "kernel-default-base-4.4.121-92.125.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.121-92.125.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64"
},
"product_reference": "kernel-default-base-4.4.121-92.125.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.121-92.125.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le"
},
"product_reference": "kernel-default-devel-4.4.121-92.125.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.121-92.125.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x"
},
"product_reference": "kernel-default-devel-4.4.121-92.125.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.121-92.125.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64"
},
"product_reference": "kernel-default-devel-4.4.121-92.125.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-4.4.121-92.125.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x"
},
"product_reference": "kernel-default-man-4.4.121-92.125.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.4.121-92.125.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch"
},
"product_reference": "kernel-devel-4.4.121-92.125.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.4.121-92.125.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch"
},
"product_reference": "kernel-macros-4.4.121-92.125.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.4.121-92.125.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch"
},
"product_reference": "kernel-source-4.4.121-92.125.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.121-92.125.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le"
},
"product_reference": "kernel-syms-4.4.121-92.125.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.121-92.125.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x"
},
"product_reference": "kernel-syms-4.4.121-92.125.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.121-92.125.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64"
},
"product_reference": "kernel-syms-4.4.121-92.125.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.121-92.125.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64"
},
"product_reference": "kernel-default-4.4.121-92.125.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.121-92.125.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64"
},
"product_reference": "kernel-default-base-4.4.121-92.125.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.121-92.125.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64"
},
"product_reference": "kernel-default-devel-4.4.121-92.125.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.4.121-92.125.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch"
},
"product_reference": "kernel-devel-4.4.121-92.125.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.4.121-92.125.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch"
},
"product_reference": "kernel-macros-4.4.121-92.125.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.4.121-92.125.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch"
},
"product_reference": "kernel-source-4.4.121-92.125.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.121-92.125.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64"
},
"product_reference": "kernel-syms-4.4.121-92.125.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2016-10906",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-10906"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in drivers/net/ethernet/arc/emac_main.c in the Linux kernel before 4.5. A use-after-free is caused by a race condition between the functions arc_emac_tx and arc_emac_tx_clean.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-10906",
"url": "https://www.suse.com/security/cve/CVE-2016-10906"
},
{
"category": "external",
"summary": "SUSE Bug 1146584 for CVE-2016-10906",
"url": "https://bugzilla.suse.com/1146584"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-20T10:32:05Z",
"details": "moderate"
}
],
"title": "CVE-2016-10906"
},
{
"cve": "CVE-2017-18509",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-18509"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in net/ipv6/ip6mr.c in the Linux kernel before 4.11. By setting a specific socket option, an attacker can control a pointer in kernel land and cause an inet_csk_listen_stop general protection fault, or potentially execute arbitrary code under certain circumstances. The issue can be triggered as root (e.g., inside a default LXC container or with the CAP_NET_ADMIN capability) or after namespace unsharing. This occurs because sk_type and protocol are not checked in the appropriate part of the ip6_mroute_* functions. NOTE: this affects Linux distributions that use 4.9.x longterm kernels before 4.9.187.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-18509",
"url": "https://www.suse.com/security/cve/CVE-2017-18509"
},
{
"category": "external",
"summary": "SUSE Bug 1145477 for CVE-2017-18509",
"url": "https://bugzilla.suse.com/1145477"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-20T10:32:05Z",
"details": "moderate"
}
],
"title": "CVE-2017-18509"
},
{
"cve": "CVE-2017-18595",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-18595"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 4.14.11. A double free may be caused by the function allocate_trace_buffer in the file kernel/trace/trace.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-18595",
"url": "https://www.suse.com/security/cve/CVE-2017-18595"
},
{
"category": "external",
"summary": "SUSE Bug 1149555 for CVE-2017-18595",
"url": "https://bugzilla.suse.com/1149555"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-20T10:32:05Z",
"details": "moderate"
}
],
"title": "CVE-2017-18595"
},
{
"cve": "CVE-2018-12207",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-12207"
}
],
"notes": [
{
"category": "general",
"text": "Improper invalidation for page table updates by a virtual guest operating system for multiple Intel(R) Processors may allow an authenticated user to potentially enable denial of service of the host system via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-12207",
"url": "https://www.suse.com/security/cve/CVE-2018-12207"
},
{
"category": "external",
"summary": "SUSE Bug 1117665 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1117665"
},
{
"category": "external",
"summary": "SUSE Bug 1139073 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1139073"
},
{
"category": "external",
"summary": "SUSE Bug 1152505 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1152505"
},
{
"category": "external",
"summary": "SUSE Bug 1155812 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1155812"
},
{
"category": "external",
"summary": "SUSE Bug 1155817 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1155817"
},
{
"category": "external",
"summary": "SUSE Bug 1155945 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1155945"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1201877"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-20T10:32:05Z",
"details": "moderate"
}
],
"title": "CVE-2018-12207"
},
{
"cve": "CVE-2018-20976",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-20976"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in fs/xfs/xfs_super.c in the Linux kernel before 4.18. A use after free exists, related to xfs_fs_fill_super failure.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-20976",
"url": "https://www.suse.com/security/cve/CVE-2018-20976"
},
{
"category": "external",
"summary": "SUSE Bug 1146285 for CVE-2018-20976",
"url": "https://bugzilla.suse.com/1146285"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-20T10:32:05Z",
"details": "moderate"
}
],
"title": "CVE-2018-20976"
},
{
"cve": "CVE-2019-0154",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-0154"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient access control in subsystem for Intel (R) processor graphics in 6th, 7th, 8th and 9th Generation Intel(R) Core(TM) Processor Families; Intel(R) Pentium(R) Processor J, N, Silver and Gold Series; Intel(R) Celeron(R) Processor J, N, G3900 and G4900 Series; Intel(R) Atom(R) Processor A and E3900 Series; Intel(R) Xeon(R) Processor E3-1500 v5 and v6 and E-2100 Processor Families may allow an authenticated user to potentially enable denial of service via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-0154",
"url": "https://www.suse.com/security/cve/CVE-2019-0154"
},
{
"category": "external",
"summary": "SUSE Bug 1135966 for CVE-2019-0154",
"url": "https://bugzilla.suse.com/1135966"
},
{
"category": "external",
"summary": "SUSE Bug 1181720 for CVE-2019-0154",
"url": "https://bugzilla.suse.com/1181720"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-20T10:32:05Z",
"details": "important"
}
],
"title": "CVE-2019-0154"
},
{
"cve": "CVE-2019-0155",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-0155"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient access control in a subsystem for Intel (R) processor graphics in 6th, 7th, 8th and 9th Generation Intel(R) Core(TM) Processor Families; Intel(R) Pentium(R) Processor J, N, Silver and Gold Series; Intel(R) Celeron(R) Processor J, N, G3900 and G4900 Series; Intel(R) Atom(R) Processor A and E3900 Series; Intel(R) Xeon(R) Processor E3-1500 v5 and v6, E-2100 and E-2200 Processor Families; Intel(R) Graphics Driver for Windows before 26.20.100.6813 (DCH) or 26.20.100.6812 and before 21.20.x.5077 (aka15.45.5077), i915 Linux Driver for Intel(R) Processor Graphics before versions 5.4-rc7, 5.3.11, 4.19.84, 4.14.154, 4.9.201, 4.4.201 may allow an authenticated user to potentially enable escalation of privilege via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-0155",
"url": "https://www.suse.com/security/cve/CVE-2019-0155"
},
{
"category": "external",
"summary": "SUSE Bug 1135966 for CVE-2019-0155",
"url": "https://bugzilla.suse.com/1135966"
},
{
"category": "external",
"summary": "SUSE Bug 1135967 for CVE-2019-0155",
"url": "https://bugzilla.suse.com/1135967"
},
{
"category": "external",
"summary": "SUSE Bug 1173663 for CVE-2019-0155",
"url": "https://bugzilla.suse.com/1173663"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-20T10:32:05Z",
"details": "important"
}
],
"title": "CVE-2019-0155"
},
{
"cve": "CVE-2019-10220",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-10220"
}
],
"notes": [
{
"category": "general",
"text": "Linux kernel CIFS implementation, version 4.9.0 is vulnerable to a relative paths injection in directory entry lists.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-10220",
"url": "https://www.suse.com/security/cve/CVE-2019-10220"
},
{
"category": "external",
"summary": "SUSE Bug 1144903 for CVE-2019-10220",
"url": "https://bugzilla.suse.com/1144903"
},
{
"category": "external",
"summary": "SUSE Bug 1153108 for CVE-2019-10220",
"url": "https://bugzilla.suse.com/1153108"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-20T10:32:05Z",
"details": "important"
}
],
"title": "CVE-2019-10220"
},
{
"cve": "CVE-2019-11135",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11135"
}
],
"notes": [
{
"category": "general",
"text": "TSX Asynchronous Abort condition on some CPUs utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11135",
"url": "https://www.suse.com/security/cve/CVE-2019-11135"
},
{
"category": "external",
"summary": "SUSE Bug 1139073 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1139073"
},
{
"category": "external",
"summary": "SUSE Bug 1152497 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1152497"
},
{
"category": "external",
"summary": "SUSE Bug 1152505 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1152505"
},
{
"category": "external",
"summary": "SUSE Bug 1152506 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1152506"
},
{
"category": "external",
"summary": "SUSE Bug 1160120 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1160120"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1201877"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-20T10:32:05Z",
"details": "moderate"
}
],
"title": "CVE-2019-11135"
},
{
"cve": "CVE-2019-13272",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-13272"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel before 5.1.17, ptrace_link in kernel/ptrace.c mishandles the recording of the credentials of a process that wants to create a ptrace relationship, which allows local users to obtain root access by leveraging certain scenarios with a parent-child process relationship, where a parent drops privileges and calls execve (potentially allowing control by an attacker). One contributing factor is an object lifetime issue (which can also cause a panic). Another contributing factor is incorrect marking of a ptrace relationship as privileged, which is exploitable through (for example) Polkit\u0027s pkexec helper with PTRACE_TRACEME. NOTE: SELinux deny_ptrace might be a usable workaround in some environments.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-13272",
"url": "https://www.suse.com/security/cve/CVE-2019-13272"
},
{
"category": "external",
"summary": "SUSE Bug 1140671 for CVE-2019-13272",
"url": "https://bugzilla.suse.com/1140671"
},
{
"category": "external",
"summary": "SUSE Bug 1156321 for CVE-2019-13272",
"url": "https://bugzilla.suse.com/1156321"
},
{
"category": "external",
"summary": "SUSE Bug 1198122 for CVE-2019-13272",
"url": "https://bugzilla.suse.com/1198122"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-20T10:32:05Z",
"details": "important"
}
],
"title": "CVE-2019-13272"
},
{
"cve": "CVE-2019-14814",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-14814"
}
],
"notes": [
{
"category": "general",
"text": "There is heap-based buffer overflow in Linux kernel, all versions up to, excluding 5.3, in the marvell wifi chip driver in Linux kernel, that allows local users to cause a denial of service(system crash) or possibly execute arbitrary code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-14814",
"url": "https://www.suse.com/security/cve/CVE-2019-14814"
},
{
"category": "external",
"summary": "SUSE Bug 1146512 for CVE-2019-14814",
"url": "https://bugzilla.suse.com/1146512"
},
{
"category": "external",
"summary": "SUSE Bug 1173664 for CVE-2019-14814",
"url": "https://bugzilla.suse.com/1173664"
},
{
"category": "external",
"summary": "SUSE Bug 1173665 for CVE-2019-14814",
"url": "https://bugzilla.suse.com/1173665"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-20T10:32:05Z",
"details": "important"
}
],
"title": "CVE-2019-14814"
},
{
"cve": "CVE-2019-14815",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-14815"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability was found in Linux Kernel, where a Heap Overflow was found in mwifiex_set_wmm_params() function of Marvell Wifi Driver.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-14815",
"url": "https://www.suse.com/security/cve/CVE-2019-14815"
},
{
"category": "external",
"summary": "SUSE Bug 1146514 for CVE-2019-14815",
"url": "https://bugzilla.suse.com/1146514"
},
{
"category": "external",
"summary": "SUSE Bug 1173665 for CVE-2019-14815",
"url": "https://bugzilla.suse.com/1173665"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-20T10:32:05Z",
"details": "important"
}
],
"title": "CVE-2019-14815"
},
{
"cve": "CVE-2019-14816",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-14816"
}
],
"notes": [
{
"category": "general",
"text": "There is heap-based buffer overflow in kernel, all versions up to, excluding 5.3, in the marvell wifi chip driver in Linux kernel, that allows local users to cause a denial of service(system crash) or possibly execute arbitrary code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-14816",
"url": "https://www.suse.com/security/cve/CVE-2019-14816"
},
{
"category": "external",
"summary": "SUSE Bug 1146516 for CVE-2019-14816",
"url": "https://bugzilla.suse.com/1146516"
},
{
"category": "external",
"summary": "SUSE Bug 1173666 for CVE-2019-14816",
"url": "https://bugzilla.suse.com/1173666"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-20T10:32:05Z",
"details": "important"
}
],
"title": "CVE-2019-14816"
},
{
"cve": "CVE-2019-14821",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-14821"
}
],
"notes": [
{
"category": "general",
"text": "An out-of-bounds access issue was found in the Linux kernel, all versions through 5.3, in the way Linux kernel\u0027s KVM hypervisor implements the Coalesced MMIO write operation. It operates on an MMIO ring buffer \u0027struct kvm_coalesced_mmio\u0027 object, wherein write indices \u0027ring-\u003efirst\u0027 and \u0027ring-\u003elast\u0027 value could be supplied by a host user-space process. An unprivileged host user or process with access to \u0027/dev/kvm\u0027 device could use this flaw to crash the host kernel, resulting in a denial of service or potentially escalating privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-14821",
"url": "https://www.suse.com/security/cve/CVE-2019-14821"
},
{
"category": "external",
"summary": "SUSE Bug 1151350 for CVE-2019-14821",
"url": "https://bugzilla.suse.com/1151350"
},
{
"category": "external",
"summary": "SUSE Bug 1218966 for CVE-2019-14821",
"url": "https://bugzilla.suse.com/1218966"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-20T10:32:05Z",
"details": "moderate"
}
],
"title": "CVE-2019-14821"
},
{
"cve": "CVE-2019-14835",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-14835"
}
],
"notes": [
{
"category": "general",
"text": "A buffer overflow flaw was found, in versions from 2.6.34 to 5.2.x, in the way Linux kernel\u0027s vhost functionality that translates virtqueue buffers to IOVs, logged the buffer descriptors during migration. A privileged guest user able to pass descriptors with invalid length to the host when migration is underway, could use this flaw to increase their privileges on the host.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-14835",
"url": "https://www.suse.com/security/cve/CVE-2019-14835"
},
{
"category": "external",
"summary": "SUSE Bug 1150112 for CVE-2019-14835",
"url": "https://bugzilla.suse.com/1150112"
},
{
"category": "external",
"summary": "SUSE Bug 1151021 for CVE-2019-14835",
"url": "https://bugzilla.suse.com/1151021"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-20T10:32:05Z",
"details": "important"
}
],
"title": "CVE-2019-14835"
},
{
"cve": "CVE-2019-15098",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15098"
}
],
"notes": [
{
"category": "general",
"text": "drivers/net/wireless/ath/ath6kl/usb.c in the Linux kernel through 5.2.9 has a NULL pointer dereference via an incomplete address in an endpoint descriptor.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15098",
"url": "https://www.suse.com/security/cve/CVE-2019-15098"
},
{
"category": "external",
"summary": "SUSE Bug 1146378 for CVE-2019-15098",
"url": "https://bugzilla.suse.com/1146378"
},
{
"category": "external",
"summary": "SUSE Bug 1146543 for CVE-2019-15098",
"url": "https://bugzilla.suse.com/1146543"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-20T10:32:05Z",
"details": "moderate"
}
],
"title": "CVE-2019-15098"
},
{
"cve": "CVE-2019-15211",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15211"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.2.6. There is a use-after-free caused by a malicious USB device in the drivers/media/v4l2-core/v4l2-dev.c driver because drivers/media/radio/radio-raremono.c does not properly allocate memory.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15211",
"url": "https://www.suse.com/security/cve/CVE-2019-15211"
},
{
"category": "external",
"summary": "SUSE Bug 1146519 for CVE-2019-15211",
"url": "https://bugzilla.suse.com/1146519"
},
{
"category": "external",
"summary": "SUSE Bug 1158381 for CVE-2019-15211",
"url": "https://bugzilla.suse.com/1158381"
},
{
"category": "external",
"summary": "SUSE Bug 1158834 for CVE-2019-15211",
"url": "https://bugzilla.suse.com/1158834"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-20T10:32:05Z",
"details": "moderate"
}
],
"title": "CVE-2019-15211"
},
{
"cve": "CVE-2019-15212",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15212"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.1.8. There is a double-free caused by a malicious USB device in the drivers/usb/misc/rio500.c driver.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15212",
"url": "https://www.suse.com/security/cve/CVE-2019-15212"
},
{
"category": "external",
"summary": "SUSE Bug 1146391 for CVE-2019-15212",
"url": "https://bugzilla.suse.com/1146391"
},
{
"category": "external",
"summary": "SUSE Bug 1146519 for CVE-2019-15212",
"url": "https://bugzilla.suse.com/1146519"
},
{
"category": "external",
"summary": "SUSE Bug 1158381 for CVE-2019-15212",
"url": "https://bugzilla.suse.com/1158381"
},
{
"category": "external",
"summary": "SUSE Bug 1158834 for CVE-2019-15212",
"url": "https://bugzilla.suse.com/1158834"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-20T10:32:05Z",
"details": "moderate"
}
],
"title": "CVE-2019-15212"
},
{
"cve": "CVE-2019-15214",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15214"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.0.10. There is a use-after-free in the sound subsystem because card disconnection causes certain data structures to be deleted too early. This is related to sound/core/init.c and sound/core/info.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15214",
"url": "https://www.suse.com/security/cve/CVE-2019-15214"
},
{
"category": "external",
"summary": "SUSE Bug 1146519 for CVE-2019-15214",
"url": "https://bugzilla.suse.com/1146519"
},
{
"category": "external",
"summary": "SUSE Bug 1146550 for CVE-2019-15214",
"url": "https://bugzilla.suse.com/1146550"
},
{
"category": "external",
"summary": "SUSE Bug 1158381 for CVE-2019-15214",
"url": "https://bugzilla.suse.com/1158381"
},
{
"category": "external",
"summary": "SUSE Bug 1158834 for CVE-2019-15214",
"url": "https://bugzilla.suse.com/1158834"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-20T10:32:05Z",
"details": "low"
}
],
"title": "CVE-2019-15214"
},
{
"cve": "CVE-2019-15215",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15215"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.2.6. There is a use-after-free caused by a malicious USB device in the drivers/media/usb/cpia2/cpia2_usb.c driver.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15215",
"url": "https://www.suse.com/security/cve/CVE-2019-15215"
},
{
"category": "external",
"summary": "SUSE Bug 1146425 for CVE-2019-15215",
"url": "https://bugzilla.suse.com/1146425"
},
{
"category": "external",
"summary": "SUSE Bug 1146519 for CVE-2019-15215",
"url": "https://bugzilla.suse.com/1146519"
},
{
"category": "external",
"summary": "SUSE Bug 1158381 for CVE-2019-15215",
"url": "https://bugzilla.suse.com/1158381"
},
{
"category": "external",
"summary": "SUSE Bug 1158834 for CVE-2019-15215",
"url": "https://bugzilla.suse.com/1158834"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-20T10:32:05Z",
"details": "moderate"
}
],
"title": "CVE-2019-15215"
},
{
"cve": "CVE-2019-15216",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15216"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.0.14. There is a NULL pointer dereference caused by a malicious USB device in the drivers/usb/misc/yurex.c driver.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15216",
"url": "https://www.suse.com/security/cve/CVE-2019-15216"
},
{
"category": "external",
"summary": "SUSE Bug 1146361 for CVE-2019-15216",
"url": "https://bugzilla.suse.com/1146361"
},
{
"category": "external",
"summary": "SUSE Bug 1146519 for CVE-2019-15216",
"url": "https://bugzilla.suse.com/1146519"
},
{
"category": "external",
"summary": "SUSE Bug 1158381 for CVE-2019-15216",
"url": "https://bugzilla.suse.com/1158381"
},
{
"category": "external",
"summary": "SUSE Bug 1158834 for CVE-2019-15216",
"url": "https://bugzilla.suse.com/1158834"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-20T10:32:05Z",
"details": "moderate"
}
],
"title": "CVE-2019-15216"
},
{
"cve": "CVE-2019-15217",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15217"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.2.3. There is a NULL pointer dereference caused by a malicious USB device in the drivers/media/usb/zr364xx/zr364xx.c driver.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15217",
"url": "https://www.suse.com/security/cve/CVE-2019-15217"
},
{
"category": "external",
"summary": "SUSE Bug 1146519 for CVE-2019-15217",
"url": "https://bugzilla.suse.com/1146519"
},
{
"category": "external",
"summary": "SUSE Bug 1146547 for CVE-2019-15217",
"url": "https://bugzilla.suse.com/1146547"
},
{
"category": "external",
"summary": "SUSE Bug 1158381 for CVE-2019-15217",
"url": "https://bugzilla.suse.com/1158381"
},
{
"category": "external",
"summary": "SUSE Bug 1158834 for CVE-2019-15217",
"url": "https://bugzilla.suse.com/1158834"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-20T10:32:05Z",
"details": "moderate"
}
],
"title": "CVE-2019-15217"
},
{
"cve": "CVE-2019-15218",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15218"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.1.8. There is a NULL pointer dereference caused by a malicious USB device in the drivers/media/usb/siano/smsusb.c driver.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15218",
"url": "https://www.suse.com/security/cve/CVE-2019-15218"
},
{
"category": "external",
"summary": "SUSE Bug 1146413 for CVE-2019-15218",
"url": "https://bugzilla.suse.com/1146413"
},
{
"category": "external",
"summary": "SUSE Bug 1146519 for CVE-2019-15218",
"url": "https://bugzilla.suse.com/1146519"
},
{
"category": "external",
"summary": "SUSE Bug 1158381 for CVE-2019-15218",
"url": "https://bugzilla.suse.com/1158381"
},
{
"category": "external",
"summary": "SUSE Bug 1158834 for CVE-2019-15218",
"url": "https://bugzilla.suse.com/1158834"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-20T10:32:05Z",
"details": "moderate"
}
],
"title": "CVE-2019-15218"
},
{
"cve": "CVE-2019-15219",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15219"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.1.8. There is a NULL pointer dereference caused by a malicious USB device in the drivers/usb/misc/sisusbvga/sisusb.c driver.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15219",
"url": "https://www.suse.com/security/cve/CVE-2019-15219"
},
{
"category": "external",
"summary": "SUSE Bug 1146519 for CVE-2019-15219",
"url": "https://bugzilla.suse.com/1146519"
},
{
"category": "external",
"summary": "SUSE Bug 1146524 for CVE-2019-15219",
"url": "https://bugzilla.suse.com/1146524"
},
{
"category": "external",
"summary": "SUSE Bug 1158381 for CVE-2019-15219",
"url": "https://bugzilla.suse.com/1158381"
},
{
"category": "external",
"summary": "SUSE Bug 1158834 for CVE-2019-15219",
"url": "https://bugzilla.suse.com/1158834"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-20T10:32:05Z",
"details": "moderate"
}
],
"title": "CVE-2019-15219"
},
{
"cve": "CVE-2019-15220",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15220"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.2.1. There is a use-after-free caused by a malicious USB device in the drivers/net/wireless/intersil/p54/p54usb.c driver.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15220",
"url": "https://www.suse.com/security/cve/CVE-2019-15220"
},
{
"category": "external",
"summary": "SUSE Bug 1146519 for CVE-2019-15220",
"url": "https://bugzilla.suse.com/1146519"
},
{
"category": "external",
"summary": "SUSE Bug 1146526 for CVE-2019-15220",
"url": "https://bugzilla.suse.com/1146526"
},
{
"category": "external",
"summary": "SUSE Bug 1158381 for CVE-2019-15220",
"url": "https://bugzilla.suse.com/1158381"
},
{
"category": "external",
"summary": "SUSE Bug 1158834 for CVE-2019-15220",
"url": "https://bugzilla.suse.com/1158834"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-20T10:32:05Z",
"details": "moderate"
}
],
"title": "CVE-2019-15220"
},
{
"cve": "CVE-2019-15221",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15221"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.1.17. There is a NULL pointer dereference caused by a malicious USB device in the sound/usb/line6/pcm.c driver.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15221",
"url": "https://www.suse.com/security/cve/CVE-2019-15221"
},
{
"category": "external",
"summary": "SUSE Bug 1146519 for CVE-2019-15221",
"url": "https://bugzilla.suse.com/1146519"
},
{
"category": "external",
"summary": "SUSE Bug 1146529 for CVE-2019-15221",
"url": "https://bugzilla.suse.com/1146529"
},
{
"category": "external",
"summary": "SUSE Bug 1158381 for CVE-2019-15221",
"url": "https://bugzilla.suse.com/1158381"
},
{
"category": "external",
"summary": "SUSE Bug 1158834 for CVE-2019-15221",
"url": "https://bugzilla.suse.com/1158834"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-20T10:32:05Z",
"details": "moderate"
}
],
"title": "CVE-2019-15221"
},
{
"cve": "CVE-2019-15290",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15290"
}
],
"notes": [
{
"category": "general",
"text": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2019-15098. Reason: This candidate is a duplicate of CVE-2019-15098. Notes: All CVE users should reference CVE-2019-15098 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15290",
"url": "https://www.suse.com/security/cve/CVE-2019-15290"
},
{
"category": "external",
"summary": "SUSE Bug 1146378 for CVE-2019-15290",
"url": "https://bugzilla.suse.com/1146378"
},
{
"category": "external",
"summary": "SUSE Bug 1146519 for CVE-2019-15290",
"url": "https://bugzilla.suse.com/1146519"
},
{
"category": "external",
"summary": "SUSE Bug 1146543 for CVE-2019-15290",
"url": "https://bugzilla.suse.com/1146543"
},
{
"category": "external",
"summary": "SUSE Bug 1158381 for CVE-2019-15290",
"url": "https://bugzilla.suse.com/1158381"
},
{
"category": "external",
"summary": "SUSE Bug 1158834 for CVE-2019-15290",
"url": "https://bugzilla.suse.com/1158834"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-20T10:32:05Z",
"details": "moderate"
}
],
"title": "CVE-2019-15290"
},
{
"cve": "CVE-2019-15291",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15291"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel through 5.2.9. There is a NULL pointer dereference caused by a malicious USB device in the flexcop_usb_probe function in the drivers/media/usb/b2c2/flexcop-usb.c driver.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15291",
"url": "https://www.suse.com/security/cve/CVE-2019-15291"
},
{
"category": "external",
"summary": "SUSE Bug 1146519 for CVE-2019-15291",
"url": "https://bugzilla.suse.com/1146519"
},
{
"category": "external",
"summary": "SUSE Bug 1146540 for CVE-2019-15291",
"url": "https://bugzilla.suse.com/1146540"
},
{
"category": "external",
"summary": "SUSE Bug 1158381 for CVE-2019-15291",
"url": "https://bugzilla.suse.com/1158381"
},
{
"category": "external",
"summary": "SUSE Bug 1158834 for CVE-2019-15291",
"url": "https://bugzilla.suse.com/1158834"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-20T10:32:05Z",
"details": "moderate"
}
],
"title": "CVE-2019-15291"
},
{
"cve": "CVE-2019-15505",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15505"
}
],
"notes": [
{
"category": "general",
"text": "drivers/media/usb/dvb-usb/technisat-usb2.c in the Linux kernel through 5.2.9 has an out-of-bounds read via crafted USB device traffic (which may be remote via usbip or usbredir).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15505",
"url": "https://www.suse.com/security/cve/CVE-2019-15505"
},
{
"category": "external",
"summary": "SUSE Bug 1147122 for CVE-2019-15505",
"url": "https://bugzilla.suse.com/1147122"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-20T10:32:05Z",
"details": "moderate"
}
],
"title": "CVE-2019-15505"
},
{
"cve": "CVE-2019-15666",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15666"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.0.19. There is an out-of-bounds array access in __xfrm_policy_unlink, which will cause denial of service, because verify_newpolicy_info in net/xfrm/xfrm_user.c mishandles directory validation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15666",
"url": "https://www.suse.com/security/cve/CVE-2019-15666"
},
{
"category": "external",
"summary": "SUSE Bug 1148394 for CVE-2019-15666",
"url": "https://bugzilla.suse.com/1148394"
},
{
"category": "external",
"summary": "SUSE Bug 1172140 for CVE-2019-15666",
"url": "https://bugzilla.suse.com/1172140"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-20T10:32:05Z",
"details": "important"
}
],
"title": "CVE-2019-15666"
},
{
"cve": "CVE-2019-15807",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15807"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel before 5.1.13, there is a memory leak in drivers/scsi/libsas/sas_expander.c when SAS expander discovery fails. This will cause a BUG and denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15807",
"url": "https://www.suse.com/security/cve/CVE-2019-15807"
},
{
"category": "external",
"summary": "SUSE Bug 1148938 for CVE-2019-15807",
"url": "https://bugzilla.suse.com/1148938"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-20T10:32:05Z",
"details": "moderate"
}
],
"title": "CVE-2019-15807"
},
{
"cve": "CVE-2019-15902",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15902"
}
],
"notes": [
{
"category": "general",
"text": "A backporting error was discovered in the Linux stable/longterm kernel 4.4.x through 4.4.190, 4.9.x through 4.9.190, 4.14.x through 4.14.141, 4.19.x through 4.19.69, and 5.2.x through 5.2.11. Misuse of the upstream \"x86/ptrace: Fix possible spectre-v1 in ptrace_get_debugreg()\" commit reintroduced the Spectre vulnerability that it aimed to eliminate. This occurred because the backport process depends on cherry picking specific commits, and because two (correctly ordered) code lines were swapped.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15902",
"url": "https://www.suse.com/security/cve/CVE-2019-15902"
},
{
"category": "external",
"summary": "SUSE Bug 1149376 for CVE-2019-15902",
"url": "https://bugzilla.suse.com/1149376"
},
{
"category": "external",
"summary": "SUSE Bug 1155131 for CVE-2019-15902",
"url": "https://bugzilla.suse.com/1155131"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-20T10:32:05Z",
"details": "moderate"
}
],
"title": "CVE-2019-15902"
},
{
"cve": "CVE-2019-15924",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15924"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.0.11. fm10k_init_module in drivers/net/ethernet/intel/fm10k/fm10k_main.c has a NULL pointer dereference because there is no -ENOMEM upon an alloc_workqueue failure.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15924",
"url": "https://www.suse.com/security/cve/CVE-2019-15924"
},
{
"category": "external",
"summary": "SUSE Bug 1149612 for CVE-2019-15924",
"url": "https://bugzilla.suse.com/1149612"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-20T10:32:05Z",
"details": "low"
}
],
"title": "CVE-2019-15924"
},
{
"cve": "CVE-2019-15926",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15926"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.2.3. Out of bounds access exists in the functions ath6kl_wmi_pstream_timeout_event_rx and ath6kl_wmi_cac_event_rx in the file drivers/net/wireless/ath/ath6kl/wmi.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15926",
"url": "https://www.suse.com/security/cve/CVE-2019-15926"
},
{
"category": "external",
"summary": "SUSE Bug 1149527 for CVE-2019-15926",
"url": "https://bugzilla.suse.com/1149527"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-20T10:32:05Z",
"details": "moderate"
}
],
"title": "CVE-2019-15926"
},
{
"cve": "CVE-2019-15927",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15927"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 4.20.2. An out-of-bounds access exists in the function build_audio_procunit in the file sound/usb/mixer.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15927",
"url": "https://www.suse.com/security/cve/CVE-2019-15927"
},
{
"category": "external",
"summary": "SUSE Bug 1149522 for CVE-2019-15927",
"url": "https://bugzilla.suse.com/1149522"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-20T10:32:05Z",
"details": "moderate"
}
],
"title": "CVE-2019-15927"
},
{
"cve": "CVE-2019-16231",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-16231"
}
],
"notes": [
{
"category": "general",
"text": "drivers/net/fjes/fjes_main.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-16231",
"url": "https://www.suse.com/security/cve/CVE-2019-16231"
},
{
"category": "external",
"summary": "SUSE Bug 1150466 for CVE-2019-16231",
"url": "https://bugzilla.suse.com/1150466"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-20T10:32:05Z",
"details": "low"
}
],
"title": "CVE-2019-16231"
},
{
"cve": "CVE-2019-16232",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-16232"
}
],
"notes": [
{
"category": "general",
"text": "drivers/net/wireless/marvell/libertas/if_sdio.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-16232",
"url": "https://www.suse.com/security/cve/CVE-2019-16232"
},
{
"category": "external",
"summary": "SUSE Bug 1150465 for CVE-2019-16232",
"url": "https://bugzilla.suse.com/1150465"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-20T10:32:05Z",
"details": "low"
}
],
"title": "CVE-2019-16232"
},
{
"cve": "CVE-2019-16233",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-16233"
}
],
"notes": [
{
"category": "general",
"text": "drivers/scsi/qla2xxx/qla_os.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-16233",
"url": "https://www.suse.com/security/cve/CVE-2019-16233"
},
{
"category": "external",
"summary": "SUSE Bug 1150457 for CVE-2019-16233",
"url": "https://bugzilla.suse.com/1150457"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-20T10:32:05Z",
"details": "low"
}
],
"title": "CVE-2019-16233"
},
{
"cve": "CVE-2019-16234",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-16234"
}
],
"notes": [
{
"category": "general",
"text": "drivers/net/wireless/intel/iwlwifi/pcie/trans.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-16234",
"url": "https://www.suse.com/security/cve/CVE-2019-16234"
},
{
"category": "external",
"summary": "SUSE Bug 1150452 for CVE-2019-16234",
"url": "https://bugzilla.suse.com/1150452"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-20T10:32:05Z",
"details": "low"
}
],
"title": "CVE-2019-16234"
},
{
"cve": "CVE-2019-16413",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-16413"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.0.4. The 9p filesystem did not protect i_size_write() properly, which causes an i_size_read() infinite loop and denial of service on SMP systems.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-16413",
"url": "https://www.suse.com/security/cve/CVE-2019-16413"
},
{
"category": "external",
"summary": "SUSE Bug 1151347 for CVE-2019-16413",
"url": "https://bugzilla.suse.com/1151347"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-20T10:32:05Z",
"details": "moderate"
}
],
"title": "CVE-2019-16413"
},
{
"cve": "CVE-2019-16995",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-16995"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel before 5.0.3, a memory leak exits in hsr_dev_finalize() in net/hsr/hsr_device.c if hsr_add_port fails to add a port, which may cause denial of service, aka CID-6caabe7f197d.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-16995",
"url": "https://www.suse.com/security/cve/CVE-2019-16995"
},
{
"category": "external",
"summary": "SUSE Bug 1152685 for CVE-2019-16995",
"url": "https://bugzilla.suse.com/1152685"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-20T10:32:05Z",
"details": "moderate"
}
],
"title": "CVE-2019-16995"
},
{
"cve": "CVE-2019-17055",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-17055"
}
],
"notes": [
{
"category": "general",
"text": "base_sock_create in drivers/isdn/mISDN/socket.c in the AF_ISDN network module in the Linux kernel through 5.3.2 does not enforce CAP_NET_RAW, which means that unprivileged users can create a raw socket, aka CID-b91ee4aa2a21.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-17055",
"url": "https://www.suse.com/security/cve/CVE-2019-17055"
},
{
"category": "external",
"summary": "SUSE Bug 1152782 for CVE-2019-17055",
"url": "https://bugzilla.suse.com/1152782"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-20T10:32:05Z",
"details": "low"
}
],
"title": "CVE-2019-17055"
},
{
"cve": "CVE-2019-17056",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-17056"
}
],
"notes": [
{
"category": "general",
"text": "llcp_sock_create in net/nfc/llcp_sock.c in the AF_NFC network module in the Linux kernel through 5.3.2 does not enforce CAP_NET_RAW, which means that unprivileged users can create a raw socket, aka CID-3a359798b176.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-17056",
"url": "https://www.suse.com/security/cve/CVE-2019-17056"
},
{
"category": "external",
"summary": "SUSE Bug 1152788 for CVE-2019-17056",
"url": "https://bugzilla.suse.com/1152788"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-20T10:32:05Z",
"details": "moderate"
}
],
"title": "CVE-2019-17056"
},
{
"cve": "CVE-2019-17133",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-17133"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel through 5.3.2, cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c does not reject a long SSID IE, leading to a Buffer Overflow.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-17133",
"url": "https://www.suse.com/security/cve/CVE-2019-17133"
},
{
"category": "external",
"summary": "SUSE Bug 1153158 for CVE-2019-17133",
"url": "https://bugzilla.suse.com/1153158"
},
{
"category": "external",
"summary": "SUSE Bug 1153161 for CVE-2019-17133",
"url": "https://bugzilla.suse.com/1153161"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-20T10:32:05Z",
"details": "important"
}
],
"title": "CVE-2019-17133"
},
{
"cve": "CVE-2019-17666",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-17666"
}
],
"notes": [
{
"category": "general",
"text": "rtl_p2p_noa_ie in drivers/net/wireless/realtek/rtlwifi/ps.c in the Linux kernel through 5.3.6 lacks a certain upper-bound check, leading to a buffer overflow.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-17666",
"url": "https://www.suse.com/security/cve/CVE-2019-17666"
},
{
"category": "external",
"summary": "SUSE Bug 1154372 for CVE-2019-17666",
"url": "https://bugzilla.suse.com/1154372"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-20T10:32:05Z",
"details": "moderate"
}
],
"title": "CVE-2019-17666"
},
{
"cve": "CVE-2019-18680",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-18680"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel 4.4.x before 4.4.195. There is a NULL pointer dereference in rds_tcp_kill_sock() in net/rds/tcp.c that will cause denial of service, aka CID-91573ae4aed0.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-18680",
"url": "https://www.suse.com/security/cve/CVE-2019-18680"
},
{
"category": "external",
"summary": "SUSE Bug 1155898 for CVE-2019-18680",
"url": "https://bugzilla.suse.com/1155898"
},
{
"category": "external",
"summary": "SUSE Bug 1173867 for CVE-2019-18680",
"url": "https://bugzilla.suse.com/1173867"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-20T10:32:05Z",
"details": "important"
}
],
"title": "CVE-2019-18680"
},
{
"cve": "CVE-2019-18805",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-18805"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in net/ipv4/sysctl_net_ipv4.c in the Linux kernel before 5.0.11. There is a net/ipv4/tcp_input.c signed integer overflow in tcp_ack_update_rtt() when userspace writes a very large integer to /proc/sys/net/ipv4/tcp_min_rtt_wlen, leading to a denial of service or possibly unspecified other impact, aka CID-19fad20d15a6.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-18805",
"url": "https://www.suse.com/security/cve/CVE-2019-18805"
},
{
"category": "external",
"summary": "SUSE Bug 1156187 for CVE-2019-18805",
"url": "https://bugzilla.suse.com/1156187"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-20T10:32:05Z",
"details": "low"
}
],
"title": "CVE-2019-18805"
},
{
"cve": "CVE-2019-9456",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-9456"
}
],
"notes": [
{
"category": "general",
"text": "In the Android kernel in Pixel C USB monitor driver there is a possible OOB write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-9456",
"url": "https://www.suse.com/security/cve/CVE-2019-9456"
},
{
"category": "external",
"summary": "SUSE Bug 1150025 for CVE-2019-9456",
"url": "https://bugzilla.suse.com/1150025"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-20T10:32:05Z",
"details": "moderate"
}
],
"title": "CVE-2019-9456"
},
{
"cve": "CVE-2019-9506",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-9506"
}
],
"notes": [
{
"category": "general",
"text": "The Bluetooth BR/EDR specification up to and including version 5.1 permits sufficiently low encryption key length and does not prevent an attacker from influencing the key length negotiation. This allows practical brute-force attacks (aka \"KNOB\") that can decrypt traffic and inject arbitrary ciphertext without the victim noticing.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-9506",
"url": "https://www.suse.com/security/cve/CVE-2019-9506"
},
{
"category": "external",
"summary": "SUSE Bug 1137865 for CVE-2019-9506",
"url": "https://bugzilla.suse.com/1137865"
},
{
"category": "external",
"summary": "SUSE Bug 1146042 for CVE-2019-9506",
"url": "https://bugzilla.suse.com/1146042"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.125.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.125.1.noarch",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.s390x",
"SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.125.1.x86_64",
"SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_125-default-1-3.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-20T10:32:05Z",
"details": "moderate"
}
],
"title": "CVE-2019-9506"
}
]
}
suse-su-2019:2951-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\n\nThe SUSE Linux Enterprise 15 Azure kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2018-12207: Untrusted virtual machines on Intel CPUs could exploit a race\n condition in the Instruction Fetch Unit of the Intel CPU to cause a Machine\n Exception during Page Size Change, causing the CPU core to be non-functional.\n\n The Linux Kernel kvm hypervisor was adjusted to avoid page size changes in\n executable pages by splitting / merging huge pages into small pages as\n needed.\n More information can be found on https://www.suse.com/support/kb/doc/?id=7023735\n\n- CVE-2019-11135: Aborting an asynchronous TSX operation on Intel CPUs with\n Transactional Memory support could be used to facilitate sidechannel\n information leaks out of microarchitectural buffers, similar to the\n previously described \u0027Microarchitectural Data Sampling\u0027 attack.\n\n The Linux kernel was supplemented with the option to disable TSX operation\n altogether (requiring CPU Microcode updates on older systems) and better\n flushing of microarchitectural buffers (VERW).\n\n The set of options available is described in our TID at https://www.suse.com/support/kb/doc/?id=7024251\n\n- CVE-2019-16995: Fix a memory leak in hsr_dev_finalize() if hsr_add_port\n failed to add a port, which may have caused denial of service (bsc#1152685).\n\n- CVE-2019-16233: drivers/scsi/qla2xxx/qla_os.c did not check the\n alloc_workqueue return value, leading to a NULL pointer dereference.\n (bsc#1150457).\n\n- CVE-2019-10220: Added sanity checks on the pathnames passed to the user\n space. (bsc#1144903).\n\n- CVE-2019-17666: rtlwifi: Fix potential overflow in P2P code (bsc#1154372).\n\n- CVE-2019-16232: Fix a potential NULL pointer dereference in the Marwell\n libertas driver (bsc#1150465).\n\n- CVE-2019-16234: iwlwifi pcie driver did not check the alloc_workqueue return\n value, leading to a NULL pointer dereference. (bsc#1150452).\n\n- CVE-2019-17133: cfg80211 wireless extension did not reject a long SSID IE,\n leading to a Buffer Overflow (bsc#1153158).\n\n- CVE-2019-17056: The AF_NFC network module did not enforce CAP_NET_RAW, which\n meant that unprivileged users could create a raw socket (bsc#1152788).\n\n- CVE-2019-18805: Fix signed integer overflow in tcp_ack_update_rtt() that could have\n lead to a denial of service or possibly unspecified other impact (bsc#1156187)\n- CVE-2019-17055: The AF_ISDN network module did not enforce CAP_NET_RAW, which meant\n that unprivileged users could create a raw socket (bnc#1152782)\n\nThe following non-security bugs were fixed:\n\n- 9p: avoid attaching writeback_fid on mmap with type PRIVATE (bsc#1051510).\n- Add kernel module compression support (bsc#1135854) For enabling the kernel module compress, add the item COMPRESS_MODULES=\u0027xz\u0027 in config.sh, then mkspec will pass it to the spec file.\n- acpi / CPPC: do not require the _PSD method (bsc#1051510).\n- acpi / processor: do not print errors for processorIDs == 0xff (bsc#1051510).\n- acpi: CPPC: Set pcc_data[pcc_ss_id] to NULL in acpi_cppc_processor_exit() (bsc#1051510).\n- act_mirred: Fix mirred_init_module error handling (bsc#1051510).\n- alsa: bebob: Fix prototype of helper function to return negative value (bsc#1051510).\n- alsa: hda - Add laptop imic fixup for ASUS M9V laptop (bsc#1051510).\n- alsa: hda - Apply AMD controller workaround for Raven platform (bsc#1051510).\n- alsa: hda - Define a fallback_pin_fixup_tbl for alc269 family (bsc#1051510).\n- alsa: hda - Drop unsol event handler for Intel HDMI codecs (bsc#1051510).\n- alsa: hda - Expand pin_match function to match upcoming new tbls (bsc#1051510).\n- alsa: hda - Inform too slow responses (bsc#1051510).\n- alsa: hda - Show the fatal CORB/RIRB error more clearly (bsc#1051510).\n- alsa: hda/ca0132 - Fix possible workqueue stall (bsc#1155836).\n- alsa: hda/hdmi: remove redundant assignment to variable pcm_idx (bsc#1051510).\n- alsa: hda/realtek - Add support for ALC623 (bsc#1051510).\n- alsa: hda/realtek - Add support for ALC711 (bsc#1051510).\n- alsa: hda/realtek - Blacklist PC beep for Lenovo ThinkCentre M73/93 (bsc#1051510).\n- alsa: hda/realtek - Check beep whitelist before assigning in all codecs (bsc#1051510).\n- alsa: hda/realtek - Fix 2 front mics of codec 0x623 (bsc#1051510).\n- alsa: hda/realtek - Fix alienware headset mic (bsc#1051510).\n- alsa: hda/realtek: Reduce the Headphone static noise on XPS 9350/9360 (bsc#1051510).\n- alsa: hda/sigmatel - remove unused variable \u0027stac9200_core_init\u0027 (bsc#1051510).\n- alsa: hda: Add Elkhart Lake pci ID (bsc#1051510).\n- alsa: hda: Add Tigerlake/Jasperlake pci ID (bsc#1051510).\n- alsa: hda: Add support of Zhaoxin controller (bsc#1051510).\n- alsa: hda: Flush interrupts on disabling (bsc#1051510).\n- alsa: hda: Set fifo_size for both playback and capture streams (bsc#1051510).\n- alsa: i2c: ak4xxx-adda: Fix a possible null pointer dereference in build_adc_controls() (bsc#1051510).\n- alsa: line6: sizeof (byte) is always 1, use that fact (bsc#1051510).\n- alsa: timer: Fix mutex deadlock at releasing card (bsc#1051510).\n- alsa: usb-audio: Add Pioneer DDJ-SX3 PCM quirck (bsc#1051510).\n- alsa: usb-audio: Disable quirks for BOSS Katana amplifiers (bsc#1051510).\n- alsa: usb-audio: Skip bSynchAddress endpoint check if it is invalid (bsc#1051510).\n- appletalk: enforce CAP_NET_RAW for raw sockets (bsc#1051510).\n- arcnet: provide a buffer big enough to actually receive packets (networking-stable-19_09_30).\n- asoc: Define a set of DAPM pre/post-up events (bsc#1051510).\n- asoc: Intel: Fix use of potentially uninitialized variable (bsc#1051510).\n- asoc: Intel: NHLT: Fix debug print format (bsc#1051510).\n- asoc: dmaengine: Make the pcm-\u003ename equal to pcm-\u003eid if the name is not set (bsc#1051510).\n- asoc: rockchip: i2s: Fix RPM imbalance (bsc#1051510).\n- asoc: rsnd: Reinitialize bit clock inversion flag for every format setting (bsc#1051510).\n- asoc: sgtl5000: Fix charge pump source assignment (bsc#1051510).\n- auxdisplay: panel: need to delete scan_timer when misc_register fails in panel_attach (bsc#1051510).\n- ax25: enforce CAP_NET_RAW for raw sockets (bsc#1051510).\n- blk-wbt: abstract out end IO completion handler (bsc#1135873).\n- blk-wbt: fix has-sleeper queueing check (bsc#1135873).\n- blk-wbt: improve waking of tasks (bsc#1135873).\n- blk-wbt: move disable check into get_limit() (bsc#1135873).\n- blk-wbt: use wq_has_sleeper() for wq active check (bsc#1135873).\n- block: add io timeout to sysfs (bsc#1148410).\n- block: do not show io_timeout if driver has no timeout handler (bsc#1148410).\n- bluetooth: btrtl: Additional Realtek 8822CE Bluetooth devices (bsc#1051510).\n- bnx2x: Fix VF\u0027s VLAN reconfiguration in reload (bsc#1086323 ).\n- boot: Sign non-x86 kernels when possible (boo#1134303)\n- bpf: fix use after free in prog symbol exposure (bsc#1083647).\n- bridge/mdb: remove wrong use of NLM_F_MULTI (networking-stable-19_09_15).\n- btrfs: Ensure btrfs_init_dev_replace_tgtdev sees up to date values (bsc#1154651).\n- btrfs: Ensure replaced device does not have pending chunk allocation (bsc#1154607).\n- btrfs: bail out gracefully rather than BUG_ON (bsc#1153646).\n- btrfs: block-group: Fix a memory leak due to missing btrfs_put_block_group() (bsc#1155178).\n- btrfs: check for the full sync flag while holding the inode lock during fsync (bsc#1153713).\n- btrfs: qgroup: Always free PREALLOC META reserve in btrfs_delalloc_release_extents() (bsc#1155179).\n- btrfs: remove wrong use of volume_mutex from btrfs_dev_replace_start (bsc#1154651).\n- btrfs: tracepoints: Fix bad entry members of qgroup events (bsc#1155186).\n- btrfs: tracepoints: Fix wrong parameter order for qgroup events (bsc#1155184).\n- can: dev: call netif_carrier_off() in register_candev() (bsc#1051510).\n- can: mcp251x: mcp251x_hw_reset(): allow more time after a reset (bsc#1051510).\n- can: xilinx_can: xcan_probe(): skip error message on deferred probe (bsc#1051510).\n- cdc_ether: fix rndis support for Mediatek based smartphones (networking-stable-19_09_15).\n- cdc_ncm: fix divide-by-zero caused by invalid wMaxPacketSize (bsc#1051510).\n- ceph: fix directories inode i_blkbits initialization (bsc#1153717).\n- ceph: reconnect connection if session hang in opening state (bsc#1153718).\n- ceph: update the mtime when truncating up (bsc#1153719).\n- cfg80211: Purge frame registrations on iftype change (bsc#1051510).\n- cfg80211: add and use strongly typed element iteration macros (bsc#1051510).\n- clk: at91: select parent if main oscillator or bypass is enabled (bsc#1051510).\n- clk: qoriq: Fix -Wunused-const-variable (bsc#1051510).\n- clk: sirf: Do not reference clk_init_data after registration (bsc#1051510).\n- clk: zx296718: Do not reference clk_init_data after registration (bsc#1051510).\n- crypto: af_alg - Fix race around ctx-\u003ercvused by making it atomic_t (bsc#1154737).\n- crypto: af_alg - Initialize sg_num_bytes in error code path (bsc#1051510).\n- crypto: af_alg - consolidation of duplicate code (bsc#1154737).\n- crypto: af_alg - fix race accessing cipher request (bsc#1154737).\n- crypto: af_alg - remove locking in async callback (bsc#1154737).\n- crypto: af_alg - update correct dst SGL entry (bsc#1051510).\n- crypto: af_alg - wait for data at beginning of recvmsg (bsc#1154737).\n- crypto: algif - return error code when no data was processed (bsc#1154737).\n- crypto: algif_aead - copy AAD from src to dst (bsc#1154737).\n- crypto: algif_aead - fix reference counting of null skcipher (bsc#1154737).\n- crypto: algif_aead - overhaul memory management (bsc#1154737).\n- crypto: algif_aead - skip SGL entries with NULL page (bsc#1154737).\n- crypto: algif_skcipher - overhaul memory management (bsc#1154737).\n- crypto: talitos - fix missing break in switch statement (bsc#1142635).\n- cxgb4: Signedness bug in init_one() (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584).\n- cxgb4: fix endianness for vlan value in cxgb4_tc_flower (bsc#1064802 bsc#1066129).\n- cxgb4: offload VLAN flows regardless of VLAN ethtype (bsc#1064802 bsc#1066129).\n- cxgb4: reduce kernel stack usage in cudbg_collect_mem_region() (bsc#1073513).\n- cxgb4: smt: Add lock for atomic_dec_and_test (bsc#1064802 bsc#1066129).\n- cxgb4:Fix out-of-bounds MSI-X info array access (networking-stable-19_10_05).\n- dasd_fba: Display \u002700000000\u0027 for zero page when dumping sense (bsc#1123080).\n- dmaengine: bcm2835: Print error in case setting DMA mask fails (bsc#1051510).\n- dmaengine: imx-sdma: fix size check for sdma script_number (bsc#1051510).\n- drm/amd/powerplay/smu7: enforce minimal VBITimeout (v2) (bsc#1051510).\n- drm/amdgpu/si: fix ASIC tests (git-fixes).\n- drm/amdgpu: Check for valid number of registers to read (bsc#1051510).\n- drm/ast: Fixed reboot test may cause system hanged (bsc#1051510).\n- drm/bridge: tc358767: Increase AUX transfer length limit (bsc#1051510).\n- drm/edid: Add 6 bpc quirk for SDC panel in Lenovo G50 (bsc#1051510).\n- drm/i915/cmdparser: Add support for backward jumps (bsc#1135967)\n- drm/i915/cmdparser: Ignore Length operands during command matching (bsc#1135967)\n- drm/i915/cmdparser: Use explicit goto for error paths (bsc#1135967)\n- drm/i915/gen8+: Add RC6 CTX corruption WA (bsc#1135967)\n- drm/i915/gtt: Add read only pages to gen8_pte_encode (bsc#1135967)\n- drm/i915/gtt: Disable read-only support under GVT (bsc#1135967)\n- drm/i915/gtt: Read-only pages for insert_entries on bdw (bsc#1135967)\n- drm/i915: Add gen9 BCS cmdparsing (bsc#1135967)\n- drm/i915: Add support for mandatory cmdparsing (bsc#1135967)\n- drm/i915: Allow parsing of unsized batches (bsc#1135967)\n- drm/i915: Disable Secure Batches for gen6+\n- drm/i915: Lower RM timeout to avoid DSI hard hangs (bsc#1135967)\n- drm/i915: Prevent writing into a read-only object via a GGTT mmap (bsc#1135967)\n- drm/i915: Remove Master tables from cmdparser\n- drm/i915: Rename gen7 cmdparser tables (bsc#1135967)\n- drm/i915: Support ro ppgtt mapped cmdparser shadow buffers (bsc#1135967)\n- drm/msm/dsi: Implement reset correctly (bsc#1051510).\n- drm/panel: simple: fix AUO g185han01 horizontal blanking (bsc#1051510).\n- drm/radeon: Fix EEH during kexec (bsc#1051510).\n- drm/tilcdc: Register cpufreq notifier after we have initialized crtc (bsc#1051510).\n- drm/vmwgfx: Fix double free in vmw_recv_msg() (bsc#1051510).\n- drm: Flush output polling on shutdown (bsc#1051510).\n- e1000e: add workaround for possible stalled packet (bsc#1051510).\n- efi/memattr: Do not bail on zero VA if it equals the region\u0027s PA (bsc#1051510).\n- efi: cper: print AER info of pcie fatal error (bsc#1051510).\n- efivar/ssdt: Do not iterate over EFI vars if no SSDT override was specified (bsc#1051510).\n- firmware: dmi: Fix unlikely out-of-bounds read in save_mem_devices (git-fixes).\n- gpu: drm: radeon: Fix a possible null-pointer dereference in radeon_connector_set_property() (bsc#1051510).\n- hid: apple: Fix stuck function keys when using FN (bsc#1051510).\n- hid: fix error message in hid_open_report() (bsc#1051510).\n- hid: hidraw: Fix invalid read in hidraw_ioctl (bsc#1051510).\n- hid: logitech-hidpp: do all FF cleanup in hidpp_ff_destroy() (bsc#1051510).\n- hid: logitech: Fix general protection fault caused by Logitech driver (bsc#1051510).\n- hid: prodikeys: Fix general protection fault during probe (bsc#1051510).\n- hid: sony: Fix memory corruption issue on cleanup (bsc#1051510).\n- hso: fix NULL-deref on tty open (bsc#1051510).\n- hwmon: (acpi_power_meter) Change log level for \u0027unsafe software power cap\u0027 (bsc#1051510).\n- hwrng: core - do not wait on add_early_randomness() (git-fixes).\n- hyperv: set nvme msi interrupts to unmanaged (jsc#SLE-8953, jsc#SLE-9221, jsc#SLE-4941, bsc#1119461, bsc#1119465, bsc#1138190, bsc#1154905).\n- i2c: riic: Clear NACK in tend isr (bsc#1051510).\n- ib/core, ipoib: Do not overreact to SM LID change event (bsc#1154108)\n- ib/core: Add mitigation for Spectre V1 (bsc#1155671)\n- ib/hfi1: Remove overly conservative VM_EXEC flag check (bsc#1144449).\n- ib/mlx5: Consolidate use_umr checks into single function (bsc#1093205).\n- ib/mlx5: Fix MR re-registration flow to use UMR properly (bsc#1093205).\n- ib/mlx5: Report correctly tag matching rendezvous capability (bsc#1046305).\n- ieee802154: atusb: fix use-after-free at disconnect (bsc#1051510).\n- ieee802154: ca8210: prevent memory leak (bsc#1051510).\n- ieee802154: enforce CAP_NET_RAW for raw sockets (bsc#1051510).\n- iio: adc: ad799x: fix probe error handling (bsc#1051510).\n- iio: light: opt3001: fix mutex unlock race (bsc#1051510).\n- ima: always return negative code for error (bsc#1051510).\n- input: Revert synaptics-rmi4 patch due to regression (bsc#1155982)\n- input: da9063 - fix capability and drop KEY_SLEEP (bsc#1051510).\n- input: synaptics-rmi4 - avoid processing unknown IRQs (bsc#1051510).\n- integrity: prevent deadlock during digsig verification (bsc#1090631).\n- iommu/amd: Apply the same IVRS IOAPIC workaround to Acer Aspire A315-41 (bsc#1137799).\n- iommu/amd: Check PM_LEVEL_SIZE() condition in locked section (bsc#1154608).\n- iommu/amd: Override wrong IVRS IOAPIC on Raven Ridge systems (bsc#1137799).\n- iommu/amd: Remove domain-\u003eupdated (bsc#1154610).\n- iommu/amd: Wait for completion of IOTLB flush in attach_device (bsc#1154611).\n- ipmi_si: Only schedule continuously in the thread in maintenance mode (bsc#1051510).\n- ipv6: Fix the link time qualifier of \u0027ping_v6_proc_exit_net()\u0027 (networking-stable-19_09_15).\n- ipv6: Handle missing host route in __ipv6_ifa_notify (networking-stable-19_10_05).\n- ipv6: drop incoming packets having a v4mapped source address (networking-stable-19_10_05).\n- iwlwifi: do not panic in error path on non-msix systems (bsc#1155692).\n- ixgbe: Prevent u8 wrapping of ITR value to something less than 10us (bsc#1101674).\n- ixgbe: sync the first fragment unconditionally (bsc#1133140).\n- kABI workaround for crypto/af_alg changes (bsc#1154737).\n- kABI workaround for drm_vma_offset_node readonly field addition (bsc#1135967)\n- kABI workaround for snd_hda_pick_pin_fixup() changes (bsc#1051510).\n- kabi/severities: Whitelist functions internal to radix mm. To call these functions you have to first detect if you are running in radix mm mode which can\u0027t be expected of OOT code.\n- kabi: net: sched: act_sample: fix psample group handling on overwrite (networking-stable-19_09_05).\n- kernel-binary.spec.in: Fix build of non-modular kernels (boo#1154578).\n- kernel-subpackage-build: create zero size ghost for uncompressed vmlinux (bsc#1154354). It is not strictly necessary to uncompress it so maybe the ghost file can be 0 size in this case.\n- kernel/sysctl.c: do not override max_threads provided by userspace (bnc#1150875).\n- ksm: cleanup stable_node chain collapse case (bnc#1144338).\n- ksm: fix use after free with merge_across_nodes = 0 (bnc#1144338).\n- ksm: introduce ksm_max_page_sharing per page deduplication limit (bnc#1144338).\n- ksm: optimize refile of stable_node_dup at the head of the chain (bnc#1144338).\n- ksm: swap the two output parameters of chain/chain_prune (bnc#1144338).\n- kvm: Convert kvm_lock to a mutex (bsc#1117665).\n- kvm: MMU: drop vcpu param in gpte_access (bsc#1117665).\n- kvm: PPC: Book3S HV: use smp_mb() when setting/clearing host_ipi flag (bsc#1061840).\n- kvm: vmx, svm: always run with EFER.NXE=1 when shadow paging is active (bsc#1117665).\n- kvm: x86, powerpc: do not allow clearing largepages debugfs entry (bsc#1117665).\n- kvm: x86: Do not release the page inside mmu_set_spte() (bsc#1117665).\n- kvm: x86: add tracepoints around __direct_map and FNAME(fetch) (bsc#1117665).\n- kvm: x86: adjust kvm_mmu_page member to save 8 bytes (bsc#1117665).\n- kvm: x86: change kvm_mmu_page_get_gfn BUG_ON to WARN_ON (bsc#1117665).\n- kvm: x86: make FNAME(fetch) and __direct_map more similar (bsc#1117665).\n- kvm: x86: remove now unneeded hugepage gfn adjustment (bsc#1117665).\n- lib/mpi: Fix karactx leak in mpi_powm (bsc#1051510).\n- libertas: Add missing sentinel at end of if_usb.c fw_table (bsc#1051510).\n- mISDN: enforce CAP_NET_RAW for raw sockets (bsc#1051510).\n- mac80211: Reject malformed SSID elements (bsc#1051510).\n- mac80211: accept deauth frames in IBSS mode (bsc#1051510).\n- mac80211: fix txq null pointer dereference (bsc#1051510).\n- macsec: drop skb sk before calling gro_cells_receive (bsc#1051510).\n- md/raid0: avoid RAID0 data corruption due to layout confusion (bsc#1140090).\n- md/raid0: fix warning message for parameter default_layout (bsc#1140090).\n- media: atmel: atmel-isc: fix asd memory allocation (bsc#1135642).\n- media: cpia2_usb: fix memory leaks (bsc#1051510).\n- media: dvb-core: fix a memory leak bug (bsc#1051510).\n- media: exynos4-is: fix leaked of_node references (bsc#1051510).\n- media: gspca: zero usb_buf on error (bsc#1051510).\n- media: hdpvr: Add device num check and handling (bsc#1051510).\n- media: hdpvr: add terminating 0 at end of string (bsc#1051510).\n- media: i2c: ov5645: Fix power sequence (bsc#1051510).\n- media: iguanair: add sanity checks (bsc#1051510).\n- media: omap3isp: Do not set streaming state on random subdevs (bsc#1051510).\n- media: omap3isp: Set device on omap3isp subdevs (bsc#1051510).\n- media: ov9650: add a sanity check (bsc#1051510).\n- media: radio/si470x: kill urb on error (bsc#1051510).\n- media: saa7134: fix terminology around saa7134_i2c_eeprom_md7134_gate() (bsc#1051510).\n- media: saa7146: add cleanup in hexium_attach() (bsc#1051510).\n- media: sn9c20x: Add MSI MS-1039 laptop to flip_dmi_table (bsc#1051510).\n- media: stkwebcam: fix runtime PM after driver unbind (bsc#1051510).\n- media: ttusb-dec: Fix info-leak in ttusb_dec_send_command() (bsc#1051510).\n- memstick: jmb38x_ms: Fix an error handling path in \u0027jmb38x_ms_probe()\u0027 (bsc#1051510).\n- mfd: intel-lpss: Remove D3cold delay (bsc#1051510).\n- mld: fix memory leak in mld_del_delrec() (networking-stable-19_09_05).\n- mmc: sdhci-of-esdhc: set DMA snooping based on DMA coherence (bsc#1051510).\n- mmc: sdhci: Fix incorrect switch to HS mode (bsc#1051510).\n- mmc: sdhci: improve ADMA error reporting (bsc#1051510).\n- net/ibmvnic: Fix EOI when running in XIVE mode (bsc#1089644, ltc#166495, ltc#165544, git-fixes).\n- net/mlx4_en: fix a memory leak bug (bsc#1046299).\n- net/mlx5: Add device ID of upcoming BlueField-2 (bsc#1046303 ).\n- net/mlx5: Fix error handling in mlx5_load() (bsc#1046305 ).\n- net/phy: fix DP83865 10 Mbps HDX loopback disable function (networking-stable-19_09_30).\n- net/rds: Fix error handling in rds_ib_add_one() (networking-stable-19_10_05).\n- net/rds: fix warn in rds_message_alloc_sgs (bsc#1154848).\n- net/rds: remove user triggered WARN_ON in rds_sendmsg (bsc#1154848).\n- net/sched: act_sample: do not push mac header on ip6gre ingress (networking-stable-19_09_30).\n- net: Fix null de-reference of device refcount (networking-stable-19_09_15).\n- net: Replace NF_CT_ASSERT() with WARN_ON() (bsc#1146612).\n- net: Unpublish sk from sk_reuseport_cb before call_rcu (networking-stable-19_10_05).\n- net: fix skb use after free in netpoll (networking-stable-19_09_05).\n- net: gso: Fix skb_segment splat when splitting gso_size mangled skb having linear-headed frag_list (networking-stable-19_09_15).\n- net: openvswitch: free vport unless register_netdevice() succeeds (git-fixes).\n- net: qlogic: Fix memory leak in ql_alloc_large_buffers (networking-stable-19_10_05).\n- net: qrtr: Stop rx_worker before freeing node (networking-stable-19_09_30).\n- net: sched: act_sample: fix psample group handling on overwrite (networking-stable-19_09_05).\n- net: stmmac: dwmac-rk: Do not fail if phy regulator is absent (networking-stable-19_09_05).\n- net_sched: add policy validation for action attributes (networking-stable-19_09_30).\n- net_sched: fix backward compatibility for TCA_ACT_KIND (git-fixes).\n- netfilter: nf_nat: do not bug when mapping already exists (bsc#1146612).\n- nfc: fix attrs checks in netlink interface (bsc#1051510).\n- nfc: fix memory leak in llcp_sock_bind() (bsc#1051510).\n- nfc: pn533: fix use-after-free and memleaks (bsc#1051510).\n- nfs: fix regression (boo#1154189 bsc#1154747).\n- nfsv4.1 - backchannel request should hold ref on xprt (bsc#1152624).\n- nl80211: fix null pointer dereference (bsc#1051510).\n- objtool: Clobber user CFLAGS variable (bsc#1153236).\n- openvswitch: change type of UPCALL_PID attribute to NLA_UNSPEC (networking-stable-19_09_30).\n- packaging: add support for riscv64\n- pci: Correct pci=resource_alignment parameter example (bsc#1051510).\n- pci: PM: Fix pci_power_up() (bsc#1051510).\n- pci: dra7xx: Fix legacy INTD IRQ handling (bsc#1087092).\n- pci: hv: Use bytes 4 and 5 from instance ID as the pci domain numbers (bsc#1153263).\n- pinctrl: tegra: Fix write barrier placement in pmx_writel (bsc#1051510).\n- platform/x86: classmate-laptop: remove unused variable (bsc#1051510).\n- platform/x86: pmc_atom: Add Siemens SIMATIC IPC277E to critclk_systems DMI table (bsc#1051510).\n- power: supply: sysfs: ratelimit property read error message (bsc#1051510).\n- powerpc/64s/pseries: radix flush translations before MMU is enabled at boot (bsc#1055186).\n- powerpc/64s/radix: keep kernel ERAT over local process/guest invalidates (bsc#1055186).\n- powerpc/64s/radix: tidy up TLB flushing code (bsc#1055186).\n- powerpc/64s: Rename PPC_INVALIDATE_ERAT to PPC_ISA_3_0_INVALIDATE_ERAT (bsc#1055186).\n- powerpc/mm/book3s64: Move book3s64 code to pgtable-book3s64 (bsc#1055186).\n- powerpc/mm/radix: mark __radix__flush_tlb_range_psize() as __always_inline (bsc#1055186).\n- powerpc/mm/radix: mark as __tlbie_pid() and friends as__always_inline (bsc#1055186).\n- powerpc/mm: Properly invalidate when setting process table base (bsc#1055186).\n- powerpc/mm: mark more tlb functions as __always_inline (bsc#1055186).\n- powerpc/pseries/mobility: use cond_resched when updating device tree (bsc#1153112 ltc#181778).\n- powerpc/pseries: Remove confusing warning message (bsc#1109158).\n- powerpc/rtas: allow rescheduling while changing cpu states (bsc#1153112 ltc#181778).\n- qed: iWARP - Fix default window size to be based on chip (bsc#1050536 bsc#1050545).\n- qed: iWARP - Fix tc for MPA ll2 connection (bsc#1050536 bsc#1050545).\n- qed: iWARP - Use READ_ONCE and smp_store_release to access ep-\u003estate (bsc#1050536 bsc#1050545).\n- qed: iWARP - fix uninitialized callback (bsc#1050536 bsc#1050545).\n- qmi_wwan: add support for Cinterion CLS8 devices (networking-stable-19_10_05).\n- r8152: Set macpassthru in reset_resume callback (bsc#1051510).\n- rdma/bnxt_re: Fix spelling mistake \u0027missin_resp\u0027 -\u003e \u0027missing_resp\u0027 (bsc#1050244).\n- rdma: Fix goto target to release the allocated memory (bsc#1050244).\n- rds: Fix warning (bsc#1154848).\n- rpm/config.sh: Enable livepatch.\n- rpm/constraints.in: lower disk space required for ARM With a requirement of 35GB, only 2 slow workers are usable for ARM. Current aarch64 build requires 27G and armv6/7 requires 14G. Set requirements respectively to 30GB and 20GB.\n- rpm/dtb.spec.in.in: do not make dtb directory inaccessible There is no reason to lock down the dtb directory for ordinary users.\n- rpm/kernel-binary.spec.in: Fix kernel-livepatch description typo.\n- rpm/kernel-binary.spec.in: build kernel-*-kgraft only for default SLE kernel RT and Azure variants are excluded for the moment. (bsc#1141600)\n- rpm/kernel-binary.spec.in: handle modules.builtin.modinfo It was added in 5.2.\n- rpm/kernel-binary.spec.in: support partial rt debug config.\n- rpm/kernel-subpackage-spec: Mention debuginfo in the subpackage description (bsc#1149119).\n- rpm/macros.kernel-source: KMPs should depend on kmod-compat to build. kmod-compat links are used in find-provides.ksyms, find-requires.ksyms, and find-supplements.ksyms in rpm-config-SUSE.\n- rpm/mkspec: Correct tarball URL for rc kernels.\n- rpm/mkspec: Make building DTBs optional.\n- rpm/modflist: Simplify compression support.\n- rpm: raise required disk space for binary packages Current disk space constraints (10 GB on s390x, 25 GB on other architectures) no longer suffice for 5.3 kernel builds. The statistics show ~30 GB of disk consumption on x86_64 and ~11 GB on s390x so raise the constraints to 35 GB in general and 14 GB on s390x.\n- rpm: support compressed modules Some of our scripts and scriptlets in rpm/ do not expect module files not ending with \u0027.ko\u0027 which currently leads to failure in preuninstall scriptlet of cluster-md-kmp-default (and probably also other subpackages). Let those which could be run on compressed module files recognize \u0027.ko.xz\u0027 in addition to \u0027.ko\u0027.\n- rtlwifi: rtl8192cu: Fix value set in descriptor (bsc#1142635).\n- s390/cmf: set_schib_wait add timeout (bsc#1153509, bsc#1153476).\n- s390/cpumsf: Check for CPU Measurement sampling (bsc#1153681 LTC#181855).\n- sch_cbq: validate TCA_CBQ_WRROPT to avoid crash (networking-stable-19_10_05).\n- sch_dsmark: fix potential NULL deref in dsmark_init() (networking-stable-19_10_05).\n- sch_hhf: ensure quantum and hhf_non_hh_weight are non-zero (networking-stable-19_09_15).\n- sch_netem: fix a divide by zero in tabledist() (networking-stable-19_09_30).\n- sched/fair: Avoid divide by zero when rebalancing domains (bsc#1096254).\n- scripts/arch-symbols: add missing link.\n- scsi: lpfc: Fix devices that do not return after devloss followed by rediscovery (bsc#1137040).\n- scsi: lpfc: Fix null ptr oops updating lpfc_devloss_tmo via sysfs attribute (bsc#1140845).\n- scsi: lpfc: Fix propagation of devloss_tmo setting to nvme transport (bsc#1140883).\n- scsi: lpfc: Remove bg debugfs buffers (bsc#1144375).\n- scsi: qedf: Modify abort and tmf handler to handle edge condition and flush (bsc#1098291).\n- scsi: qedf: fc_rport_priv reference counting fixes (bsc#1098291).\n- scsi: qla2xxx: Add error handling for PLOGI ELS passthrough (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Capture FW dump on MPI heartbeat stop event (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Check for MB timeout while capturing ISP27/28xx FW dump (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Dual FCP-NVMe target port support (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Fix N2N link reset (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Fix N2N link up fail (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Fix partial flash write of MBI (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Fix stale mem access on driver unload (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Fix unbound sleep in fcport delete path (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Fix wait condition in loop (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Improve logging for scan thread (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Initialized mailbox to prevent driver load failure (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Optimize NPIV tear down process (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Set remove flag for all VP (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Silence fwdump template message (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Update driver version to 10.01.00.20-k (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: fixup incorrect usage of host_byte (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: remove redundant assignment to pointer host (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: stop timer in shutdown path (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: storvsc: setup 1:1 mapping between hardware queue and CPU queue (bsc#1140729).\n- scsi: zfcp: fix reaction on bit error threshold notification (bsc#1154956 LTC#182054).\n- sctp: Fix the link time qualifier of \u0027sctp_ctrlsock_exit()\u0027 (networking-stable-19_09_15).\n- sctp: use transport pf_retrans in sctp_do_8_2_transport_strike (networking-stable-19_09_15).\n- skge: fix checksum byte order (networking-stable-19_09_30).\n- sock_diag: fix autoloading of the raw_diag module (bsc#1152791).\n- sock_diag: request _diag module only when the family or proto has been registered (bsc#1152791).\n- staging: vt6655: Fix memory leak in vt6655_probe (bsc#1051510).\n- staging: wlan-ng: fix exit return when sme-\u003ekey_idx \u003e= NUM_WEPKEYS (bsc#1051510).\n- supporte.conf: add efivarfs to kernel-default-base (bsc#1154858).\n- tcp: Do not dequeue SYN/FIN-segments from write-queue (git-gixes).\n- tcp: fix tcp_ecn_withdraw_cwr() to clear TCP_ECN_QUEUE_CWR (networking-stable-19_09_15).\n- tcp: inherit timestamp on mtu probe (networking-stable-19_09_05).\n- tcp: remove empty skb from write queue in error cases (networking-stable-19_09_05).\n- thermal: Fix use-after-free when unregistering thermal zone device (bsc#1051510).\n- thermal_hwmon: Sanitize thermal_zone type (bsc#1051510).\n- tipc: add NULL pointer check before calling kfree_rcu (networking-stable-19_09_15).\n- tipc: fix unlimited bundling of small messages (networking-stable-19_10_05).\n- tracing: Initialize iter-\u003eseq after zeroing in tracing_read_pipe() (bsc#1151508).\n- tun: fix use-after-free when register netdev failed (networking-stable-19_09_15).\n- tuntap: correctly set SOCKWQ_ASYNC_NOSPACE (bsc#1145099).\n- usb: adutux: fix NULL-derefs on disconnect (bsc#1142635).\n- usb: adutux: fix use-after-free on disconnect (bsc#1142635).\n- usb: adutux: fix use-after-free on release (bsc#1051510).\n- usb: chaoskey: fix use-after-free on release (bsc#1051510).\n- usb: dummy-hcd: fix power budget for SuperSpeed mode (bsc#1051510).\n- usb: gadget: udc: atmel: Fix interrupt storm in FIFO mode (bsc#1051510).\n- usb: iowarrior: fix use-after-free after driver unbind (bsc#1051510).\n- usb: iowarrior: fix use-after-free on disconnect (bsc#1051510).\n- usb: iowarrior: fix use-after-free on release (bsc#1051510).\n- usb: ldusb: fix NULL-derefs on driver unbind (bsc#1051510).\n- usb: ldusb: fix control-message timeout (bsc#1051510).\n- usb: ldusb: fix memleak on disconnect (bsc#1051510).\n- usb: ldusb: fix read info leaks (bsc#1051510).\n- usb: ldusb: fix ring-buffer locking (bsc#1051510).\n- usb: legousbtower: fix a signedness bug in tower_probe() (bsc#1051510).\n- usb: legousbtower: fix deadlock on disconnect (bsc#1142635).\n- usb: legousbtower: fix memleak on disconnect (bsc#1051510).\n- usb: legousbtower: fix open after failed reset request (bsc#1142635).\n- usb: legousbtower: fix potential NULL-deref on disconnect (bsc#1142635).\n- usb: legousbtower: fix slab info leak at probe (bsc#1142635).\n- usb: legousbtower: fix use-after-free on release (bsc#1051510).\n- usb: microtek: fix info-leak at probe (bsc#1142635).\n- usb: serial: fix runtime PM after driver unbind (bsc#1051510).\n- usb: serial: ftdi_sio: add device IDs for Sienna and Echelon PL-20 (bsc#1051510).\n- usb: serial: keyspan: fix NULL-derefs on open() and write() (bsc#1051510).\n- usb: serial: option: add Telit FN980 compositions (bsc#1051510).\n- usb: serial: option: add support for Cinterion CLS8 devices (bsc#1051510).\n- usb: serial: ti_usb_3410_5052: fix port-close races (bsc#1051510).\n- usb: serial: whiteheat: fix potential slab corruption (bsc#1051510).\n- usb: udc: lpc32xx: fix bad bit shift operation (bsc#1051510).\n- usb: usb-skeleton: fix NULL-deref on disconnect (bsc#1051510).\n- usb: usb-skeleton: fix runtime PM after driver unbind (bsc#1051510).\n- usb: usb-skeleton: fix use-after-free after driver unbind (bsc#1051510).\n- usb: usblcd: fix I/O after disconnect (bsc#1142635).\n- usb: usblp: fix runtime PM after driver unbind (bsc#1051510).\n- usb: usblp: fix use-after-free on disconnect (bsc#1051510).\n- usb: xhci: wait for CNR controller not ready bit in xhci resume (bsc#1051510).\n- usb: yurex: Do not retry on unexpected errors (bsc#1051510).\n- usb: yurex: fix NULL-derefs on disconnect (bsc#1051510).\n- usbnet: ignore endpoints with invalid wMaxPacketSize (bsc#1051510).\n- usbnet: sanity checking of packet sizes and device mtu (bsc#1051510).\n- vfio_pci: Restore original state on release (bsc#1051510).\n- vhost_net: conditionally enable tx polling (bsc#1145099).\n- video: of: display_timing: Add of_node_put() in of_get_display_timing() (bsc#1051510).\n- vsock: Fix a lockdep warning in __vsock_release() (networking-stable-19_10_05).\n- watchdog: imx2_wdt: fix min() calculation in imx2_wdt_set_timeout (bsc#1051510).\n- x86/asm: Fix MWAITX C-state hint value (bsc#1114279).\n- x86/boot/64: Make level2_kernel_pgt pages invalid outside kernel area (bnc#1153969).\n- x86/boot/64: Round memory hole size up to next PMD page (bnc#1153969).\n- x86/mm: Use WRITE_ONCE() when setting PTEs (bsc#1114279).\n- xen/netback: fix error path of xenvif_connect_data() (bsc#1065600).\n- xen/pv: Fix Xen PV guest int3 handling (bsc#1153811).\n- xhci: Check all endpoints for LPM timeout (bsc#1051510).\n- xhci: Fix false warning message about wrong bounce buffer write length (bsc#1051510).\n- xhci: Increase STS_SAVE timeout in xhci_suspend() (bsc#1051510).\n- xhci: Prevent device initiated U1/U2 link pm if exit latency is too long (bsc#1051510).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2019-2951,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-2951,SUSE-SLE-Module-Public-Cloud-15-2019-2951",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_2951-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2019:2951-1",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192951-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2019:2951-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2019-November/006134.html"
},
{
"category": "self",
"summary": "SUSE Bug 1046299",
"url": "https://bugzilla.suse.com/1046299"
},
{
"category": "self",
"summary": "SUSE Bug 1046303",
"url": "https://bugzilla.suse.com/1046303"
},
{
"category": "self",
"summary": "SUSE Bug 1046305",
"url": "https://bugzilla.suse.com/1046305"
},
{
"category": "self",
"summary": "SUSE Bug 1050244",
"url": "https://bugzilla.suse.com/1050244"
},
{
"category": "self",
"summary": "SUSE Bug 1050536",
"url": "https://bugzilla.suse.com/1050536"
},
{
"category": "self",
"summary": "SUSE Bug 1050545",
"url": "https://bugzilla.suse.com/1050545"
},
{
"category": "self",
"summary": "SUSE Bug 1051510",
"url": "https://bugzilla.suse.com/1051510"
},
{
"category": "self",
"summary": "SUSE Bug 1055186",
"url": "https://bugzilla.suse.com/1055186"
},
{
"category": "self",
"summary": "SUSE Bug 1061840",
"url": "https://bugzilla.suse.com/1061840"
},
{
"category": "self",
"summary": "SUSE Bug 1064802",
"url": "https://bugzilla.suse.com/1064802"
},
{
"category": "self",
"summary": "SUSE Bug 1065600",
"url": "https://bugzilla.suse.com/1065600"
},
{
"category": "self",
"summary": "SUSE Bug 1066129",
"url": "https://bugzilla.suse.com/1066129"
},
{
"category": "self",
"summary": "SUSE Bug 1073513",
"url": "https://bugzilla.suse.com/1073513"
},
{
"category": "self",
"summary": "SUSE Bug 1082635",
"url": "https://bugzilla.suse.com/1082635"
},
{
"category": "self",
"summary": "SUSE Bug 1083647",
"url": "https://bugzilla.suse.com/1083647"
},
{
"category": "self",
"summary": "SUSE Bug 1086323",
"url": "https://bugzilla.suse.com/1086323"
},
{
"category": "self",
"summary": "SUSE Bug 1087092",
"url": "https://bugzilla.suse.com/1087092"
},
{
"category": "self",
"summary": "SUSE Bug 1089644",
"url": "https://bugzilla.suse.com/1089644"
},
{
"category": "self",
"summary": "SUSE Bug 1090631",
"url": "https://bugzilla.suse.com/1090631"
},
{
"category": "self",
"summary": "SUSE Bug 1093205",
"url": "https://bugzilla.suse.com/1093205"
},
{
"category": "self",
"summary": "SUSE Bug 1096254",
"url": "https://bugzilla.suse.com/1096254"
},
{
"category": "self",
"summary": "SUSE Bug 1097583",
"url": "https://bugzilla.suse.com/1097583"
},
{
"category": "self",
"summary": "SUSE Bug 1097584",
"url": "https://bugzilla.suse.com/1097584"
},
{
"category": "self",
"summary": "SUSE Bug 1097585",
"url": "https://bugzilla.suse.com/1097585"
},
{
"category": "self",
"summary": "SUSE Bug 1097586",
"url": "https://bugzilla.suse.com/1097586"
},
{
"category": "self",
"summary": "SUSE Bug 1097587",
"url": "https://bugzilla.suse.com/1097587"
},
{
"category": "self",
"summary": "SUSE Bug 1097588",
"url": "https://bugzilla.suse.com/1097588"
},
{
"category": "self",
"summary": "SUSE Bug 1098291",
"url": "https://bugzilla.suse.com/1098291"
},
{
"category": "self",
"summary": "SUSE Bug 1101674",
"url": "https://bugzilla.suse.com/1101674"
},
{
"category": "self",
"summary": "SUSE Bug 1109158",
"url": "https://bugzilla.suse.com/1109158"
},
{
"category": "self",
"summary": "SUSE Bug 1114279",
"url": "https://bugzilla.suse.com/1114279"
},
{
"category": "self",
"summary": "SUSE Bug 1117665",
"url": "https://bugzilla.suse.com/1117665"
},
{
"category": "self",
"summary": "SUSE Bug 1119461",
"url": "https://bugzilla.suse.com/1119461"
},
{
"category": "self",
"summary": "SUSE Bug 1119465",
"url": "https://bugzilla.suse.com/1119465"
},
{
"category": "self",
"summary": "SUSE Bug 1123034",
"url": "https://bugzilla.suse.com/1123034"
},
{
"category": "self",
"summary": "SUSE Bug 1123080",
"url": "https://bugzilla.suse.com/1123080"
},
{
"category": "self",
"summary": "SUSE Bug 1133140",
"url": "https://bugzilla.suse.com/1133140"
},
{
"category": "self",
"summary": "SUSE Bug 1134303",
"url": "https://bugzilla.suse.com/1134303"
},
{
"category": "self",
"summary": "SUSE Bug 1135642",
"url": "https://bugzilla.suse.com/1135642"
},
{
"category": "self",
"summary": "SUSE Bug 1135854",
"url": "https://bugzilla.suse.com/1135854"
},
{
"category": "self",
"summary": "SUSE Bug 1135873",
"url": "https://bugzilla.suse.com/1135873"
},
{
"category": "self",
"summary": "SUSE Bug 1135967",
"url": "https://bugzilla.suse.com/1135967"
},
{
"category": "self",
"summary": "SUSE Bug 1137040",
"url": "https://bugzilla.suse.com/1137040"
},
{
"category": "self",
"summary": "SUSE Bug 1137799",
"url": "https://bugzilla.suse.com/1137799"
},
{
"category": "self",
"summary": "SUSE Bug 1138190",
"url": "https://bugzilla.suse.com/1138190"
},
{
"category": "self",
"summary": "SUSE Bug 1140090",
"url": "https://bugzilla.suse.com/1140090"
},
{
"category": "self",
"summary": "SUSE Bug 1140729",
"url": "https://bugzilla.suse.com/1140729"
},
{
"category": "self",
"summary": "SUSE Bug 1140845",
"url": "https://bugzilla.suse.com/1140845"
},
{
"category": "self",
"summary": "SUSE Bug 1140883",
"url": "https://bugzilla.suse.com/1140883"
},
{
"category": "self",
"summary": "SUSE Bug 1141600",
"url": "https://bugzilla.suse.com/1141600"
},
{
"category": "self",
"summary": "SUSE Bug 1142635",
"url": "https://bugzilla.suse.com/1142635"
},
{
"category": "self",
"summary": "SUSE Bug 1142667",
"url": "https://bugzilla.suse.com/1142667"
},
{
"category": "self",
"summary": "SUSE Bug 1143706",
"url": "https://bugzilla.suse.com/1143706"
},
{
"category": "self",
"summary": "SUSE Bug 1144338",
"url": "https://bugzilla.suse.com/1144338"
},
{
"category": "self",
"summary": "SUSE Bug 1144375",
"url": "https://bugzilla.suse.com/1144375"
},
{
"category": "self",
"summary": "SUSE Bug 1144449",
"url": "https://bugzilla.suse.com/1144449"
},
{
"category": "self",
"summary": "SUSE Bug 1144903",
"url": "https://bugzilla.suse.com/1144903"
},
{
"category": "self",
"summary": "SUSE Bug 1145099",
"url": "https://bugzilla.suse.com/1145099"
},
{
"category": "self",
"summary": "SUSE Bug 1146612",
"url": "https://bugzilla.suse.com/1146612"
},
{
"category": "self",
"summary": "SUSE Bug 1148410",
"url": "https://bugzilla.suse.com/1148410"
},
{
"category": "self",
"summary": "SUSE Bug 1149119",
"url": "https://bugzilla.suse.com/1149119"
},
{
"category": "self",
"summary": "SUSE Bug 1150452",
"url": "https://bugzilla.suse.com/1150452"
},
{
"category": "self",
"summary": "SUSE Bug 1150457",
"url": "https://bugzilla.suse.com/1150457"
},
{
"category": "self",
"summary": "SUSE Bug 1150465",
"url": "https://bugzilla.suse.com/1150465"
},
{
"category": "self",
"summary": "SUSE Bug 1150875",
"url": "https://bugzilla.suse.com/1150875"
},
{
"category": "self",
"summary": "SUSE Bug 1151508",
"url": "https://bugzilla.suse.com/1151508"
},
{
"category": "self",
"summary": "SUSE Bug 1152624",
"url": "https://bugzilla.suse.com/1152624"
},
{
"category": "self",
"summary": "SUSE Bug 1152685",
"url": "https://bugzilla.suse.com/1152685"
},
{
"category": "self",
"summary": "SUSE Bug 1152782",
"url": "https://bugzilla.suse.com/1152782"
},
{
"category": "self",
"summary": "SUSE Bug 1152788",
"url": "https://bugzilla.suse.com/1152788"
},
{
"category": "self",
"summary": "SUSE Bug 1152791",
"url": "https://bugzilla.suse.com/1152791"
},
{
"category": "self",
"summary": "SUSE Bug 1153112",
"url": "https://bugzilla.suse.com/1153112"
},
{
"category": "self",
"summary": "SUSE Bug 1153158",
"url": "https://bugzilla.suse.com/1153158"
},
{
"category": "self",
"summary": "SUSE Bug 1153236",
"url": "https://bugzilla.suse.com/1153236"
},
{
"category": "self",
"summary": "SUSE Bug 1153263",
"url": "https://bugzilla.suse.com/1153263"
},
{
"category": "self",
"summary": "SUSE Bug 1153476",
"url": "https://bugzilla.suse.com/1153476"
},
{
"category": "self",
"summary": "SUSE Bug 1153509",
"url": "https://bugzilla.suse.com/1153509"
},
{
"category": "self",
"summary": "SUSE Bug 1153646",
"url": "https://bugzilla.suse.com/1153646"
},
{
"category": "self",
"summary": "SUSE Bug 1153681",
"url": "https://bugzilla.suse.com/1153681"
},
{
"category": "self",
"summary": "SUSE Bug 1153713",
"url": "https://bugzilla.suse.com/1153713"
},
{
"category": "self",
"summary": "SUSE Bug 1153717",
"url": "https://bugzilla.suse.com/1153717"
},
{
"category": "self",
"summary": "SUSE Bug 1153718",
"url": "https://bugzilla.suse.com/1153718"
},
{
"category": "self",
"summary": "SUSE Bug 1153719",
"url": "https://bugzilla.suse.com/1153719"
},
{
"category": "self",
"summary": "SUSE Bug 1153811",
"url": "https://bugzilla.suse.com/1153811"
},
{
"category": "self",
"summary": "SUSE Bug 1153969",
"url": "https://bugzilla.suse.com/1153969"
},
{
"category": "self",
"summary": "SUSE Bug 1154108",
"url": "https://bugzilla.suse.com/1154108"
},
{
"category": "self",
"summary": "SUSE Bug 1154189",
"url": "https://bugzilla.suse.com/1154189"
},
{
"category": "self",
"summary": "SUSE Bug 1154354",
"url": "https://bugzilla.suse.com/1154354"
},
{
"category": "self",
"summary": "SUSE Bug 1154372",
"url": "https://bugzilla.suse.com/1154372"
},
{
"category": "self",
"summary": "SUSE Bug 1154578",
"url": "https://bugzilla.suse.com/1154578"
},
{
"category": "self",
"summary": "SUSE Bug 1154607",
"url": "https://bugzilla.suse.com/1154607"
},
{
"category": "self",
"summary": "SUSE Bug 1154608",
"url": "https://bugzilla.suse.com/1154608"
},
{
"category": "self",
"summary": "SUSE Bug 1154610",
"url": "https://bugzilla.suse.com/1154610"
},
{
"category": "self",
"summary": "SUSE Bug 1154611",
"url": "https://bugzilla.suse.com/1154611"
},
{
"category": "self",
"summary": "SUSE Bug 1154651",
"url": "https://bugzilla.suse.com/1154651"
},
{
"category": "self",
"summary": "SUSE Bug 1154737",
"url": "https://bugzilla.suse.com/1154737"
},
{
"category": "self",
"summary": "SUSE Bug 1154747",
"url": "https://bugzilla.suse.com/1154747"
},
{
"category": "self",
"summary": "SUSE Bug 1154848",
"url": "https://bugzilla.suse.com/1154848"
},
{
"category": "self",
"summary": "SUSE Bug 1154858",
"url": "https://bugzilla.suse.com/1154858"
},
{
"category": "self",
"summary": "SUSE Bug 1154905",
"url": "https://bugzilla.suse.com/1154905"
},
{
"category": "self",
"summary": "SUSE Bug 1154956",
"url": "https://bugzilla.suse.com/1154956"
},
{
"category": "self",
"summary": "SUSE Bug 1155178",
"url": "https://bugzilla.suse.com/1155178"
},
{
"category": "self",
"summary": "SUSE Bug 1155179",
"url": "https://bugzilla.suse.com/1155179"
},
{
"category": "self",
"summary": "SUSE Bug 1155184",
"url": "https://bugzilla.suse.com/1155184"
},
{
"category": "self",
"summary": "SUSE Bug 1155186",
"url": "https://bugzilla.suse.com/1155186"
},
{
"category": "self",
"summary": "SUSE Bug 1155671",
"url": "https://bugzilla.suse.com/1155671"
},
{
"category": "self",
"summary": "SUSE Bug 1155692",
"url": "https://bugzilla.suse.com/1155692"
},
{
"category": "self",
"summary": "SUSE Bug 1155836",
"url": "https://bugzilla.suse.com/1155836"
},
{
"category": "self",
"summary": "SUSE Bug 1155982",
"url": "https://bugzilla.suse.com/1155982"
},
{
"category": "self",
"summary": "SUSE Bug 1156187",
"url": "https://bugzilla.suse.com/1156187"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-12207 page",
"url": "https://www.suse.com/security/cve/CVE-2018-12207/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-10220 page",
"url": "https://www.suse.com/security/cve/CVE-2019-10220/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11135 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11135/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-16232 page",
"url": "https://www.suse.com/security/cve/CVE-2019-16232/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-16233 page",
"url": "https://www.suse.com/security/cve/CVE-2019-16233/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-16234 page",
"url": "https://www.suse.com/security/cve/CVE-2019-16234/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-16995 page",
"url": "https://www.suse.com/security/cve/CVE-2019-16995/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-17055 page",
"url": "https://www.suse.com/security/cve/CVE-2019-17055/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-17056 page",
"url": "https://www.suse.com/security/cve/CVE-2019-17056/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-17133 page",
"url": "https://www.suse.com/security/cve/CVE-2019-17133/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-17666 page",
"url": "https://www.suse.com/security/cve/CVE-2019-17666/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-18805 page",
"url": "https://www.suse.com/security/cve/CVE-2019-18805/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2019-11-12T18:12:59Z",
"generator": {
"date": "2019-11-12T18:12:59Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2019:2951-1",
"initial_release_date": "2019-11-12T18:12:59Z",
"revision_history": [
{
"date": "2019-11-12T18:12:59Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-azure-4.12.14-5.44.1.noarch",
"product": {
"name": "kernel-devel-azure-4.12.14-5.44.1.noarch",
"product_id": "kernel-devel-azure-4.12.14-5.44.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-azure-4.12.14-5.44.1.noarch",
"product": {
"name": "kernel-source-azure-4.12.14-5.44.1.noarch",
"product_id": "kernel-source-azure-4.12.14-5.44.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-azure-4.12.14-5.44.1.x86_64",
"product": {
"name": "cluster-md-kmp-azure-4.12.14-5.44.1.x86_64",
"product_id": "cluster-md-kmp-azure-4.12.14-5.44.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-azure-4.12.14-5.44.1.x86_64",
"product": {
"name": "dlm-kmp-azure-4.12.14-5.44.1.x86_64",
"product_id": "dlm-kmp-azure-4.12.14-5.44.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-azure-4.12.14-5.44.1.x86_64",
"product": {
"name": "gfs2-kmp-azure-4.12.14-5.44.1.x86_64",
"product_id": "gfs2-kmp-azure-4.12.14-5.44.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-4.12.14-5.44.1.x86_64",
"product": {
"name": "kernel-azure-4.12.14-5.44.1.x86_64",
"product_id": "kernel-azure-4.12.14-5.44.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-base-4.12.14-5.44.1.x86_64",
"product": {
"name": "kernel-azure-base-4.12.14-5.44.1.x86_64",
"product_id": "kernel-azure-base-4.12.14-5.44.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-devel-4.12.14-5.44.1.x86_64",
"product": {
"name": "kernel-azure-devel-4.12.14-5.44.1.x86_64",
"product_id": "kernel-azure-devel-4.12.14-5.44.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-extra-4.12.14-5.44.1.x86_64",
"product": {
"name": "kernel-azure-extra-4.12.14-5.44.1.x86_64",
"product_id": "kernel-azure-extra-4.12.14-5.44.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-livepatch-devel-4.12.14-5.44.1.x86_64",
"product": {
"name": "kernel-azure-livepatch-devel-4.12.14-5.44.1.x86_64",
"product_id": "kernel-azure-livepatch-devel-4.12.14-5.44.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-azure-4.12.14-5.44.1.x86_64",
"product": {
"name": "kernel-syms-azure-4.12.14-5.44.1.x86_64",
"product_id": "kernel-syms-azure-4.12.14-5.44.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-azure-4.12.14-5.44.1.x86_64",
"product": {
"name": "kselftests-kmp-azure-4.12.14-5.44.1.x86_64",
"product_id": "kselftests-kmp-azure-4.12.14-5.44.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-azure-4.12.14-5.44.1.x86_64",
"product": {
"name": "ocfs2-kmp-azure-4.12.14-5.44.1.x86_64",
"product_id": "ocfs2-kmp-azure-4.12.14-5.44.1.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-azure-4.12.14-5.44.1.x86_64",
"product": {
"name": "reiserfs-kmp-azure-4.12.14-5.44.1.x86_64",
"product_id": "reiserfs-kmp-azure-4.12.14-5.44.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Public Cloud 15",
"product": {
"name": "SUSE Linux Enterprise Module for Public Cloud 15",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-public-cloud:15"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-4.12.14-5.44.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.44.1.x86_64"
},
"product_reference": "kernel-azure-4.12.14-5.44.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-base-4.12.14-5.44.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.44.1.x86_64"
},
"product_reference": "kernel-azure-base-4.12.14-5.44.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-devel-4.12.14-5.44.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.44.1.x86_64"
},
"product_reference": "kernel-azure-devel-4.12.14-5.44.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-azure-4.12.14-5.44.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.44.1.noarch"
},
"product_reference": "kernel-devel-azure-4.12.14-5.44.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-azure-4.12.14-5.44.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.44.1.noarch"
},
"product_reference": "kernel-source-azure-4.12.14-5.44.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-azure-4.12.14-5.44.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.44.1.x86_64"
},
"product_reference": "kernel-syms-azure-4.12.14-5.44.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-12207",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-12207"
}
],
"notes": [
{
"category": "general",
"text": "Improper invalidation for page table updates by a virtual guest operating system for multiple Intel(R) Processors may allow an authenticated user to potentially enable denial of service of the host system via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.44.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.44.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.44.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.44.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.44.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.44.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-12207",
"url": "https://www.suse.com/security/cve/CVE-2018-12207"
},
{
"category": "external",
"summary": "SUSE Bug 1117665 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1117665"
},
{
"category": "external",
"summary": "SUSE Bug 1139073 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1139073"
},
{
"category": "external",
"summary": "SUSE Bug 1152505 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1152505"
},
{
"category": "external",
"summary": "SUSE Bug 1155812 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1155812"
},
{
"category": "external",
"summary": "SUSE Bug 1155817 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1155817"
},
{
"category": "external",
"summary": "SUSE Bug 1155945 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1155945"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1201877"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.44.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.44.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.44.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.44.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.44.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.44.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.44.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.44.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.44.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.44.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.44.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.44.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:12:59Z",
"details": "moderate"
}
],
"title": "CVE-2018-12207"
},
{
"cve": "CVE-2019-10220",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-10220"
}
],
"notes": [
{
"category": "general",
"text": "Linux kernel CIFS implementation, version 4.9.0 is vulnerable to a relative paths injection in directory entry lists.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.44.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.44.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.44.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.44.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.44.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.44.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-10220",
"url": "https://www.suse.com/security/cve/CVE-2019-10220"
},
{
"category": "external",
"summary": "SUSE Bug 1144903 for CVE-2019-10220",
"url": "https://bugzilla.suse.com/1144903"
},
{
"category": "external",
"summary": "SUSE Bug 1153108 for CVE-2019-10220",
"url": "https://bugzilla.suse.com/1153108"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.44.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.44.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.44.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.44.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.44.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.44.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.44.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.44.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.44.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.44.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.44.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.44.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:12:59Z",
"details": "important"
}
],
"title": "CVE-2019-10220"
},
{
"cve": "CVE-2019-11135",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11135"
}
],
"notes": [
{
"category": "general",
"text": "TSX Asynchronous Abort condition on some CPUs utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.44.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.44.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.44.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.44.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.44.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.44.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11135",
"url": "https://www.suse.com/security/cve/CVE-2019-11135"
},
{
"category": "external",
"summary": "SUSE Bug 1139073 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1139073"
},
{
"category": "external",
"summary": "SUSE Bug 1152497 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1152497"
},
{
"category": "external",
"summary": "SUSE Bug 1152505 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1152505"
},
{
"category": "external",
"summary": "SUSE Bug 1152506 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1152506"
},
{
"category": "external",
"summary": "SUSE Bug 1160120 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1160120"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1201877"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.44.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.44.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.44.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.44.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.44.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.44.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.44.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.44.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.44.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.44.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.44.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.44.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:12:59Z",
"details": "moderate"
}
],
"title": "CVE-2019-11135"
},
{
"cve": "CVE-2019-16232",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-16232"
}
],
"notes": [
{
"category": "general",
"text": "drivers/net/wireless/marvell/libertas/if_sdio.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.44.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.44.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.44.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.44.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.44.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.44.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-16232",
"url": "https://www.suse.com/security/cve/CVE-2019-16232"
},
{
"category": "external",
"summary": "SUSE Bug 1150465 for CVE-2019-16232",
"url": "https://bugzilla.suse.com/1150465"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.44.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.44.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.44.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.44.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.44.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.44.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.44.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.44.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.44.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.44.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.44.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.44.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:12:59Z",
"details": "low"
}
],
"title": "CVE-2019-16232"
},
{
"cve": "CVE-2019-16233",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-16233"
}
],
"notes": [
{
"category": "general",
"text": "drivers/scsi/qla2xxx/qla_os.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.44.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.44.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.44.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.44.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.44.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.44.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-16233",
"url": "https://www.suse.com/security/cve/CVE-2019-16233"
},
{
"category": "external",
"summary": "SUSE Bug 1150457 for CVE-2019-16233",
"url": "https://bugzilla.suse.com/1150457"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.44.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.44.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.44.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.44.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.44.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.44.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.44.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.44.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.44.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.44.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.44.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.44.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:12:59Z",
"details": "low"
}
],
"title": "CVE-2019-16233"
},
{
"cve": "CVE-2019-16234",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-16234"
}
],
"notes": [
{
"category": "general",
"text": "drivers/net/wireless/intel/iwlwifi/pcie/trans.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.44.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.44.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.44.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.44.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.44.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.44.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-16234",
"url": "https://www.suse.com/security/cve/CVE-2019-16234"
},
{
"category": "external",
"summary": "SUSE Bug 1150452 for CVE-2019-16234",
"url": "https://bugzilla.suse.com/1150452"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.44.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.44.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.44.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.44.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.44.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.44.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.44.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.44.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.44.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.44.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.44.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.44.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:12:59Z",
"details": "low"
}
],
"title": "CVE-2019-16234"
},
{
"cve": "CVE-2019-16995",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-16995"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel before 5.0.3, a memory leak exits in hsr_dev_finalize() in net/hsr/hsr_device.c if hsr_add_port fails to add a port, which may cause denial of service, aka CID-6caabe7f197d.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.44.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.44.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.44.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.44.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.44.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.44.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-16995",
"url": "https://www.suse.com/security/cve/CVE-2019-16995"
},
{
"category": "external",
"summary": "SUSE Bug 1152685 for CVE-2019-16995",
"url": "https://bugzilla.suse.com/1152685"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.44.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.44.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.44.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.44.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.44.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.44.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.44.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.44.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.44.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.44.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.44.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.44.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:12:59Z",
"details": "moderate"
}
],
"title": "CVE-2019-16995"
},
{
"cve": "CVE-2019-17055",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-17055"
}
],
"notes": [
{
"category": "general",
"text": "base_sock_create in drivers/isdn/mISDN/socket.c in the AF_ISDN network module in the Linux kernel through 5.3.2 does not enforce CAP_NET_RAW, which means that unprivileged users can create a raw socket, aka CID-b91ee4aa2a21.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.44.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.44.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.44.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.44.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.44.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.44.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-17055",
"url": "https://www.suse.com/security/cve/CVE-2019-17055"
},
{
"category": "external",
"summary": "SUSE Bug 1152782 for CVE-2019-17055",
"url": "https://bugzilla.suse.com/1152782"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.44.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.44.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.44.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.44.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.44.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.44.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.44.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.44.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.44.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.44.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.44.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.44.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:12:59Z",
"details": "low"
}
],
"title": "CVE-2019-17055"
},
{
"cve": "CVE-2019-17056",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-17056"
}
],
"notes": [
{
"category": "general",
"text": "llcp_sock_create in net/nfc/llcp_sock.c in the AF_NFC network module in the Linux kernel through 5.3.2 does not enforce CAP_NET_RAW, which means that unprivileged users can create a raw socket, aka CID-3a359798b176.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.44.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.44.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.44.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.44.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.44.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.44.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-17056",
"url": "https://www.suse.com/security/cve/CVE-2019-17056"
},
{
"category": "external",
"summary": "SUSE Bug 1152788 for CVE-2019-17056",
"url": "https://bugzilla.suse.com/1152788"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.44.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.44.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.44.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.44.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.44.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.44.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.44.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.44.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.44.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.44.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.44.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.44.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:12:59Z",
"details": "moderate"
}
],
"title": "CVE-2019-17056"
},
{
"cve": "CVE-2019-17133",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-17133"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel through 5.3.2, cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c does not reject a long SSID IE, leading to a Buffer Overflow.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.44.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.44.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.44.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.44.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.44.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.44.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-17133",
"url": "https://www.suse.com/security/cve/CVE-2019-17133"
},
{
"category": "external",
"summary": "SUSE Bug 1153158 for CVE-2019-17133",
"url": "https://bugzilla.suse.com/1153158"
},
{
"category": "external",
"summary": "SUSE Bug 1153161 for CVE-2019-17133",
"url": "https://bugzilla.suse.com/1153161"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.44.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.44.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.44.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.44.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.44.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.44.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.44.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.44.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.44.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.44.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.44.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.44.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:12:59Z",
"details": "important"
}
],
"title": "CVE-2019-17133"
},
{
"cve": "CVE-2019-17666",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-17666"
}
],
"notes": [
{
"category": "general",
"text": "rtl_p2p_noa_ie in drivers/net/wireless/realtek/rtlwifi/ps.c in the Linux kernel through 5.3.6 lacks a certain upper-bound check, leading to a buffer overflow.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.44.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.44.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.44.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.44.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.44.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.44.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-17666",
"url": "https://www.suse.com/security/cve/CVE-2019-17666"
},
{
"category": "external",
"summary": "SUSE Bug 1154372 for CVE-2019-17666",
"url": "https://bugzilla.suse.com/1154372"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.44.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.44.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.44.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.44.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.44.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.44.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.44.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.44.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.44.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.44.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.44.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.44.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:12:59Z",
"details": "moderate"
}
],
"title": "CVE-2019-17666"
},
{
"cve": "CVE-2019-18805",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-18805"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in net/ipv4/sysctl_net_ipv4.c in the Linux kernel before 5.0.11. There is a net/ipv4/tcp_input.c signed integer overflow in tcp_ack_update_rtt() when userspace writes a very large integer to /proc/sys/net/ipv4/tcp_min_rtt_wlen, leading to a denial of service or possibly unspecified other impact, aka CID-19fad20d15a6.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.44.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.44.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.44.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.44.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.44.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.44.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-18805",
"url": "https://www.suse.com/security/cve/CVE-2019-18805"
},
{
"category": "external",
"summary": "SUSE Bug 1156187 for CVE-2019-18805",
"url": "https://bugzilla.suse.com/1156187"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.44.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.44.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.44.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.44.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.44.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.44.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.44.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.44.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.44.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.44.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.44.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.44.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:12:59Z",
"details": "low"
}
],
"title": "CVE-2019-18805"
}
]
}
suse-su-2020:14444-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for xen",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for xen fixes the following issues:\n\n- bsc#1174543 - secure boot related fixes\n- bsc#1163019 - CVE-2020-8608: potential OOB access due to unsafe snprintf() usages\n- bsc#1169392 - CVE-2020-11742: Bad continuation handling in GNTTABOP_copy\n- bsc#1168140 - CVE-2020-11740, CVE-2020-11741: multiple xenoprof issues\n- bsc#1161181 - CVE-2020-7211: potential directory traversal using relative paths via tftp server on Windows host\n- bsc#1157888 - CVE-2019-19579: Device quarantine for alternate pci assignment methods\n- bsc#1158004 - CVE-2019-19583: VMX: VMentry failure with debug exceptions and blocked states\n- bsc#1158005 - CVE-2019-19578: Linear pagetable use / entry miscounts\n- bsc#1158006 - CVE-2019-19580: Further issues with restartable PV type change operations\n- bsc#1158007 - CVE-2019-19577: dynamic height for the IOMMU pagetables \n- bsc#1154448 - CVE-2019-18420: VCPUOP_initialise DoS\n- bsc#1154456 - CVE-2019-18425: missing descriptor table limit checking in x86 PV emulation\n- bsc#1154458 - CVE-2019-18421: Issues with restartable PV type change operations\n- bsc#1154461 - CVE-2019-18424: passed through PCI devices may corrupt host memory after deassignment\n- bsc#1155945 - CVE-2018-12207: Machine Check Error Avoidance on Page Size Change (aka IFU issue)\n- bsc#1152497 - CVE-2019-11135: TSX Asynchronous Abort (TAA) issue\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "slessp4-xen-14444",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_14444-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2020:14444-1",
"url": "https://www.suse.com/support/update/announcement/2020/suse-su-202014444-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2020:14444-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2020-August/007221.html"
},
{
"category": "self",
"summary": "SUSE Bug 1152497",
"url": "https://bugzilla.suse.com/1152497"
},
{
"category": "self",
"summary": "SUSE Bug 1154448",
"url": "https://bugzilla.suse.com/1154448"
},
{
"category": "self",
"summary": "SUSE Bug 1154456",
"url": "https://bugzilla.suse.com/1154456"
},
{
"category": "self",
"summary": "SUSE Bug 1154458",
"url": "https://bugzilla.suse.com/1154458"
},
{
"category": "self",
"summary": "SUSE Bug 1154461",
"url": "https://bugzilla.suse.com/1154461"
},
{
"category": "self",
"summary": "SUSE Bug 1155945",
"url": "https://bugzilla.suse.com/1155945"
},
{
"category": "self",
"summary": "SUSE Bug 1157888",
"url": "https://bugzilla.suse.com/1157888"
},
{
"category": "self",
"summary": "SUSE Bug 1158004",
"url": "https://bugzilla.suse.com/1158004"
},
{
"category": "self",
"summary": "SUSE Bug 1158005",
"url": "https://bugzilla.suse.com/1158005"
},
{
"category": "self",
"summary": "SUSE Bug 1158006",
"url": "https://bugzilla.suse.com/1158006"
},
{
"category": "self",
"summary": "SUSE Bug 1158007",
"url": "https://bugzilla.suse.com/1158007"
},
{
"category": "self",
"summary": "SUSE Bug 1161181",
"url": "https://bugzilla.suse.com/1161181"
},
{
"category": "self",
"summary": "SUSE Bug 1163019",
"url": "https://bugzilla.suse.com/1163019"
},
{
"category": "self",
"summary": "SUSE Bug 1168140",
"url": "https://bugzilla.suse.com/1168140"
},
{
"category": "self",
"summary": "SUSE Bug 1169392",
"url": "https://bugzilla.suse.com/1169392"
},
{
"category": "self",
"summary": "SUSE Bug 1174543",
"url": "https://bugzilla.suse.com/1174543"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-12207 page",
"url": "https://www.suse.com/security/cve/CVE-2018-12207/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11135 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11135/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-18420 page",
"url": "https://www.suse.com/security/cve/CVE-2019-18420/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-18421 page",
"url": "https://www.suse.com/security/cve/CVE-2019-18421/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-18424 page",
"url": "https://www.suse.com/security/cve/CVE-2019-18424/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-18425 page",
"url": "https://www.suse.com/security/cve/CVE-2019-18425/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-19577 page",
"url": "https://www.suse.com/security/cve/CVE-2019-19577/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-19578 page",
"url": "https://www.suse.com/security/cve/CVE-2019-19578/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-19579 page",
"url": "https://www.suse.com/security/cve/CVE-2019-19579/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-19580 page",
"url": "https://www.suse.com/security/cve/CVE-2019-19580/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-19583 page",
"url": "https://www.suse.com/security/cve/CVE-2019-19583/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-11740 page",
"url": "https://www.suse.com/security/cve/CVE-2020-11740/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-11741 page",
"url": "https://www.suse.com/security/cve/CVE-2020-11741/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-11742 page",
"url": "https://www.suse.com/security/cve/CVE-2020-11742/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-7211 page",
"url": "https://www.suse.com/security/cve/CVE-2020-7211/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-8608 page",
"url": "https://www.suse.com/security/cve/CVE-2020-8608/"
}
],
"title": "Security update for xen",
"tracking": {
"current_release_date": "2020-08-04T13:17:01Z",
"generator": {
"date": "2020-08-04T13:17:01Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2020:14444-1",
"initial_release_date": "2020-08-04T13:17:01Z",
"revision_history": [
{
"date": "2020-08-04T13:17:01Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "xen-kmp-default-4.4.4_42_3.0.101_108.114-61.52.1.i586",
"product": {
"name": "xen-kmp-default-4.4.4_42_3.0.101_108.114-61.52.1.i586",
"product_id": "xen-kmp-default-4.4.4_42_3.0.101_108.114-61.52.1.i586"
}
},
{
"category": "product_version",
"name": "xen-kmp-pae-4.4.4_42_3.0.101_108.114-61.52.1.i586",
"product": {
"name": "xen-kmp-pae-4.4.4_42_3.0.101_108.114-61.52.1.i586",
"product_id": "xen-kmp-pae-4.4.4_42_3.0.101_108.114-61.52.1.i586"
}
},
{
"category": "product_version",
"name": "xen-libs-4.4.4_42-61.52.1.i586",
"product": {
"name": "xen-libs-4.4.4_42-61.52.1.i586",
"product_id": "xen-libs-4.4.4_42-61.52.1.i586"
}
},
{
"category": "product_version",
"name": "xen-tools-domU-4.4.4_42-61.52.1.i586",
"product": {
"name": "xen-tools-domU-4.4.4_42-61.52.1.i586",
"product_id": "xen-tools-domU-4.4.4_42-61.52.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "xen-4.4.4_42-61.52.1.x86_64",
"product": {
"name": "xen-4.4.4_42-61.52.1.x86_64",
"product_id": "xen-4.4.4_42-61.52.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-doc-html-4.4.4_42-61.52.1.x86_64",
"product": {
"name": "xen-doc-html-4.4.4_42-61.52.1.x86_64",
"product_id": "xen-doc-html-4.4.4_42-61.52.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-kmp-default-4.4.4_42_3.0.101_108.114-61.52.1.x86_64",
"product": {
"name": "xen-kmp-default-4.4.4_42_3.0.101_108.114-61.52.1.x86_64",
"product_id": "xen-kmp-default-4.4.4_42_3.0.101_108.114-61.52.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-libs-4.4.4_42-61.52.1.x86_64",
"product": {
"name": "xen-libs-4.4.4_42-61.52.1.x86_64",
"product_id": "xen-libs-4.4.4_42-61.52.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-libs-32bit-4.4.4_42-61.52.1.x86_64",
"product": {
"name": "xen-libs-32bit-4.4.4_42-61.52.1.x86_64",
"product_id": "xen-libs-32bit-4.4.4_42-61.52.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-tools-4.4.4_42-61.52.1.x86_64",
"product": {
"name": "xen-tools-4.4.4_42-61.52.1.x86_64",
"product_id": "xen-tools-4.4.4_42-61.52.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-tools-domU-4.4.4_42-61.52.1.x86_64",
"product": {
"name": "xen-tools-domU-4.4.4_42-61.52.1.x86_64",
"product_id": "xen-tools-domU-4.4.4_42-61.52.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 11 SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_sles:11:sp4"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-4.4.4_42-61.52.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-4.4.4_42-61.52.1.x86_64"
},
"product_reference": "xen-4.4.4_42-61.52.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-doc-html-4.4.4_42-61.52.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-doc-html-4.4.4_42-61.52.1.x86_64"
},
"product_reference": "xen-doc-html-4.4.4_42-61.52.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-kmp-default-4.4.4_42_3.0.101_108.114-61.52.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_42_3.0.101_108.114-61.52.1.i586"
},
"product_reference": "xen-kmp-default-4.4.4_42_3.0.101_108.114-61.52.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-kmp-default-4.4.4_42_3.0.101_108.114-61.52.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_42_3.0.101_108.114-61.52.1.x86_64"
},
"product_reference": "xen-kmp-default-4.4.4_42_3.0.101_108.114-61.52.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-kmp-pae-4.4.4_42_3.0.101_108.114-61.52.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-pae-4.4.4_42_3.0.101_108.114-61.52.1.i586"
},
"product_reference": "xen-kmp-pae-4.4.4_42_3.0.101_108.114-61.52.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.4.4_42-61.52.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_42-61.52.1.i586"
},
"product_reference": "xen-libs-4.4.4_42-61.52.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.4.4_42-61.52.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_42-61.52.1.x86_64"
},
"product_reference": "xen-libs-4.4.4_42-61.52.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-32bit-4.4.4_42-61.52.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-32bit-4.4.4_42-61.52.1.x86_64"
},
"product_reference": "xen-libs-32bit-4.4.4_42-61.52.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-4.4.4_42-61.52.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-4.4.4_42-61.52.1.x86_64"
},
"product_reference": "xen-tools-4.4.4_42-61.52.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-domU-4.4.4_42-61.52.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_42-61.52.1.i586"
},
"product_reference": "xen-tools-domU-4.4.4_42-61.52.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-domU-4.4.4_42-61.52.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_42-61.52.1.x86_64"
},
"product_reference": "xen-tools-domU-4.4.4_42-61.52.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-12207",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-12207"
}
],
"notes": [
{
"category": "general",
"text": "Improper invalidation for page table updates by a virtual guest operating system for multiple Intel(R) Processors may allow an authenticated user to potentially enable denial of service of the host system via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-doc-html-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_42_3.0.101_108.114-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_42_3.0.101_108.114-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-pae-4.4.4_42_3.0.101_108.114-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-32bit-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_42-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_42-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_42-61.52.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-12207",
"url": "https://www.suse.com/security/cve/CVE-2018-12207"
},
{
"category": "external",
"summary": "SUSE Bug 1117665 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1117665"
},
{
"category": "external",
"summary": "SUSE Bug 1139073 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1139073"
},
{
"category": "external",
"summary": "SUSE Bug 1152505 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1152505"
},
{
"category": "external",
"summary": "SUSE Bug 1155812 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1155812"
},
{
"category": "external",
"summary": "SUSE Bug 1155817 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1155817"
},
{
"category": "external",
"summary": "SUSE Bug 1155945 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1155945"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1201877"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-doc-html-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_42_3.0.101_108.114-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_42_3.0.101_108.114-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-pae-4.4.4_42_3.0.101_108.114-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-32bit-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_42-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_42-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_42-61.52.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-doc-html-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_42_3.0.101_108.114-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_42_3.0.101_108.114-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-pae-4.4.4_42_3.0.101_108.114-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-32bit-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_42-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_42-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_42-61.52.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-08-04T13:17:01Z",
"details": "moderate"
}
],
"title": "CVE-2018-12207"
},
{
"cve": "CVE-2019-11135",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11135"
}
],
"notes": [
{
"category": "general",
"text": "TSX Asynchronous Abort condition on some CPUs utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-doc-html-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_42_3.0.101_108.114-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_42_3.0.101_108.114-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-pae-4.4.4_42_3.0.101_108.114-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-32bit-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_42-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_42-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_42-61.52.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11135",
"url": "https://www.suse.com/security/cve/CVE-2019-11135"
},
{
"category": "external",
"summary": "SUSE Bug 1139073 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1139073"
},
{
"category": "external",
"summary": "SUSE Bug 1152497 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1152497"
},
{
"category": "external",
"summary": "SUSE Bug 1152505 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1152505"
},
{
"category": "external",
"summary": "SUSE Bug 1152506 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1152506"
},
{
"category": "external",
"summary": "SUSE Bug 1160120 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1160120"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1201877"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-doc-html-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_42_3.0.101_108.114-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_42_3.0.101_108.114-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-pae-4.4.4_42_3.0.101_108.114-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-32bit-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_42-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_42-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_42-61.52.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-doc-html-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_42_3.0.101_108.114-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_42_3.0.101_108.114-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-pae-4.4.4_42_3.0.101_108.114-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-32bit-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_42-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_42-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_42-61.52.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-08-04T13:17:01Z",
"details": "moderate"
}
],
"title": "CVE-2019-11135"
},
{
"cve": "CVE-2019-18420",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-18420"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Xen through 4.12.x allowing x86 PV guest OS users to cause a denial of service via a VCPUOP_initialise hypercall. hypercall_create_continuation() is a variadic function which uses a printf-like format string to interpret its parameters. Error handling for a bad format character was done using BUG(), which crashes Xen. One path, via the VCPUOP_initialise hypercall, has a bad format character. The BUG() can be hit if VCPUOP_initialise executes for a sufficiently long period of time for a continuation to be created. Malicious guests may cause a hypervisor crash, resulting in a Denial of Service (DoS). Xen versions 4.6 and newer are vulnerable. Xen versions 4.5 and earlier are not vulnerable. Only x86 PV guests can exploit the vulnerability. HVM and PVH guests, and guests on ARM systems, cannot exploit the vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-doc-html-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_42_3.0.101_108.114-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_42_3.0.101_108.114-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-pae-4.4.4_42_3.0.101_108.114-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-32bit-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_42-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_42-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_42-61.52.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-18420",
"url": "https://www.suse.com/security/cve/CVE-2019-18420"
},
{
"category": "external",
"summary": "SUSE Bug 1154448 for CVE-2019-18420",
"url": "https://bugzilla.suse.com/1154448"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-doc-html-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_42_3.0.101_108.114-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_42_3.0.101_108.114-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-pae-4.4.4_42_3.0.101_108.114-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-32bit-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_42-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_42-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_42-61.52.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-doc-html-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_42_3.0.101_108.114-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_42_3.0.101_108.114-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-pae-4.4.4_42_3.0.101_108.114-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-32bit-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_42-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_42-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_42-61.52.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-08-04T13:17:01Z",
"details": "important"
}
],
"title": "CVE-2019-18420"
},
{
"cve": "CVE-2019-18421",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-18421"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Xen through 4.12.x allowing x86 PV guest OS users to gain host OS privileges by leveraging race conditions in pagetable promotion and demotion operations. There are issues with restartable PV type change operations. To avoid using shadow pagetables for PV guests, Xen exposes the actual hardware pagetables to the guest. In order to prevent the guest from modifying these page tables directly, Xen keeps track of how pages are used using a type system; pages must be \"promoted\" before being used as a pagetable, and \"demoted\" before being used for any other type. Xen also allows for \"recursive\" promotions: i.e., an operating system promoting a page to an L4 pagetable may end up causing pages to be promoted to L3s, which may in turn cause pages to be promoted to L2s, and so on. These operations may take an arbitrarily large amount of time, and so must be re-startable. Unfortunately, making recursive pagetable promotion and demotion operations restartable is incredibly complicated, and the code contains several races which, if triggered, can cause Xen to drop or retain extra type counts, potentially allowing guests to get write access to in-use pagetables. A malicious PV guest administrator may be able to escalate their privilege to that of the host. All x86 systems with untrusted PV guests are vulnerable. HVM and PVH guests cannot exercise this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-doc-html-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_42_3.0.101_108.114-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_42_3.0.101_108.114-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-pae-4.4.4_42_3.0.101_108.114-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-32bit-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_42-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_42-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_42-61.52.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-18421",
"url": "https://www.suse.com/security/cve/CVE-2019-18421"
},
{
"category": "external",
"summary": "SUSE Bug 1154458 for CVE-2019-18421",
"url": "https://bugzilla.suse.com/1154458"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2019-18421",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-doc-html-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_42_3.0.101_108.114-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_42_3.0.101_108.114-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-pae-4.4.4_42_3.0.101_108.114-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-32bit-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_42-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_42-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_42-61.52.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-doc-html-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_42_3.0.101_108.114-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_42_3.0.101_108.114-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-pae-4.4.4_42_3.0.101_108.114-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-32bit-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_42-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_42-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_42-61.52.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-08-04T13:17:01Z",
"details": "important"
}
],
"title": "CVE-2019-18421"
},
{
"cve": "CVE-2019-18424",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-18424"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Xen through 4.12.x allowing attackers to gain host OS privileges via DMA in a situation where an untrusted domain has access to a physical device. This occurs because passed through PCI devices may corrupt host memory after deassignment. When a PCI device is assigned to an untrusted domain, it is possible for that domain to program the device to DMA to an arbitrary address. The IOMMU is used to protect the host from malicious DMA by making sure that the device addresses can only target memory assigned to the guest. However, when the guest domain is torn down, or the device is deassigned, the device is assigned back to dom0, thus allowing any in-flight DMA to potentially target critical host data. An untrusted domain with access to a physical device can DMA into host memory, leading to privilege escalation. Only systems where guests are given direct access to physical devices capable of DMA (PCI pass-through) are vulnerable. Systems which do not use PCI pass-through are not vulnerable.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-doc-html-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_42_3.0.101_108.114-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_42_3.0.101_108.114-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-pae-4.4.4_42_3.0.101_108.114-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-32bit-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_42-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_42-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_42-61.52.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-18424",
"url": "https://www.suse.com/security/cve/CVE-2019-18424"
},
{
"category": "external",
"summary": "SUSE Bug 1154461 for CVE-2019-18424",
"url": "https://bugzilla.suse.com/1154461"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-doc-html-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_42_3.0.101_108.114-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_42_3.0.101_108.114-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-pae-4.4.4_42_3.0.101_108.114-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-32bit-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_42-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_42-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_42-61.52.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.6,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-doc-html-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_42_3.0.101_108.114-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_42_3.0.101_108.114-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-pae-4.4.4_42_3.0.101_108.114-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-32bit-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_42-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_42-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_42-61.52.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-08-04T13:17:01Z",
"details": "important"
}
],
"title": "CVE-2019-18424"
},
{
"cve": "CVE-2019-18425",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-18425"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Xen through 4.12.x allowing 32-bit PV guest OS users to gain guest OS privileges by installing and using descriptors. There is missing descriptor table limit checking in x86 PV emulation. When emulating certain PV guest operations, descriptor table accesses are performed by the emulating code. Such accesses should respect the guest specified limits, unless otherwise guaranteed to fail in such a case. Without this, emulation of 32-bit guest user mode calls through call gates would allow guest user mode to install and then use descriptors of their choice, as long as the guest kernel did not itself install an LDT. (Most OSes don\u0027t install any LDT by default). 32-bit PV guest user mode can elevate its privileges to that of the guest kernel. Xen versions from at least 3.2 onwards are affected. Only 32-bit PV guest user mode can leverage this vulnerability. HVM, PVH, as well as 64-bit PV guests cannot leverage this vulnerability. Arm systems are unaffected.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-doc-html-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_42_3.0.101_108.114-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_42_3.0.101_108.114-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-pae-4.4.4_42_3.0.101_108.114-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-32bit-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_42-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_42-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_42-61.52.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-18425",
"url": "https://www.suse.com/security/cve/CVE-2019-18425"
},
{
"category": "external",
"summary": "SUSE Bug 1154456 for CVE-2019-18425",
"url": "https://bugzilla.suse.com/1154456"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2019-18425",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-doc-html-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_42_3.0.101_108.114-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_42_3.0.101_108.114-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-pae-4.4.4_42_3.0.101_108.114-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-32bit-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_42-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_42-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_42-61.52.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-doc-html-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_42_3.0.101_108.114-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_42_3.0.101_108.114-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-pae-4.4.4_42_3.0.101_108.114-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-32bit-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_42-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_42-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_42-61.52.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-08-04T13:17:01Z",
"details": "important"
}
],
"title": "CVE-2019-18425"
},
{
"cve": "CVE-2019-19577",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-19577"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Xen through 4.12.x allowing x86 AMD HVM guest OS users to cause a denial of service or possibly gain privileges by triggering data-structure access during pagetable-height updates. When running on AMD systems with an IOMMU, Xen attempted to dynamically adapt the number of levels of pagetables (the pagetable height) in the IOMMU according to the guest\u0027s address space size. The code to select and update the height had several bugs. Notably, the update was done without taking a lock which is necessary for safe operation. A malicious guest administrator can cause Xen to access data structures while they are being modified, causing Xen to crash. Privilege escalation is thought to be very difficult but cannot be ruled out. Additionally, there is a potential memory leak of 4kb per guest boot, under memory pressure. Only Xen on AMD CPUs is vulnerable. Xen running on Intel CPUs is not vulnerable. ARM systems are not vulnerable. Only systems where guests are given direct access to physical devices are vulnerable. Systems which do not use PCI pass-through are not vulnerable. Only HVM guests can exploit the vulnerability. PV and PVH guests cannot. All versions of Xen with IOMMU support are vulnerable.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-doc-html-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_42_3.0.101_108.114-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_42_3.0.101_108.114-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-pae-4.4.4_42_3.0.101_108.114-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-32bit-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_42-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_42-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_42-61.52.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-19577",
"url": "https://www.suse.com/security/cve/CVE-2019-19577"
},
{
"category": "external",
"summary": "SUSE Bug 1158007 for CVE-2019-19577",
"url": "https://bugzilla.suse.com/1158007"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-doc-html-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_42_3.0.101_108.114-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_42_3.0.101_108.114-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-pae-4.4.4_42_3.0.101_108.114-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-32bit-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_42-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_42-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_42-61.52.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-doc-html-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_42_3.0.101_108.114-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_42_3.0.101_108.114-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-pae-4.4.4_42_3.0.101_108.114-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-32bit-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_42-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_42-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_42-61.52.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-08-04T13:17:01Z",
"details": "important"
}
],
"title": "CVE-2019-19577"
},
{
"cve": "CVE-2019-19578",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-19578"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Xen through 4.12.x allowing x86 PV guest OS users to cause a denial of service via degenerate chains of linear pagetables, because of an incorrect fix for CVE-2017-15595. \"Linear pagetables\" is a technique which involves either pointing a pagetable at itself, or to another pagetable of the same or higher level. Xen has limited support for linear pagetables: A page may either point to itself, or point to another pagetable of the same level (i.e., L2 to L2, L3 to L3, and so on). XSA-240 introduced an additional restriction that limited the \"depth\" of such chains by allowing pages to either *point to* other pages of the same level, or *be pointed to* by other pages of the same level, but not both. To implement this, we keep track of the number of outstanding times a page points to or is pointed to another page table, to prevent both from happening at the same time. Unfortunately, the original commit introducing this reset this count when resuming validation of a partially-validated pagetable, incorrectly dropping some \"linear_pt_entry\" counts. If an attacker could engineer such a situation to occur, they might be able to make loops or other arbitrary chains of linear pagetables, as described in XSA-240. A malicious or buggy PV guest may cause the hypervisor to crash, resulting in Denial of Service (DoS) affecting the entire host. Privilege escalation and information leaks cannot be excluded. All versions of Xen are vulnerable. Only x86 systems are affected. Arm systems are not affected. Only x86 PV guests can leverage the vulnerability. x86 HVM and PVH guests cannot leverage the vulnerability. Only systems which have enabled linear pagetables are vulnerable. Systems which have disabled linear pagetables, either by selecting CONFIG_PV_LINEAR_PT=n when building the hypervisor, or adding pv-linear-pt=false on the command-line, are not vulnerable.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-doc-html-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_42_3.0.101_108.114-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_42_3.0.101_108.114-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-pae-4.4.4_42_3.0.101_108.114-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-32bit-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_42-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_42-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_42-61.52.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-19578",
"url": "https://www.suse.com/security/cve/CVE-2019-19578"
},
{
"category": "external",
"summary": "SUSE Bug 1158005 for CVE-2019-19578",
"url": "https://bugzilla.suse.com/1158005"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2019-19578",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-doc-html-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_42_3.0.101_108.114-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_42_3.0.101_108.114-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-pae-4.4.4_42_3.0.101_108.114-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-32bit-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_42-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_42-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_42-61.52.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-doc-html-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_42_3.0.101_108.114-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_42_3.0.101_108.114-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-pae-4.4.4_42_3.0.101_108.114-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-32bit-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_42-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_42-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_42-61.52.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-08-04T13:17:01Z",
"details": "important"
}
],
"title": "CVE-2019-19578"
},
{
"cve": "CVE-2019-19579",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-19579"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Xen through 4.12.x allowing attackers to gain host OS privileges via DMA in a situation where an untrusted domain has access to a physical device (and assignable-add is not used), because of an incomplete fix for CVE-2019-18424. XSA-302 relies on the use of libxl\u0027s \"assignable-add\" feature to prepare devices to be assigned to untrusted guests. Unfortunately, this is not considered a strictly required step for device assignment. The PCI passthrough documentation on the wiki describes alternate ways of preparing devices for assignment, and libvirt uses its own ways as well. Hosts where these \"alternate\" methods are used will still leave the system in a vulnerable state after the device comes back from a guest. An untrusted domain with access to a physical device can DMA into host memory, leading to privilege escalation. Only systems where guests are given direct access to physical devices capable of DMA (PCI pass-through) are vulnerable. Systems which do not use PCI pass-through are not vulnerable.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-doc-html-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_42_3.0.101_108.114-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_42_3.0.101_108.114-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-pae-4.4.4_42_3.0.101_108.114-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-32bit-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_42-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_42-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_42-61.52.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-19579",
"url": "https://www.suse.com/security/cve/CVE-2019-19579"
},
{
"category": "external",
"summary": "SUSE Bug 1157888 for CVE-2019-19579",
"url": "https://bugzilla.suse.com/1157888"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-doc-html-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_42_3.0.101_108.114-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_42_3.0.101_108.114-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-pae-4.4.4_42_3.0.101_108.114-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-32bit-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_42-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_42-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_42-61.52.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-doc-html-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_42_3.0.101_108.114-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_42_3.0.101_108.114-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-pae-4.4.4_42_3.0.101_108.114-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-32bit-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_42-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_42-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_42-61.52.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-08-04T13:17:01Z",
"details": "moderate"
}
],
"title": "CVE-2019-19579"
},
{
"cve": "CVE-2019-19580",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-19580"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Xen through 4.12.x allowing x86 PV guest OS users to gain host OS privileges by leveraging race conditions in pagetable promotion and demotion operations, because of an incomplete fix for CVE-2019-18421. XSA-299 addressed several critical issues in restartable PV type change operations. Despite extensive testing and auditing, some corner cases were missed. A malicious PV guest administrator may be able to escalate their privilege to that of the host. All security-supported versions of Xen are vulnerable. Only x86 systems are affected. Arm systems are not affected. Only x86 PV guests can leverage the vulnerability. x86 HVM and PVH guests cannot leverage the vulnerability. Note that these attacks require very precise timing, which may be difficult to exploit in practice.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-doc-html-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_42_3.0.101_108.114-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_42_3.0.101_108.114-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-pae-4.4.4_42_3.0.101_108.114-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-32bit-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_42-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_42-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_42-61.52.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-19580",
"url": "https://www.suse.com/security/cve/CVE-2019-19580"
},
{
"category": "external",
"summary": "SUSE Bug 1158006 for CVE-2019-19580",
"url": "https://bugzilla.suse.com/1158006"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2019-19580",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-doc-html-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_42_3.0.101_108.114-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_42_3.0.101_108.114-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-pae-4.4.4_42_3.0.101_108.114-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-32bit-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_42-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_42-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_42-61.52.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-doc-html-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_42_3.0.101_108.114-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_42_3.0.101_108.114-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-pae-4.4.4_42_3.0.101_108.114-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-32bit-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_42-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_42-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_42-61.52.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-08-04T13:17:01Z",
"details": "moderate"
}
],
"title": "CVE-2019-19580"
},
{
"cve": "CVE-2019-19583",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-19583"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Xen through 4.12.x allowing x86 HVM/PVH guest OS users to cause a denial of service (guest OS crash) because VMX VMEntry checks mishandle a certain case. Please see XSA-260 for background on the MovSS shadow. Please see XSA-156 for background on the need for #DB interception. The VMX VMEntry checks do not like the exact combination of state which occurs when #DB in intercepted, Single Stepping is active, and blocked by STI/MovSS is active, despite this being a legitimate state to be in. The resulting VMEntry failure is fatal to the guest. HVM/PVH guest userspace code may be able to crash the guest, resulting in a guest Denial of Service. All versions of Xen are affected. Only systems supporting VMX hardware virtual extensions (Intel, Cyrix, or Zhaoxin CPUs) are affected. Arm and AMD systems are unaffected. Only HVM/PVH guests are affected. PV guests cannot leverage the vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-doc-html-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_42_3.0.101_108.114-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_42_3.0.101_108.114-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-pae-4.4.4_42_3.0.101_108.114-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-32bit-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_42-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_42-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_42-61.52.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-19583",
"url": "https://www.suse.com/security/cve/CVE-2019-19583"
},
{
"category": "external",
"summary": "SUSE Bug 1158004 for CVE-2019-19583",
"url": "https://bugzilla.suse.com/1158004"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2019-19583",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-doc-html-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_42_3.0.101_108.114-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_42_3.0.101_108.114-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-pae-4.4.4_42_3.0.101_108.114-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-32bit-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_42-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_42-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_42-61.52.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-doc-html-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_42_3.0.101_108.114-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_42_3.0.101_108.114-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-pae-4.4.4_42_3.0.101_108.114-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-32bit-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_42-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_42-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_42-61.52.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-08-04T13:17:01Z",
"details": "important"
}
],
"title": "CVE-2019-19583"
},
{
"cve": "CVE-2020-11740",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-11740"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in xenoprof in Xen through 4.13.x, allowing guest OS users (without active profiling) to obtain sensitive information about other guests. Unprivileged guests can request to map xenoprof buffers, even if profiling has not been enabled for those guests. These buffers were not scrubbed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-doc-html-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_42_3.0.101_108.114-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_42_3.0.101_108.114-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-pae-4.4.4_42_3.0.101_108.114-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-32bit-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_42-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_42-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_42-61.52.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-11740",
"url": "https://www.suse.com/security/cve/CVE-2020-11740"
},
{
"category": "external",
"summary": "SUSE Bug 1168140 for CVE-2020-11740",
"url": "https://bugzilla.suse.com/1168140"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2020-11740",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-doc-html-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_42_3.0.101_108.114-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_42_3.0.101_108.114-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-pae-4.4.4_42_3.0.101_108.114-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-32bit-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_42-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_42-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_42-61.52.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-doc-html-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_42_3.0.101_108.114-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_42_3.0.101_108.114-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-pae-4.4.4_42_3.0.101_108.114-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-32bit-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_42-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_42-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_42-61.52.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-08-04T13:17:01Z",
"details": "important"
}
],
"title": "CVE-2020-11740"
},
{
"cve": "CVE-2020-11741",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-11741"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in xenoprof in Xen through 4.13.x, allowing guest OS users (with active profiling) to obtain sensitive information about other guests, cause a denial of service, or possibly gain privileges. For guests for which \"active\" profiling was enabled by the administrator, the xenoprof code uses the standard Xen shared ring structure. Unfortunately, this code did not treat the guest as a potential adversary: it trusts the guest not to modify buffer size information or modify head / tail pointers in unexpected ways. This can crash the host (DoS). Privilege escalation cannot be ruled out.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-doc-html-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_42_3.0.101_108.114-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_42_3.0.101_108.114-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-pae-4.4.4_42_3.0.101_108.114-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-32bit-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_42-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_42-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_42-61.52.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-11741",
"url": "https://www.suse.com/security/cve/CVE-2020-11741"
},
{
"category": "external",
"summary": "SUSE Bug 1168140 for CVE-2020-11741",
"url": "https://bugzilla.suse.com/1168140"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2020-11741",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-doc-html-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_42_3.0.101_108.114-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_42_3.0.101_108.114-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-pae-4.4.4_42_3.0.101_108.114-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-32bit-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_42-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_42-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_42-61.52.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-doc-html-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_42_3.0.101_108.114-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_42_3.0.101_108.114-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-pae-4.4.4_42_3.0.101_108.114-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-32bit-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_42-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_42-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_42-61.52.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-08-04T13:17:01Z",
"details": "important"
}
],
"title": "CVE-2020-11741"
},
{
"cve": "CVE-2020-11742",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-11742"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Xen through 4.13.x, allowing guest OS users to cause a denial of service because of bad continuation handling in GNTTABOP_copy. Grant table operations are expected to return 0 for success, and a negative number for errors. The fix for CVE-2017-12135 introduced a path through grant copy handling where success may be returned to the caller without any action taken. In particular, the status fields of individual operations are left uninitialised, and may result in errant behaviour in the caller of GNTTABOP_copy. A buggy or malicious guest can construct its grant table in such a way that, when a backend domain tries to copy a grant, it hits the incorrect exit path. This returns success to the caller without doing anything, which may cause crashes or other incorrect behaviour.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-doc-html-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_42_3.0.101_108.114-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_42_3.0.101_108.114-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-pae-4.4.4_42_3.0.101_108.114-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-32bit-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_42-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_42-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_42-61.52.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-11742",
"url": "https://www.suse.com/security/cve/CVE-2020-11742"
},
{
"category": "external",
"summary": "SUSE Bug 1169392 for CVE-2020-11742",
"url": "https://bugzilla.suse.com/1169392"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2020-11742",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-doc-html-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_42_3.0.101_108.114-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_42_3.0.101_108.114-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-pae-4.4.4_42_3.0.101_108.114-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-32bit-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_42-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_42-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_42-61.52.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-doc-html-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_42_3.0.101_108.114-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_42_3.0.101_108.114-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-pae-4.4.4_42_3.0.101_108.114-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-32bit-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_42-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_42-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_42-61.52.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-08-04T13:17:01Z",
"details": "moderate"
}
],
"title": "CVE-2020-11742"
},
{
"cve": "CVE-2020-7211",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-7211"
}
],
"notes": [
{
"category": "general",
"text": "tftp.c in libslirp 4.1.0, as used in QEMU 4.2.0, does not prevent ..\\ directory traversal on Windows.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-doc-html-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_42_3.0.101_108.114-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_42_3.0.101_108.114-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-pae-4.4.4_42_3.0.101_108.114-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-32bit-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_42-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_42-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_42-61.52.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-7211",
"url": "https://www.suse.com/security/cve/CVE-2020-7211"
},
{
"category": "external",
"summary": "SUSE Bug 1161180 for CVE-2020-7211",
"url": "https://bugzilla.suse.com/1161180"
},
{
"category": "external",
"summary": "SUSE Bug 1161181 for CVE-2020-7211",
"url": "https://bugzilla.suse.com/1161181"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2020-7211",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-doc-html-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_42_3.0.101_108.114-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_42_3.0.101_108.114-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-pae-4.4.4_42_3.0.101_108.114-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-32bit-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_42-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_42-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_42-61.52.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-doc-html-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_42_3.0.101_108.114-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_42_3.0.101_108.114-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-pae-4.4.4_42_3.0.101_108.114-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-32bit-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_42-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_42-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_42-61.52.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-08-04T13:17:01Z",
"details": "moderate"
}
],
"title": "CVE-2020-7211"
},
{
"cve": "CVE-2020-8608",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-8608"
}
],
"notes": [
{
"category": "general",
"text": "In libslirp 4.1.0, as used in QEMU 4.2.0, tcp_subr.c misuses snprintf return values, leading to a buffer overflow in later code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-doc-html-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_42_3.0.101_108.114-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_42_3.0.101_108.114-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-pae-4.4.4_42_3.0.101_108.114-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-32bit-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_42-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_42-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_42-61.52.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-8608",
"url": "https://www.suse.com/security/cve/CVE-2020-8608"
},
{
"category": "external",
"summary": "SUSE Bug 1163018 for CVE-2020-8608",
"url": "https://bugzilla.suse.com/1163018"
},
{
"category": "external",
"summary": "SUSE Bug 1163019 for CVE-2020-8608",
"url": "https://bugzilla.suse.com/1163019"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-doc-html-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_42_3.0.101_108.114-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_42_3.0.101_108.114-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-pae-4.4.4_42_3.0.101_108.114-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-32bit-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_42-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_42-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_42-61.52.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-doc-html-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_42_3.0.101_108.114-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-default-4.4.4_42_3.0.101_108.114-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-kmp-pae-4.4.4_42_3.0.101_108.114-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-32bit-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_42-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-libs-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-4.4.4_42-61.52.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_42-61.52.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:xen-tools-domU-4.4.4_42-61.52.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-08-04T13:17:01Z",
"details": "moderate"
}
],
"title": "CVE-2020-8608"
}
]
}
suse-su-2019:2955-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for qemu",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for qemu fixes the following issues:\n\nqemu was updated to v3.1.1.1, a stable, bug-fix-only release, which\nincludes 2 fixes we already carry, as well as one additional use-\nafter-free fix in slirp. (CVE-2018-20126 bsc#1119991,\nCVE-2019-14378 bsc#1143794, and CVE-2019-15890 bsc#1149811\nrespectively)\n\nSecurity issues fixed:\n\n- CVE-2019-12068: Fixed potential DOS in lsi scsi controller emulation (bsc#1146873)\n- CVE-2019-11135: Expose taa-no \u0027feature\u0027, indicating CPU does not have the TSX Async Abort vulnerability. (bsc#1152506)\n- CVE-2018-12207: Expose pschange-mc-no \u0027feature\u0027, indicating CPU does not have the page size change machine check vulnerability (bsc#1117665)\n\nOther issues fixed:\n\n- Change how this bug gets fixed (bsc#1144087)\n- Disable file locking in the Xen PV disk backend to avoid locking\n issues with PV domUs during migration. The issues triggered by\n the locking can not be properly handled in libxl. The locking\n introduced in qemu-2.10 was removed again in qemu-4.0.\n (bsc#1079730, bsc#1098403, bsc#1111025, bsc#1145427, bsc#1145774)\n- Feature support for vfio-ccw dasd ipl (bsc#1145379 jira-SLE-6132)\n- Additional hardware instruction support for s390, also update\n qemu linux headers to 5.2-rc1 (bsc#1145436 jira-SLE-6237)\n\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2019-2955,SUSE-SLE-Module-Basesystem-15-SP1-2019-2955,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-2955,SUSE-SLE-Module-Server-Applications-15-SP1-2019-2955",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_2955-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2019:2955-1",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192955-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2019:2955-1",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192955-1.html"
},
{
"category": "self",
"summary": "SUSE Bug 1079730",
"url": "https://bugzilla.suse.com/1079730"
},
{
"category": "self",
"summary": "SUSE Bug 1098403",
"url": "https://bugzilla.suse.com/1098403"
},
{
"category": "self",
"summary": "SUSE Bug 1111025",
"url": "https://bugzilla.suse.com/1111025"
},
{
"category": "self",
"summary": "SUSE Bug 1117665",
"url": "https://bugzilla.suse.com/1117665"
},
{
"category": "self",
"summary": "SUSE Bug 1119991",
"url": "https://bugzilla.suse.com/1119991"
},
{
"category": "self",
"summary": "SUSE Bug 1143794",
"url": "https://bugzilla.suse.com/1143794"
},
{
"category": "self",
"summary": "SUSE Bug 1144087",
"url": "https://bugzilla.suse.com/1144087"
},
{
"category": "self",
"summary": "SUSE Bug 1145379",
"url": "https://bugzilla.suse.com/1145379"
},
{
"category": "self",
"summary": "SUSE Bug 1145427",
"url": "https://bugzilla.suse.com/1145427"
},
{
"category": "self",
"summary": "SUSE Bug 1145436",
"url": "https://bugzilla.suse.com/1145436"
},
{
"category": "self",
"summary": "SUSE Bug 1145774",
"url": "https://bugzilla.suse.com/1145774"
},
{
"category": "self",
"summary": "SUSE Bug 1146873",
"url": "https://bugzilla.suse.com/1146873"
},
{
"category": "self",
"summary": "SUSE Bug 1149811",
"url": "https://bugzilla.suse.com/1149811"
},
{
"category": "self",
"summary": "SUSE Bug 1152506",
"url": "https://bugzilla.suse.com/1152506"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-12207 page",
"url": "https://www.suse.com/security/cve/CVE-2018-12207/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-20126 page",
"url": "https://www.suse.com/security/cve/CVE-2018-20126/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11135 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11135/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-12068 page",
"url": "https://www.suse.com/security/cve/CVE-2019-12068/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-14378 page",
"url": "https://www.suse.com/security/cve/CVE-2019-14378/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15890 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15890/"
},
{
"category": "self",
"summary": "SUSE Bug SLE-6132",
"url": "https://bugzilla.suse.com/SLE-6132"
},
{
"category": "self",
"summary": "SUSE Bug SLE-6237",
"url": "https://bugzilla.suse.com/SLE-6237"
}
],
"title": "Security update for qemu",
"tracking": {
"current_release_date": "2019-11-12T18:14:55Z",
"generator": {
"date": "2019-11-12T18:14:55Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2019:2955-1",
"initial_release_date": "2019-11-12T18:14:55Z",
"revision_history": [
{
"date": "2019-11-12T18:14:55Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "qemu-3.1.1.1-9.6.2.aarch64",
"product": {
"name": "qemu-3.1.1.1-9.6.2.aarch64",
"product_id": "qemu-3.1.1.1-9.6.2.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-arm-3.1.1.1-9.6.2.aarch64",
"product": {
"name": "qemu-arm-3.1.1.1-9.6.2.aarch64",
"product_id": "qemu-arm-3.1.1.1-9.6.2.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-audio-alsa-3.1.1.1-9.6.2.aarch64",
"product": {
"name": "qemu-audio-alsa-3.1.1.1-9.6.2.aarch64",
"product_id": "qemu-audio-alsa-3.1.1.1-9.6.2.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-audio-oss-3.1.1.1-9.6.2.aarch64",
"product": {
"name": "qemu-audio-oss-3.1.1.1-9.6.2.aarch64",
"product_id": "qemu-audio-oss-3.1.1.1-9.6.2.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-audio-pa-3.1.1.1-9.6.2.aarch64",
"product": {
"name": "qemu-audio-pa-3.1.1.1-9.6.2.aarch64",
"product_id": "qemu-audio-pa-3.1.1.1-9.6.2.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-block-curl-3.1.1.1-9.6.2.aarch64",
"product": {
"name": "qemu-block-curl-3.1.1.1-9.6.2.aarch64",
"product_id": "qemu-block-curl-3.1.1.1-9.6.2.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-block-dmg-3.1.1.1-9.6.2.aarch64",
"product": {
"name": "qemu-block-dmg-3.1.1.1-9.6.2.aarch64",
"product_id": "qemu-block-dmg-3.1.1.1-9.6.2.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-block-iscsi-3.1.1.1-9.6.2.aarch64",
"product": {
"name": "qemu-block-iscsi-3.1.1.1-9.6.2.aarch64",
"product_id": "qemu-block-iscsi-3.1.1.1-9.6.2.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-block-rbd-3.1.1.1-9.6.2.aarch64",
"product": {
"name": "qemu-block-rbd-3.1.1.1-9.6.2.aarch64",
"product_id": "qemu-block-rbd-3.1.1.1-9.6.2.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-block-ssh-3.1.1.1-9.6.2.aarch64",
"product": {
"name": "qemu-block-ssh-3.1.1.1-9.6.2.aarch64",
"product_id": "qemu-block-ssh-3.1.1.1-9.6.2.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-extra-3.1.1.1-9.6.2.aarch64",
"product": {
"name": "qemu-extra-3.1.1.1-9.6.2.aarch64",
"product_id": "qemu-extra-3.1.1.1-9.6.2.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-guest-agent-3.1.1.1-9.6.2.aarch64",
"product": {
"name": "qemu-guest-agent-3.1.1.1-9.6.2.aarch64",
"product_id": "qemu-guest-agent-3.1.1.1-9.6.2.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-lang-3.1.1.1-9.6.2.aarch64",
"product": {
"name": "qemu-lang-3.1.1.1-9.6.2.aarch64",
"product_id": "qemu-lang-3.1.1.1-9.6.2.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-linux-user-3.1.1.1-9.6.2.aarch64",
"product": {
"name": "qemu-linux-user-3.1.1.1-9.6.2.aarch64",
"product_id": "qemu-linux-user-3.1.1.1-9.6.2.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-ppc-3.1.1.1-9.6.2.aarch64",
"product": {
"name": "qemu-ppc-3.1.1.1-9.6.2.aarch64",
"product_id": "qemu-ppc-3.1.1.1-9.6.2.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-s390-3.1.1.1-9.6.2.aarch64",
"product": {
"name": "qemu-s390-3.1.1.1-9.6.2.aarch64",
"product_id": "qemu-s390-3.1.1.1-9.6.2.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-tools-3.1.1.1-9.6.2.aarch64",
"product": {
"name": "qemu-tools-3.1.1.1-9.6.2.aarch64",
"product_id": "qemu-tools-3.1.1.1-9.6.2.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-ui-curses-3.1.1.1-9.6.2.aarch64",
"product": {
"name": "qemu-ui-curses-3.1.1.1-9.6.2.aarch64",
"product_id": "qemu-ui-curses-3.1.1.1-9.6.2.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-ui-gtk-3.1.1.1-9.6.2.aarch64",
"product": {
"name": "qemu-ui-gtk-3.1.1.1-9.6.2.aarch64",
"product_id": "qemu-ui-gtk-3.1.1.1-9.6.2.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-x86-3.1.1.1-9.6.2.aarch64",
"product": {
"name": "qemu-x86-3.1.1.1-9.6.2.aarch64",
"product_id": "qemu-x86-3.1.1.1-9.6.2.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-3.1.1.1-9.6.2.i586",
"product": {
"name": "qemu-3.1.1.1-9.6.2.i586",
"product_id": "qemu-3.1.1.1-9.6.2.i586"
}
},
{
"category": "product_version",
"name": "qemu-arm-3.1.1.1-9.6.2.i586",
"product": {
"name": "qemu-arm-3.1.1.1-9.6.2.i586",
"product_id": "qemu-arm-3.1.1.1-9.6.2.i586"
}
},
{
"category": "product_version",
"name": "qemu-audio-alsa-3.1.1.1-9.6.2.i586",
"product": {
"name": "qemu-audio-alsa-3.1.1.1-9.6.2.i586",
"product_id": "qemu-audio-alsa-3.1.1.1-9.6.2.i586"
}
},
{
"category": "product_version",
"name": "qemu-audio-oss-3.1.1.1-9.6.2.i586",
"product": {
"name": "qemu-audio-oss-3.1.1.1-9.6.2.i586",
"product_id": "qemu-audio-oss-3.1.1.1-9.6.2.i586"
}
},
{
"category": "product_version",
"name": "qemu-audio-pa-3.1.1.1-9.6.2.i586",
"product": {
"name": "qemu-audio-pa-3.1.1.1-9.6.2.i586",
"product_id": "qemu-audio-pa-3.1.1.1-9.6.2.i586"
}
},
{
"category": "product_version",
"name": "qemu-block-curl-3.1.1.1-9.6.2.i586",
"product": {
"name": "qemu-block-curl-3.1.1.1-9.6.2.i586",
"product_id": "qemu-block-curl-3.1.1.1-9.6.2.i586"
}
},
{
"category": "product_version",
"name": "qemu-block-dmg-3.1.1.1-9.6.2.i586",
"product": {
"name": "qemu-block-dmg-3.1.1.1-9.6.2.i586",
"product_id": "qemu-block-dmg-3.1.1.1-9.6.2.i586"
}
},
{
"category": "product_version",
"name": "qemu-block-iscsi-3.1.1.1-9.6.2.i586",
"product": {
"name": "qemu-block-iscsi-3.1.1.1-9.6.2.i586",
"product_id": "qemu-block-iscsi-3.1.1.1-9.6.2.i586"
}
},
{
"category": "product_version",
"name": "qemu-block-ssh-3.1.1.1-9.6.2.i586",
"product": {
"name": "qemu-block-ssh-3.1.1.1-9.6.2.i586",
"product_id": "qemu-block-ssh-3.1.1.1-9.6.2.i586"
}
},
{
"category": "product_version",
"name": "qemu-extra-3.1.1.1-9.6.2.i586",
"product": {
"name": "qemu-extra-3.1.1.1-9.6.2.i586",
"product_id": "qemu-extra-3.1.1.1-9.6.2.i586"
}
},
{
"category": "product_version",
"name": "qemu-guest-agent-3.1.1.1-9.6.2.i586",
"product": {
"name": "qemu-guest-agent-3.1.1.1-9.6.2.i586",
"product_id": "qemu-guest-agent-3.1.1.1-9.6.2.i586"
}
},
{
"category": "product_version",
"name": "qemu-kvm-3.1.1.1-9.6.2.i586",
"product": {
"name": "qemu-kvm-3.1.1.1-9.6.2.i586",
"product_id": "qemu-kvm-3.1.1.1-9.6.2.i586"
}
},
{
"category": "product_version",
"name": "qemu-lang-3.1.1.1-9.6.2.i586",
"product": {
"name": "qemu-lang-3.1.1.1-9.6.2.i586",
"product_id": "qemu-lang-3.1.1.1-9.6.2.i586"
}
},
{
"category": "product_version",
"name": "qemu-linux-user-3.1.1.1-9.6.2.i586",
"product": {
"name": "qemu-linux-user-3.1.1.1-9.6.2.i586",
"product_id": "qemu-linux-user-3.1.1.1-9.6.2.i586"
}
},
{
"category": "product_version",
"name": "qemu-ppc-3.1.1.1-9.6.2.i586",
"product": {
"name": "qemu-ppc-3.1.1.1-9.6.2.i586",
"product_id": "qemu-ppc-3.1.1.1-9.6.2.i586"
}
},
{
"category": "product_version",
"name": "qemu-s390-3.1.1.1-9.6.2.i586",
"product": {
"name": "qemu-s390-3.1.1.1-9.6.2.i586",
"product_id": "qemu-s390-3.1.1.1-9.6.2.i586"
}
},
{
"category": "product_version",
"name": "qemu-tools-3.1.1.1-9.6.2.i586",
"product": {
"name": "qemu-tools-3.1.1.1-9.6.2.i586",
"product_id": "qemu-tools-3.1.1.1-9.6.2.i586"
}
},
{
"category": "product_version",
"name": "qemu-ui-curses-3.1.1.1-9.6.2.i586",
"product": {
"name": "qemu-ui-curses-3.1.1.1-9.6.2.i586",
"product_id": "qemu-ui-curses-3.1.1.1-9.6.2.i586"
}
},
{
"category": "product_version",
"name": "qemu-ui-gtk-3.1.1.1-9.6.2.i586",
"product": {
"name": "qemu-ui-gtk-3.1.1.1-9.6.2.i586",
"product_id": "qemu-ui-gtk-3.1.1.1-9.6.2.i586"
}
},
{
"category": "product_version",
"name": "qemu-x86-3.1.1.1-9.6.2.i586",
"product": {
"name": "qemu-x86-3.1.1.1-9.6.2.i586",
"product_id": "qemu-x86-3.1.1.1-9.6.2.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-ipxe-1.0.0+-9.6.2.noarch",
"product": {
"name": "qemu-ipxe-1.0.0+-9.6.2.noarch",
"product_id": "qemu-ipxe-1.0.0+-9.6.2.noarch"
}
},
{
"category": "product_version",
"name": "qemu-seabios-1.12.0-9.6.2.noarch",
"product": {
"name": "qemu-seabios-1.12.0-9.6.2.noarch",
"product_id": "qemu-seabios-1.12.0-9.6.2.noarch"
}
},
{
"category": "product_version",
"name": "qemu-sgabios-8-9.6.2.noarch",
"product": {
"name": "qemu-sgabios-8-9.6.2.noarch",
"product_id": "qemu-sgabios-8-9.6.2.noarch"
}
},
{
"category": "product_version",
"name": "qemu-vgabios-1.12.0-9.6.2.noarch",
"product": {
"name": "qemu-vgabios-1.12.0-9.6.2.noarch",
"product_id": "qemu-vgabios-1.12.0-9.6.2.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-3.1.1.1-9.6.2.ppc64le",
"product": {
"name": "qemu-3.1.1.1-9.6.2.ppc64le",
"product_id": "qemu-3.1.1.1-9.6.2.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-arm-3.1.1.1-9.6.2.ppc64le",
"product": {
"name": "qemu-arm-3.1.1.1-9.6.2.ppc64le",
"product_id": "qemu-arm-3.1.1.1-9.6.2.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-audio-alsa-3.1.1.1-9.6.2.ppc64le",
"product": {
"name": "qemu-audio-alsa-3.1.1.1-9.6.2.ppc64le",
"product_id": "qemu-audio-alsa-3.1.1.1-9.6.2.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-audio-oss-3.1.1.1-9.6.2.ppc64le",
"product": {
"name": "qemu-audio-oss-3.1.1.1-9.6.2.ppc64le",
"product_id": "qemu-audio-oss-3.1.1.1-9.6.2.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-audio-pa-3.1.1.1-9.6.2.ppc64le",
"product": {
"name": "qemu-audio-pa-3.1.1.1-9.6.2.ppc64le",
"product_id": "qemu-audio-pa-3.1.1.1-9.6.2.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-block-curl-3.1.1.1-9.6.2.ppc64le",
"product": {
"name": "qemu-block-curl-3.1.1.1-9.6.2.ppc64le",
"product_id": "qemu-block-curl-3.1.1.1-9.6.2.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-block-dmg-3.1.1.1-9.6.2.ppc64le",
"product": {
"name": "qemu-block-dmg-3.1.1.1-9.6.2.ppc64le",
"product_id": "qemu-block-dmg-3.1.1.1-9.6.2.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-block-iscsi-3.1.1.1-9.6.2.ppc64le",
"product": {
"name": "qemu-block-iscsi-3.1.1.1-9.6.2.ppc64le",
"product_id": "qemu-block-iscsi-3.1.1.1-9.6.2.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-block-rbd-3.1.1.1-9.6.2.ppc64le",
"product": {
"name": "qemu-block-rbd-3.1.1.1-9.6.2.ppc64le",
"product_id": "qemu-block-rbd-3.1.1.1-9.6.2.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-block-ssh-3.1.1.1-9.6.2.ppc64le",
"product": {
"name": "qemu-block-ssh-3.1.1.1-9.6.2.ppc64le",
"product_id": "qemu-block-ssh-3.1.1.1-9.6.2.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-extra-3.1.1.1-9.6.2.ppc64le",
"product": {
"name": "qemu-extra-3.1.1.1-9.6.2.ppc64le",
"product_id": "qemu-extra-3.1.1.1-9.6.2.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-guest-agent-3.1.1.1-9.6.2.ppc64le",
"product": {
"name": "qemu-guest-agent-3.1.1.1-9.6.2.ppc64le",
"product_id": "qemu-guest-agent-3.1.1.1-9.6.2.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-lang-3.1.1.1-9.6.2.ppc64le",
"product": {
"name": "qemu-lang-3.1.1.1-9.6.2.ppc64le",
"product_id": "qemu-lang-3.1.1.1-9.6.2.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-linux-user-3.1.1.1-9.6.2.ppc64le",
"product": {
"name": "qemu-linux-user-3.1.1.1-9.6.2.ppc64le",
"product_id": "qemu-linux-user-3.1.1.1-9.6.2.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-ppc-3.1.1.1-9.6.2.ppc64le",
"product": {
"name": "qemu-ppc-3.1.1.1-9.6.2.ppc64le",
"product_id": "qemu-ppc-3.1.1.1-9.6.2.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-s390-3.1.1.1-9.6.2.ppc64le",
"product": {
"name": "qemu-s390-3.1.1.1-9.6.2.ppc64le",
"product_id": "qemu-s390-3.1.1.1-9.6.2.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-tools-3.1.1.1-9.6.2.ppc64le",
"product": {
"name": "qemu-tools-3.1.1.1-9.6.2.ppc64le",
"product_id": "qemu-tools-3.1.1.1-9.6.2.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-ui-curses-3.1.1.1-9.6.2.ppc64le",
"product": {
"name": "qemu-ui-curses-3.1.1.1-9.6.2.ppc64le",
"product_id": "qemu-ui-curses-3.1.1.1-9.6.2.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-ui-gtk-3.1.1.1-9.6.2.ppc64le",
"product": {
"name": "qemu-ui-gtk-3.1.1.1-9.6.2.ppc64le",
"product_id": "qemu-ui-gtk-3.1.1.1-9.6.2.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-x86-3.1.1.1-9.6.2.ppc64le",
"product": {
"name": "qemu-x86-3.1.1.1-9.6.2.ppc64le",
"product_id": "qemu-x86-3.1.1.1-9.6.2.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-3.1.1.1-9.6.2.s390x",
"product": {
"name": "qemu-3.1.1.1-9.6.2.s390x",
"product_id": "qemu-3.1.1.1-9.6.2.s390x"
}
},
{
"category": "product_version",
"name": "qemu-arm-3.1.1.1-9.6.2.s390x",
"product": {
"name": "qemu-arm-3.1.1.1-9.6.2.s390x",
"product_id": "qemu-arm-3.1.1.1-9.6.2.s390x"
}
},
{
"category": "product_version",
"name": "qemu-audio-alsa-3.1.1.1-9.6.2.s390x",
"product": {
"name": "qemu-audio-alsa-3.1.1.1-9.6.2.s390x",
"product_id": "qemu-audio-alsa-3.1.1.1-9.6.2.s390x"
}
},
{
"category": "product_version",
"name": "qemu-audio-oss-3.1.1.1-9.6.2.s390x",
"product": {
"name": "qemu-audio-oss-3.1.1.1-9.6.2.s390x",
"product_id": "qemu-audio-oss-3.1.1.1-9.6.2.s390x"
}
},
{
"category": "product_version",
"name": "qemu-audio-pa-3.1.1.1-9.6.2.s390x",
"product": {
"name": "qemu-audio-pa-3.1.1.1-9.6.2.s390x",
"product_id": "qemu-audio-pa-3.1.1.1-9.6.2.s390x"
}
},
{
"category": "product_version",
"name": "qemu-block-curl-3.1.1.1-9.6.2.s390x",
"product": {
"name": "qemu-block-curl-3.1.1.1-9.6.2.s390x",
"product_id": "qemu-block-curl-3.1.1.1-9.6.2.s390x"
}
},
{
"category": "product_version",
"name": "qemu-block-dmg-3.1.1.1-9.6.2.s390x",
"product": {
"name": "qemu-block-dmg-3.1.1.1-9.6.2.s390x",
"product_id": "qemu-block-dmg-3.1.1.1-9.6.2.s390x"
}
},
{
"category": "product_version",
"name": "qemu-block-iscsi-3.1.1.1-9.6.2.s390x",
"product": {
"name": "qemu-block-iscsi-3.1.1.1-9.6.2.s390x",
"product_id": "qemu-block-iscsi-3.1.1.1-9.6.2.s390x"
}
},
{
"category": "product_version",
"name": "qemu-block-rbd-3.1.1.1-9.6.2.s390x",
"product": {
"name": "qemu-block-rbd-3.1.1.1-9.6.2.s390x",
"product_id": "qemu-block-rbd-3.1.1.1-9.6.2.s390x"
}
},
{
"category": "product_version",
"name": "qemu-block-ssh-3.1.1.1-9.6.2.s390x",
"product": {
"name": "qemu-block-ssh-3.1.1.1-9.6.2.s390x",
"product_id": "qemu-block-ssh-3.1.1.1-9.6.2.s390x"
}
},
{
"category": "product_version",
"name": "qemu-extra-3.1.1.1-9.6.2.s390x",
"product": {
"name": "qemu-extra-3.1.1.1-9.6.2.s390x",
"product_id": "qemu-extra-3.1.1.1-9.6.2.s390x"
}
},
{
"category": "product_version",
"name": "qemu-guest-agent-3.1.1.1-9.6.2.s390x",
"product": {
"name": "qemu-guest-agent-3.1.1.1-9.6.2.s390x",
"product_id": "qemu-guest-agent-3.1.1.1-9.6.2.s390x"
}
},
{
"category": "product_version",
"name": "qemu-kvm-3.1.1.1-9.6.2.s390x",
"product": {
"name": "qemu-kvm-3.1.1.1-9.6.2.s390x",
"product_id": "qemu-kvm-3.1.1.1-9.6.2.s390x"
}
},
{
"category": "product_version",
"name": "qemu-lang-3.1.1.1-9.6.2.s390x",
"product": {
"name": "qemu-lang-3.1.1.1-9.6.2.s390x",
"product_id": "qemu-lang-3.1.1.1-9.6.2.s390x"
}
},
{
"category": "product_version",
"name": "qemu-linux-user-3.1.1.1-9.6.2.s390x",
"product": {
"name": "qemu-linux-user-3.1.1.1-9.6.2.s390x",
"product_id": "qemu-linux-user-3.1.1.1-9.6.2.s390x"
}
},
{
"category": "product_version",
"name": "qemu-ppc-3.1.1.1-9.6.2.s390x",
"product": {
"name": "qemu-ppc-3.1.1.1-9.6.2.s390x",
"product_id": "qemu-ppc-3.1.1.1-9.6.2.s390x"
}
},
{
"category": "product_version",
"name": "qemu-s390-3.1.1.1-9.6.2.s390x",
"product": {
"name": "qemu-s390-3.1.1.1-9.6.2.s390x",
"product_id": "qemu-s390-3.1.1.1-9.6.2.s390x"
}
},
{
"category": "product_version",
"name": "qemu-tools-3.1.1.1-9.6.2.s390x",
"product": {
"name": "qemu-tools-3.1.1.1-9.6.2.s390x",
"product_id": "qemu-tools-3.1.1.1-9.6.2.s390x"
}
},
{
"category": "product_version",
"name": "qemu-ui-curses-3.1.1.1-9.6.2.s390x",
"product": {
"name": "qemu-ui-curses-3.1.1.1-9.6.2.s390x",
"product_id": "qemu-ui-curses-3.1.1.1-9.6.2.s390x"
}
},
{
"category": "product_version",
"name": "qemu-ui-gtk-3.1.1.1-9.6.2.s390x",
"product": {
"name": "qemu-ui-gtk-3.1.1.1-9.6.2.s390x",
"product_id": "qemu-ui-gtk-3.1.1.1-9.6.2.s390x"
}
},
{
"category": "product_version",
"name": "qemu-x86-3.1.1.1-9.6.2.s390x",
"product": {
"name": "qemu-x86-3.1.1.1-9.6.2.s390x",
"product_id": "qemu-x86-3.1.1.1-9.6.2.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-3.1.1.1-9.6.2.x86_64",
"product": {
"name": "qemu-3.1.1.1-9.6.2.x86_64",
"product_id": "qemu-3.1.1.1-9.6.2.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-arm-3.1.1.1-9.6.2.x86_64",
"product": {
"name": "qemu-arm-3.1.1.1-9.6.2.x86_64",
"product_id": "qemu-arm-3.1.1.1-9.6.2.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-audio-alsa-3.1.1.1-9.6.2.x86_64",
"product": {
"name": "qemu-audio-alsa-3.1.1.1-9.6.2.x86_64",
"product_id": "qemu-audio-alsa-3.1.1.1-9.6.2.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-audio-oss-3.1.1.1-9.6.2.x86_64",
"product": {
"name": "qemu-audio-oss-3.1.1.1-9.6.2.x86_64",
"product_id": "qemu-audio-oss-3.1.1.1-9.6.2.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-audio-pa-3.1.1.1-9.6.2.x86_64",
"product": {
"name": "qemu-audio-pa-3.1.1.1-9.6.2.x86_64",
"product_id": "qemu-audio-pa-3.1.1.1-9.6.2.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-block-curl-3.1.1.1-9.6.2.x86_64",
"product": {
"name": "qemu-block-curl-3.1.1.1-9.6.2.x86_64",
"product_id": "qemu-block-curl-3.1.1.1-9.6.2.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-block-dmg-3.1.1.1-9.6.2.x86_64",
"product": {
"name": "qemu-block-dmg-3.1.1.1-9.6.2.x86_64",
"product_id": "qemu-block-dmg-3.1.1.1-9.6.2.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-block-iscsi-3.1.1.1-9.6.2.x86_64",
"product": {
"name": "qemu-block-iscsi-3.1.1.1-9.6.2.x86_64",
"product_id": "qemu-block-iscsi-3.1.1.1-9.6.2.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-block-rbd-3.1.1.1-9.6.2.x86_64",
"product": {
"name": "qemu-block-rbd-3.1.1.1-9.6.2.x86_64",
"product_id": "qemu-block-rbd-3.1.1.1-9.6.2.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-block-ssh-3.1.1.1-9.6.2.x86_64",
"product": {
"name": "qemu-block-ssh-3.1.1.1-9.6.2.x86_64",
"product_id": "qemu-block-ssh-3.1.1.1-9.6.2.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-extra-3.1.1.1-9.6.2.x86_64",
"product": {
"name": "qemu-extra-3.1.1.1-9.6.2.x86_64",
"product_id": "qemu-extra-3.1.1.1-9.6.2.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-guest-agent-3.1.1.1-9.6.2.x86_64",
"product": {
"name": "qemu-guest-agent-3.1.1.1-9.6.2.x86_64",
"product_id": "qemu-guest-agent-3.1.1.1-9.6.2.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-kvm-3.1.1.1-9.6.2.x86_64",
"product": {
"name": "qemu-kvm-3.1.1.1-9.6.2.x86_64",
"product_id": "qemu-kvm-3.1.1.1-9.6.2.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-lang-3.1.1.1-9.6.2.x86_64",
"product": {
"name": "qemu-lang-3.1.1.1-9.6.2.x86_64",
"product_id": "qemu-lang-3.1.1.1-9.6.2.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-linux-user-3.1.1.1-9.6.2.x86_64",
"product": {
"name": "qemu-linux-user-3.1.1.1-9.6.2.x86_64",
"product_id": "qemu-linux-user-3.1.1.1-9.6.2.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-ppc-3.1.1.1-9.6.2.x86_64",
"product": {
"name": "qemu-ppc-3.1.1.1-9.6.2.x86_64",
"product_id": "qemu-ppc-3.1.1.1-9.6.2.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-s390-3.1.1.1-9.6.2.x86_64",
"product": {
"name": "qemu-s390-3.1.1.1-9.6.2.x86_64",
"product_id": "qemu-s390-3.1.1.1-9.6.2.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-tools-3.1.1.1-9.6.2.x86_64",
"product": {
"name": "qemu-tools-3.1.1.1-9.6.2.x86_64",
"product_id": "qemu-tools-3.1.1.1-9.6.2.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-ui-curses-3.1.1.1-9.6.2.x86_64",
"product": {
"name": "qemu-ui-curses-3.1.1.1-9.6.2.x86_64",
"product_id": "qemu-ui-curses-3.1.1.1-9.6.2.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-ui-gtk-3.1.1.1-9.6.2.x86_64",
"product": {
"name": "qemu-ui-gtk-3.1.1.1-9.6.2.x86_64",
"product_id": "qemu-ui-gtk-3.1.1.1-9.6.2.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-x86-3.1.1.1-9.6.2.x86_64",
"product": {
"name": "qemu-x86-3.1.1.1-9.6.2.x86_64",
"product_id": "qemu-x86-3.1.1.1-9.6.2.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product": {
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-basesystem:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Server Applications 15 SP1",
"product": {
"name": "SUSE Linux Enterprise Module for Server Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-server-applications:15:sp1"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-3.1.1.1-9.6.2.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:qemu-tools-3.1.1.1-9.6.2.aarch64"
},
"product_reference": "qemu-tools-3.1.1.1-9.6.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-3.1.1.1-9.6.2.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:qemu-tools-3.1.1.1-9.6.2.ppc64le"
},
"product_reference": "qemu-tools-3.1.1.1-9.6.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-3.1.1.1-9.6.2.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:qemu-tools-3.1.1.1-9.6.2.s390x"
},
"product_reference": "qemu-tools-3.1.1.1-9.6.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-3.1.1.1-9.6.2.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:qemu-tools-3.1.1.1-9.6.2.x86_64"
},
"product_reference": "qemu-tools-3.1.1.1-9.6.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-3.1.1.1-9.6.2.aarch64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-3.1.1.1-9.6.2.aarch64"
},
"product_reference": "qemu-3.1.1.1-9.6.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-3.1.1.1-9.6.2.ppc64le as component of SUSE Linux Enterprise Module for Server Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-3.1.1.1-9.6.2.ppc64le"
},
"product_reference": "qemu-3.1.1.1-9.6.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-3.1.1.1-9.6.2.s390x as component of SUSE Linux Enterprise Module for Server Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-3.1.1.1-9.6.2.s390x"
},
"product_reference": "qemu-3.1.1.1-9.6.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-3.1.1.1-9.6.2.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-3.1.1.1-9.6.2.x86_64"
},
"product_reference": "qemu-3.1.1.1-9.6.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-arm-3.1.1.1-9.6.2.aarch64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-arm-3.1.1.1-9.6.2.aarch64"
},
"product_reference": "qemu-arm-3.1.1.1-9.6.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-audio-alsa-3.1.1.1-9.6.2.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-audio-alsa-3.1.1.1-9.6.2.x86_64"
},
"product_reference": "qemu-audio-alsa-3.1.1.1-9.6.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-audio-oss-3.1.1.1-9.6.2.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-audio-oss-3.1.1.1-9.6.2.x86_64"
},
"product_reference": "qemu-audio-oss-3.1.1.1-9.6.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-audio-pa-3.1.1.1-9.6.2.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-audio-pa-3.1.1.1-9.6.2.x86_64"
},
"product_reference": "qemu-audio-pa-3.1.1.1-9.6.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-3.1.1.1-9.6.2.aarch64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-curl-3.1.1.1-9.6.2.aarch64"
},
"product_reference": "qemu-block-curl-3.1.1.1-9.6.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-3.1.1.1-9.6.2.ppc64le as component of SUSE Linux Enterprise Module for Server Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-curl-3.1.1.1-9.6.2.ppc64le"
},
"product_reference": "qemu-block-curl-3.1.1.1-9.6.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-3.1.1.1-9.6.2.s390x as component of SUSE Linux Enterprise Module for Server Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-curl-3.1.1.1-9.6.2.s390x"
},
"product_reference": "qemu-block-curl-3.1.1.1-9.6.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-3.1.1.1-9.6.2.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-curl-3.1.1.1-9.6.2.x86_64"
},
"product_reference": "qemu-block-curl-3.1.1.1-9.6.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-iscsi-3.1.1.1-9.6.2.aarch64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-iscsi-3.1.1.1-9.6.2.aarch64"
},
"product_reference": "qemu-block-iscsi-3.1.1.1-9.6.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-iscsi-3.1.1.1-9.6.2.ppc64le as component of SUSE Linux Enterprise Module for Server Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-iscsi-3.1.1.1-9.6.2.ppc64le"
},
"product_reference": "qemu-block-iscsi-3.1.1.1-9.6.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-iscsi-3.1.1.1-9.6.2.s390x as component of SUSE Linux Enterprise Module for Server Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-iscsi-3.1.1.1-9.6.2.s390x"
},
"product_reference": "qemu-block-iscsi-3.1.1.1-9.6.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-iscsi-3.1.1.1-9.6.2.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-iscsi-3.1.1.1-9.6.2.x86_64"
},
"product_reference": "qemu-block-iscsi-3.1.1.1-9.6.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-rbd-3.1.1.1-9.6.2.aarch64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-rbd-3.1.1.1-9.6.2.aarch64"
},
"product_reference": "qemu-block-rbd-3.1.1.1-9.6.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-rbd-3.1.1.1-9.6.2.ppc64le as component of SUSE Linux Enterprise Module for Server Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-rbd-3.1.1.1-9.6.2.ppc64le"
},
"product_reference": "qemu-block-rbd-3.1.1.1-9.6.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-rbd-3.1.1.1-9.6.2.s390x as component of SUSE Linux Enterprise Module for Server Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-rbd-3.1.1.1-9.6.2.s390x"
},
"product_reference": "qemu-block-rbd-3.1.1.1-9.6.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-rbd-3.1.1.1-9.6.2.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-rbd-3.1.1.1-9.6.2.x86_64"
},
"product_reference": "qemu-block-rbd-3.1.1.1-9.6.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-ssh-3.1.1.1-9.6.2.aarch64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-ssh-3.1.1.1-9.6.2.aarch64"
},
"product_reference": "qemu-block-ssh-3.1.1.1-9.6.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-ssh-3.1.1.1-9.6.2.ppc64le as component of SUSE Linux Enterprise Module for Server Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-ssh-3.1.1.1-9.6.2.ppc64le"
},
"product_reference": "qemu-block-ssh-3.1.1.1-9.6.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-ssh-3.1.1.1-9.6.2.s390x as component of SUSE Linux Enterprise Module for Server Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-ssh-3.1.1.1-9.6.2.s390x"
},
"product_reference": "qemu-block-ssh-3.1.1.1-9.6.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-ssh-3.1.1.1-9.6.2.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-ssh-3.1.1.1-9.6.2.x86_64"
},
"product_reference": "qemu-block-ssh-3.1.1.1-9.6.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-3.1.1.1-9.6.2.aarch64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-guest-agent-3.1.1.1-9.6.2.aarch64"
},
"product_reference": "qemu-guest-agent-3.1.1.1-9.6.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-3.1.1.1-9.6.2.ppc64le as component of SUSE Linux Enterprise Module for Server Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-guest-agent-3.1.1.1-9.6.2.ppc64le"
},
"product_reference": "qemu-guest-agent-3.1.1.1-9.6.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-3.1.1.1-9.6.2.s390x as component of SUSE Linux Enterprise Module for Server Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-guest-agent-3.1.1.1-9.6.2.s390x"
},
"product_reference": "qemu-guest-agent-3.1.1.1-9.6.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-3.1.1.1-9.6.2.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-guest-agent-3.1.1.1-9.6.2.x86_64"
},
"product_reference": "qemu-guest-agent-3.1.1.1-9.6.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ipxe-1.0.0+-9.6.2.noarch as component of SUSE Linux Enterprise Module for Server Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-ipxe-1.0.0+-9.6.2.noarch"
},
"product_reference": "qemu-ipxe-1.0.0+-9.6.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-3.1.1.1-9.6.2.s390x as component of SUSE Linux Enterprise Module for Server Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-kvm-3.1.1.1-9.6.2.s390x"
},
"product_reference": "qemu-kvm-3.1.1.1-9.6.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-3.1.1.1-9.6.2.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-kvm-3.1.1.1-9.6.2.x86_64"
},
"product_reference": "qemu-kvm-3.1.1.1-9.6.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-3.1.1.1-9.6.2.aarch64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-lang-3.1.1.1-9.6.2.aarch64"
},
"product_reference": "qemu-lang-3.1.1.1-9.6.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-3.1.1.1-9.6.2.ppc64le as component of SUSE Linux Enterprise Module for Server Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-lang-3.1.1.1-9.6.2.ppc64le"
},
"product_reference": "qemu-lang-3.1.1.1-9.6.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-3.1.1.1-9.6.2.s390x as component of SUSE Linux Enterprise Module for Server Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-lang-3.1.1.1-9.6.2.s390x"
},
"product_reference": "qemu-lang-3.1.1.1-9.6.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-3.1.1.1-9.6.2.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-lang-3.1.1.1-9.6.2.x86_64"
},
"product_reference": "qemu-lang-3.1.1.1-9.6.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ppc-3.1.1.1-9.6.2.ppc64le as component of SUSE Linux Enterprise Module for Server Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-ppc-3.1.1.1-9.6.2.ppc64le"
},
"product_reference": "qemu-ppc-3.1.1.1-9.6.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-s390-3.1.1.1-9.6.2.s390x as component of SUSE Linux Enterprise Module for Server Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-s390-3.1.1.1-9.6.2.s390x"
},
"product_reference": "qemu-s390-3.1.1.1-9.6.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-seabios-1.12.0-9.6.2.noarch as component of SUSE Linux Enterprise Module for Server Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-seabios-1.12.0-9.6.2.noarch"
},
"product_reference": "qemu-seabios-1.12.0-9.6.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-sgabios-8-9.6.2.noarch as component of SUSE Linux Enterprise Module for Server Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-sgabios-8-9.6.2.noarch"
},
"product_reference": "qemu-sgabios-8-9.6.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ui-curses-3.1.1.1-9.6.2.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-ui-curses-3.1.1.1-9.6.2.x86_64"
},
"product_reference": "qemu-ui-curses-3.1.1.1-9.6.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ui-gtk-3.1.1.1-9.6.2.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-ui-gtk-3.1.1.1-9.6.2.x86_64"
},
"product_reference": "qemu-ui-gtk-3.1.1.1-9.6.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-vgabios-1.12.0-9.6.2.noarch as component of SUSE Linux Enterprise Module for Server Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-vgabios-1.12.0-9.6.2.noarch"
},
"product_reference": "qemu-vgabios-1.12.0-9.6.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-x86-3.1.1.1-9.6.2.x86_64 as component of SUSE Linux Enterprise Module for Server Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-x86-3.1.1.1-9.6.2.x86_64"
},
"product_reference": "qemu-x86-3.1.1.1-9.6.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-12207",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-12207"
}
],
"notes": [
{
"category": "general",
"text": "Improper invalidation for page table updates by a virtual guest operating system for multiple Intel(R) Processors may allow an authenticated user to potentially enable denial of service of the host system via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:qemu-tools-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:qemu-tools-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:qemu-tools-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:qemu-tools-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-arm-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-audio-alsa-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-audio-oss-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-audio-pa-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-curl-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-curl-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-curl-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-curl-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-iscsi-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-iscsi-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-iscsi-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-iscsi-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-rbd-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-rbd-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-rbd-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-rbd-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-ssh-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-ssh-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-ssh-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-ssh-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-guest-agent-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-guest-agent-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-guest-agent-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-guest-agent-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-ipxe-1.0.0+-9.6.2.noarch",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-kvm-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-kvm-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-lang-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-lang-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-lang-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-lang-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-ppc-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-s390-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-seabios-1.12.0-9.6.2.noarch",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-sgabios-8-9.6.2.noarch",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-ui-curses-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-ui-gtk-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-vgabios-1.12.0-9.6.2.noarch",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-x86-3.1.1.1-9.6.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-12207",
"url": "https://www.suse.com/security/cve/CVE-2018-12207"
},
{
"category": "external",
"summary": "SUSE Bug 1117665 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1117665"
},
{
"category": "external",
"summary": "SUSE Bug 1139073 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1139073"
},
{
"category": "external",
"summary": "SUSE Bug 1152505 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1152505"
},
{
"category": "external",
"summary": "SUSE Bug 1155812 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1155812"
},
{
"category": "external",
"summary": "SUSE Bug 1155817 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1155817"
},
{
"category": "external",
"summary": "SUSE Bug 1155945 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1155945"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1201877"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:qemu-tools-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:qemu-tools-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:qemu-tools-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:qemu-tools-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-arm-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-audio-alsa-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-audio-oss-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-audio-pa-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-curl-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-curl-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-curl-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-curl-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-iscsi-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-iscsi-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-iscsi-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-iscsi-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-rbd-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-rbd-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-rbd-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-rbd-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-ssh-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-ssh-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-ssh-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-ssh-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-guest-agent-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-guest-agent-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-guest-agent-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-guest-agent-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-ipxe-1.0.0+-9.6.2.noarch",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-kvm-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-kvm-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-lang-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-lang-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-lang-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-lang-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-ppc-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-s390-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-seabios-1.12.0-9.6.2.noarch",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-sgabios-8-9.6.2.noarch",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-ui-curses-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-ui-gtk-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-vgabios-1.12.0-9.6.2.noarch",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-x86-3.1.1.1-9.6.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:qemu-tools-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:qemu-tools-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:qemu-tools-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:qemu-tools-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-arm-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-audio-alsa-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-audio-oss-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-audio-pa-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-curl-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-curl-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-curl-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-curl-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-iscsi-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-iscsi-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-iscsi-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-iscsi-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-rbd-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-rbd-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-rbd-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-rbd-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-ssh-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-ssh-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-ssh-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-ssh-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-guest-agent-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-guest-agent-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-guest-agent-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-guest-agent-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-ipxe-1.0.0+-9.6.2.noarch",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-kvm-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-kvm-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-lang-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-lang-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-lang-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-lang-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-ppc-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-s390-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-seabios-1.12.0-9.6.2.noarch",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-sgabios-8-9.6.2.noarch",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-ui-curses-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-ui-gtk-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-vgabios-1.12.0-9.6.2.noarch",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-x86-3.1.1.1-9.6.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:14:55Z",
"details": "moderate"
}
],
"title": "CVE-2018-12207"
},
{
"cve": "CVE-2018-20126",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-20126"
}
],
"notes": [
{
"category": "general",
"text": "hw/rdma/vmw/pvrdma_cmd.c in QEMU allows create_cq and create_qp memory leaks because errors are mishandled.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:qemu-tools-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:qemu-tools-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:qemu-tools-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:qemu-tools-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-arm-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-audio-alsa-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-audio-oss-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-audio-pa-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-curl-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-curl-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-curl-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-curl-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-iscsi-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-iscsi-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-iscsi-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-iscsi-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-rbd-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-rbd-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-rbd-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-rbd-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-ssh-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-ssh-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-ssh-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-ssh-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-guest-agent-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-guest-agent-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-guest-agent-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-guest-agent-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-ipxe-1.0.0+-9.6.2.noarch",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-kvm-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-kvm-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-lang-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-lang-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-lang-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-lang-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-ppc-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-s390-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-seabios-1.12.0-9.6.2.noarch",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-sgabios-8-9.6.2.noarch",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-ui-curses-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-ui-gtk-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-vgabios-1.12.0-9.6.2.noarch",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-x86-3.1.1.1-9.6.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-20126",
"url": "https://www.suse.com/security/cve/CVE-2018-20126"
},
{
"category": "external",
"summary": "SUSE Bug 1119991 for CVE-2018-20126",
"url": "https://bugzilla.suse.com/1119991"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:qemu-tools-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:qemu-tools-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:qemu-tools-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:qemu-tools-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-arm-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-audio-alsa-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-audio-oss-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-audio-pa-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-curl-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-curl-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-curl-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-curl-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-iscsi-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-iscsi-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-iscsi-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-iscsi-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-rbd-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-rbd-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-rbd-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-rbd-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-ssh-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-ssh-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-ssh-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-ssh-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-guest-agent-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-guest-agent-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-guest-agent-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-guest-agent-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-ipxe-1.0.0+-9.6.2.noarch",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-kvm-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-kvm-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-lang-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-lang-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-lang-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-lang-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-ppc-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-s390-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-seabios-1.12.0-9.6.2.noarch",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-sgabios-8-9.6.2.noarch",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-ui-curses-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-ui-gtk-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-vgabios-1.12.0-9.6.2.noarch",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-x86-3.1.1.1-9.6.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.8,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:qemu-tools-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:qemu-tools-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:qemu-tools-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:qemu-tools-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-arm-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-audio-alsa-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-audio-oss-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-audio-pa-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-curl-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-curl-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-curl-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-curl-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-iscsi-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-iscsi-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-iscsi-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-iscsi-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-rbd-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-rbd-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-rbd-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-rbd-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-ssh-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-ssh-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-ssh-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-ssh-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-guest-agent-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-guest-agent-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-guest-agent-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-guest-agent-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-ipxe-1.0.0+-9.6.2.noarch",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-kvm-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-kvm-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-lang-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-lang-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-lang-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-lang-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-ppc-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-s390-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-seabios-1.12.0-9.6.2.noarch",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-sgabios-8-9.6.2.noarch",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-ui-curses-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-ui-gtk-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-vgabios-1.12.0-9.6.2.noarch",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-x86-3.1.1.1-9.6.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:14:55Z",
"details": "low"
}
],
"title": "CVE-2018-20126"
},
{
"cve": "CVE-2019-11135",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11135"
}
],
"notes": [
{
"category": "general",
"text": "TSX Asynchronous Abort condition on some CPUs utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:qemu-tools-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:qemu-tools-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:qemu-tools-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:qemu-tools-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-arm-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-audio-alsa-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-audio-oss-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-audio-pa-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-curl-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-curl-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-curl-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-curl-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-iscsi-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-iscsi-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-iscsi-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-iscsi-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-rbd-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-rbd-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-rbd-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-rbd-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-ssh-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-ssh-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-ssh-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-ssh-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-guest-agent-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-guest-agent-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-guest-agent-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-guest-agent-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-ipxe-1.0.0+-9.6.2.noarch",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-kvm-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-kvm-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-lang-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-lang-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-lang-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-lang-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-ppc-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-s390-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-seabios-1.12.0-9.6.2.noarch",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-sgabios-8-9.6.2.noarch",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-ui-curses-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-ui-gtk-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-vgabios-1.12.0-9.6.2.noarch",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-x86-3.1.1.1-9.6.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11135",
"url": "https://www.suse.com/security/cve/CVE-2019-11135"
},
{
"category": "external",
"summary": "SUSE Bug 1139073 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1139073"
},
{
"category": "external",
"summary": "SUSE Bug 1152497 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1152497"
},
{
"category": "external",
"summary": "SUSE Bug 1152505 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1152505"
},
{
"category": "external",
"summary": "SUSE Bug 1152506 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1152506"
},
{
"category": "external",
"summary": "SUSE Bug 1160120 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1160120"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1201877"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:qemu-tools-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:qemu-tools-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:qemu-tools-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:qemu-tools-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-arm-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-audio-alsa-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-audio-oss-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-audio-pa-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-curl-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-curl-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-curl-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-curl-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-iscsi-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-iscsi-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-iscsi-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-iscsi-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-rbd-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-rbd-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-rbd-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-rbd-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-ssh-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-ssh-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-ssh-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-ssh-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-guest-agent-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-guest-agent-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-guest-agent-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-guest-agent-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-ipxe-1.0.0+-9.6.2.noarch",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-kvm-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-kvm-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-lang-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-lang-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-lang-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-lang-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-ppc-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-s390-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-seabios-1.12.0-9.6.2.noarch",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-sgabios-8-9.6.2.noarch",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-ui-curses-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-ui-gtk-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-vgabios-1.12.0-9.6.2.noarch",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-x86-3.1.1.1-9.6.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:qemu-tools-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:qemu-tools-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:qemu-tools-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:qemu-tools-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-arm-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-audio-alsa-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-audio-oss-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-audio-pa-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-curl-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-curl-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-curl-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-curl-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-iscsi-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-iscsi-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-iscsi-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-iscsi-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-rbd-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-rbd-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-rbd-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-rbd-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-ssh-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-ssh-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-ssh-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-ssh-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-guest-agent-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-guest-agent-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-guest-agent-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-guest-agent-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-ipxe-1.0.0+-9.6.2.noarch",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-kvm-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-kvm-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-lang-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-lang-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-lang-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-lang-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-ppc-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-s390-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-seabios-1.12.0-9.6.2.noarch",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-sgabios-8-9.6.2.noarch",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-ui-curses-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-ui-gtk-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-vgabios-1.12.0-9.6.2.noarch",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-x86-3.1.1.1-9.6.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:14:55Z",
"details": "moderate"
}
],
"title": "CVE-2019-11135"
},
{
"cve": "CVE-2019-12068",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-12068"
}
],
"notes": [
{
"category": "general",
"text": "In QEMU 1:4.1-1, 1:2.1+dfsg-12+deb8u6, 1:2.8+dfsg-6+deb9u8, 1:3.1+dfsg-8~deb10u1, 1:3.1+dfsg-8+deb10u2, and 1:2.1+dfsg-12+deb8u12 (fixed), when executing script in lsi_execute_script(), the LSI scsi adapter emulator advances \u0027s-\u003edsp\u0027 index to read next opcode. This can lead to an infinite loop if the next opcode is empty. Move the existing loop exit after 10k iterations so that it covers no-op opcodes as well.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:qemu-tools-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:qemu-tools-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:qemu-tools-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:qemu-tools-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-arm-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-audio-alsa-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-audio-oss-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-audio-pa-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-curl-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-curl-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-curl-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-curl-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-iscsi-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-iscsi-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-iscsi-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-iscsi-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-rbd-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-rbd-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-rbd-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-rbd-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-ssh-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-ssh-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-ssh-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-ssh-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-guest-agent-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-guest-agent-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-guest-agent-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-guest-agent-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-ipxe-1.0.0+-9.6.2.noarch",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-kvm-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-kvm-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-lang-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-lang-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-lang-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-lang-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-ppc-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-s390-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-seabios-1.12.0-9.6.2.noarch",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-sgabios-8-9.6.2.noarch",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-ui-curses-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-ui-gtk-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-vgabios-1.12.0-9.6.2.noarch",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-x86-3.1.1.1-9.6.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-12068",
"url": "https://www.suse.com/security/cve/CVE-2019-12068"
},
{
"category": "external",
"summary": "SUSE Bug 1146873 for CVE-2019-12068",
"url": "https://bugzilla.suse.com/1146873"
},
{
"category": "external",
"summary": "SUSE Bug 1146874 for CVE-2019-12068",
"url": "https://bugzilla.suse.com/1146874"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2019-12068",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:qemu-tools-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:qemu-tools-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:qemu-tools-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:qemu-tools-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-arm-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-audio-alsa-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-audio-oss-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-audio-pa-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-curl-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-curl-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-curl-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-curl-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-iscsi-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-iscsi-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-iscsi-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-iscsi-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-rbd-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-rbd-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-rbd-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-rbd-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-ssh-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-ssh-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-ssh-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-ssh-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-guest-agent-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-guest-agent-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-guest-agent-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-guest-agent-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-ipxe-1.0.0+-9.6.2.noarch",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-kvm-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-kvm-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-lang-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-lang-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-lang-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-lang-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-ppc-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-s390-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-seabios-1.12.0-9.6.2.noarch",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-sgabios-8-9.6.2.noarch",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-ui-curses-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-ui-gtk-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-vgabios-1.12.0-9.6.2.noarch",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-x86-3.1.1.1-9.6.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:qemu-tools-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:qemu-tools-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:qemu-tools-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:qemu-tools-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-arm-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-audio-alsa-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-audio-oss-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-audio-pa-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-curl-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-curl-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-curl-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-curl-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-iscsi-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-iscsi-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-iscsi-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-iscsi-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-rbd-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-rbd-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-rbd-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-rbd-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-ssh-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-ssh-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-ssh-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-ssh-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-guest-agent-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-guest-agent-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-guest-agent-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-guest-agent-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-ipxe-1.0.0+-9.6.2.noarch",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-kvm-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-kvm-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-lang-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-lang-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-lang-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-lang-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-ppc-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-s390-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-seabios-1.12.0-9.6.2.noarch",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-sgabios-8-9.6.2.noarch",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-ui-curses-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-ui-gtk-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-vgabios-1.12.0-9.6.2.noarch",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-x86-3.1.1.1-9.6.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:14:55Z",
"details": "moderate"
}
],
"title": "CVE-2019-12068"
},
{
"cve": "CVE-2019-14378",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-14378"
}
],
"notes": [
{
"category": "general",
"text": "ip_reass in ip_input.c in libslirp 4.0.0 has a heap-based buffer overflow via a large packet because it mishandles a case involving the first fragment.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:qemu-tools-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:qemu-tools-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:qemu-tools-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:qemu-tools-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-arm-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-audio-alsa-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-audio-oss-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-audio-pa-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-curl-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-curl-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-curl-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-curl-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-iscsi-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-iscsi-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-iscsi-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-iscsi-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-rbd-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-rbd-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-rbd-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-rbd-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-ssh-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-ssh-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-ssh-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-ssh-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-guest-agent-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-guest-agent-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-guest-agent-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-guest-agent-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-ipxe-1.0.0+-9.6.2.noarch",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-kvm-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-kvm-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-lang-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-lang-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-lang-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-lang-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-ppc-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-s390-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-seabios-1.12.0-9.6.2.noarch",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-sgabios-8-9.6.2.noarch",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-ui-curses-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-ui-gtk-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-vgabios-1.12.0-9.6.2.noarch",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-x86-3.1.1.1-9.6.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-14378",
"url": "https://www.suse.com/security/cve/CVE-2019-14378"
},
{
"category": "external",
"summary": "SUSE Bug 1143794 for CVE-2019-14378",
"url": "https://bugzilla.suse.com/1143794"
},
{
"category": "external",
"summary": "SUSE Bug 1143797 for CVE-2019-14378",
"url": "https://bugzilla.suse.com/1143797"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2019-14378",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:qemu-tools-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:qemu-tools-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:qemu-tools-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:qemu-tools-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-arm-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-audio-alsa-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-audio-oss-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-audio-pa-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-curl-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-curl-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-curl-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-curl-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-iscsi-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-iscsi-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-iscsi-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-iscsi-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-rbd-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-rbd-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-rbd-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-rbd-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-ssh-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-ssh-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-ssh-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-ssh-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-guest-agent-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-guest-agent-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-guest-agent-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-guest-agent-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-ipxe-1.0.0+-9.6.2.noarch",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-kvm-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-kvm-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-lang-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-lang-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-lang-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-lang-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-ppc-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-s390-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-seabios-1.12.0-9.6.2.noarch",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-sgabios-8-9.6.2.noarch",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-ui-curses-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-ui-gtk-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-vgabios-1.12.0-9.6.2.noarch",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-x86-3.1.1.1-9.6.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:qemu-tools-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:qemu-tools-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:qemu-tools-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:qemu-tools-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-arm-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-audio-alsa-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-audio-oss-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-audio-pa-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-curl-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-curl-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-curl-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-curl-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-iscsi-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-iscsi-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-iscsi-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-iscsi-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-rbd-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-rbd-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-rbd-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-rbd-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-ssh-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-ssh-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-ssh-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-ssh-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-guest-agent-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-guest-agent-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-guest-agent-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-guest-agent-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-ipxe-1.0.0+-9.6.2.noarch",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-kvm-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-kvm-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-lang-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-lang-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-lang-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-lang-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-ppc-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-s390-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-seabios-1.12.0-9.6.2.noarch",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-sgabios-8-9.6.2.noarch",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-ui-curses-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-ui-gtk-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-vgabios-1.12.0-9.6.2.noarch",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-x86-3.1.1.1-9.6.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:14:55Z",
"details": "important"
}
],
"title": "CVE-2019-14378"
},
{
"cve": "CVE-2019-15890",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15890"
}
],
"notes": [
{
"category": "general",
"text": "libslirp 4.0.0, as used in QEMU 4.1.0, has a use-after-free in ip_reass in ip_input.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:qemu-tools-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:qemu-tools-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:qemu-tools-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:qemu-tools-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-arm-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-audio-alsa-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-audio-oss-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-audio-pa-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-curl-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-curl-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-curl-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-curl-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-iscsi-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-iscsi-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-iscsi-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-iscsi-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-rbd-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-rbd-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-rbd-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-rbd-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-ssh-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-ssh-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-ssh-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-ssh-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-guest-agent-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-guest-agent-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-guest-agent-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-guest-agent-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-ipxe-1.0.0+-9.6.2.noarch",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-kvm-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-kvm-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-lang-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-lang-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-lang-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-lang-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-ppc-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-s390-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-seabios-1.12.0-9.6.2.noarch",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-sgabios-8-9.6.2.noarch",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-ui-curses-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-ui-gtk-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-vgabios-1.12.0-9.6.2.noarch",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-x86-3.1.1.1-9.6.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15890",
"url": "https://www.suse.com/security/cve/CVE-2019-15890"
},
{
"category": "external",
"summary": "SUSE Bug 1149811 for CVE-2019-15890",
"url": "https://bugzilla.suse.com/1149811"
},
{
"category": "external",
"summary": "SUSE Bug 1149813 for CVE-2019-15890",
"url": "https://bugzilla.suse.com/1149813"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2019-15890",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:qemu-tools-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:qemu-tools-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:qemu-tools-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:qemu-tools-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-arm-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-audio-alsa-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-audio-oss-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-audio-pa-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-curl-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-curl-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-curl-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-curl-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-iscsi-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-iscsi-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-iscsi-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-iscsi-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-rbd-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-rbd-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-rbd-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-rbd-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-ssh-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-ssh-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-ssh-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-ssh-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-guest-agent-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-guest-agent-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-guest-agent-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-guest-agent-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-ipxe-1.0.0+-9.6.2.noarch",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-kvm-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-kvm-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-lang-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-lang-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-lang-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-lang-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-ppc-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-s390-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-seabios-1.12.0-9.6.2.noarch",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-sgabios-8-9.6.2.noarch",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-ui-curses-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-ui-gtk-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-vgabios-1.12.0-9.6.2.noarch",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-x86-3.1.1.1-9.6.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:qemu-tools-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:qemu-tools-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:qemu-tools-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:qemu-tools-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-arm-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-audio-alsa-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-audio-oss-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-audio-pa-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-curl-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-curl-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-curl-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-curl-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-iscsi-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-iscsi-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-iscsi-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-iscsi-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-rbd-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-rbd-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-rbd-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-rbd-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-ssh-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-ssh-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-ssh-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-block-ssh-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-guest-agent-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-guest-agent-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-guest-agent-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-guest-agent-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-ipxe-1.0.0+-9.6.2.noarch",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-kvm-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-kvm-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-lang-3.1.1.1-9.6.2.aarch64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-lang-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-lang-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-lang-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-ppc-3.1.1.1-9.6.2.ppc64le",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-s390-3.1.1.1-9.6.2.s390x",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-seabios-1.12.0-9.6.2.noarch",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-sgabios-8-9.6.2.noarch",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-ui-curses-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-ui-gtk-3.1.1.1-9.6.2.x86_64",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-vgabios-1.12.0-9.6.2.noarch",
"SUSE Linux Enterprise Module for Server Applications 15 SP1:qemu-x86-3.1.1.1-9.6.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-12T18:14:55Z",
"details": "moderate"
}
],
"title": "CVE-2019-15890"
}
]
}
ghsa-mgp4-7j8w-x48q
Vulnerability from github
Improper invalidation for page table updates by a virtual guest operating system for multiple Intel(R) Processors may allow an authenticated user to potentially enable denial of service of the host system via local access.
{
"affected": [],
"aliases": [
"CVE-2018-12207"
],
"database_specific": {
"cwe_ids": [
"CWE-20"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2019-11-14T20:15:00Z",
"severity": "MODERATE"
},
"details": "Improper invalidation for page table updates by a virtual guest operating system for multiple Intel(R) Processors may allow an authenticated user to potentially enable denial of service of the host system via local access.",
"id": "GHSA-mgp4-7j8w-x48q",
"modified": "2022-11-11T12:00:32Z",
"published": "2022-05-24T17:00:52Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12207"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2019:3916"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2019:3936"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2019:3941"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2020:0026"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2020:0028"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2020:0204"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I5WWPW4BSZDDW7VHU427XTVXV7ROOFFW"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IZYATWNUGHRBG6I3TC24YHP5Y3J7I6KH"
},
{
"type": "WEB",
"url": "https://seclists.org/bugtraq/2020/Jan/21"
},
{
"type": "WEB",
"url": "https://security.gentoo.org/glsa/202003-56"
},
{
"type": "WEB",
"url": "https://support.f5.com/csp/article/K17269881?utm_source=f5support\u0026amp;utm_medium=RSS"
},
{
"type": "WEB",
"url": "https://usn.ubuntu.com/4186-2"
},
{
"type": "WEB",
"url": "https://www.debian.org/security/2020/dsa-4602"
},
{
"type": "WEB",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html"
},
{
"type": "WEB",
"url": "https://www.oracle.com/security-alerts/cpujul2020.html"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00042.html"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"type": "CVSS_V3"
}
]
}
opensuse-su-2019:2506-1
Vulnerability from csaf_opensuse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for xen",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for xen fixes the following issues:\n\n- CVE-2018-12207: Untrusted virtual machines on Intel CPUs could exploit a race\n condition in the Instruction Fetch Unit of the Intel CPU to cause a Machine\n Exception during Page Size Change, causing the CPU core to be non-functional.\n (bsc#1155945)\n- CVE-2019-11135: Aborting an asynchronous TSX operation on Intel CPUs with\n Transactional Memory support could be used to facilitate sidechannel\n information leaks out of microarchitectural buffers, similar to the\n previously described \u0027Microarchitectural Data Sampling\u0027 attack. (bsc#1152497).\n- CVE-2019-18425: 32-bit PV guest user mode could elevate its privileges to that \n of the guest kernel. (bsc#1154456).\n- CVE-2019-18421: A malicious PV guest administrator may have been able to\n escalate their privilege to that of the host. (bsc#1154458).\n- CVE-2019-18420: Malicious x86 PV guests may have caused a hypervisor crash, \n resulting in a Denial of Service (Dos). (bsc#1154448)\n\nThis update was imported from the SUSE:SLE-15:Update update project.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-2019-2506",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2019_2506-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2019:2506-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/R6YJ2KCZGK5VBSLWES67ERVZEO724CJC/#R6YJ2KCZGK5VBSLWES67ERVZEO724CJC"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2019:2506-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/R6YJ2KCZGK5VBSLWES67ERVZEO724CJC/#R6YJ2KCZGK5VBSLWES67ERVZEO724CJC"
},
{
"category": "self",
"summary": "SUSE Bug 1152497",
"url": "https://bugzilla.suse.com/1152497"
},
{
"category": "self",
"summary": "SUSE Bug 1154448",
"url": "https://bugzilla.suse.com/1154448"
},
{
"category": "self",
"summary": "SUSE Bug 1154456",
"url": "https://bugzilla.suse.com/1154456"
},
{
"category": "self",
"summary": "SUSE Bug 1154458",
"url": "https://bugzilla.suse.com/1154458"
},
{
"category": "self",
"summary": "SUSE Bug 1154461",
"url": "https://bugzilla.suse.com/1154461"
},
{
"category": "self",
"summary": "SUSE Bug 1155945",
"url": "https://bugzilla.suse.com/1155945"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-12207 page",
"url": "https://www.suse.com/security/cve/CVE-2018-12207/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11135 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11135/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-18420 page",
"url": "https://www.suse.com/security/cve/CVE-2019-18420/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-18421 page",
"url": "https://www.suse.com/security/cve/CVE-2019-18421/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-18424 page",
"url": "https://www.suse.com/security/cve/CVE-2019-18424/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-18425 page",
"url": "https://www.suse.com/security/cve/CVE-2019-18425/"
}
],
"title": "Security update for xen",
"tracking": {
"current_release_date": "2019-11-14T05:54:33Z",
"generator": {
"date": "2019-11-14T05:54:33Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2019:2506-1",
"initial_release_date": "2019-11-14T05:54:33Z",
"revision_history": [
{
"date": "2019-11-14T05:54:33Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "xen-devel-4.10.4_06-lp150.2.25.1.i586",
"product": {
"name": "xen-devel-4.10.4_06-lp150.2.25.1.i586",
"product_id": "xen-devel-4.10.4_06-lp150.2.25.1.i586"
}
},
{
"category": "product_version",
"name": "xen-libs-4.10.4_06-lp150.2.25.1.i586",
"product": {
"name": "xen-libs-4.10.4_06-lp150.2.25.1.i586",
"product_id": "xen-libs-4.10.4_06-lp150.2.25.1.i586"
}
},
{
"category": "product_version",
"name": "xen-tools-domU-4.10.4_06-lp150.2.25.1.i586",
"product": {
"name": "xen-tools-domU-4.10.4_06-lp150.2.25.1.i586",
"product_id": "xen-tools-domU-4.10.4_06-lp150.2.25.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "xen-4.10.4_06-lp150.2.25.1.x86_64",
"product": {
"name": "xen-4.10.4_06-lp150.2.25.1.x86_64",
"product_id": "xen-4.10.4_06-lp150.2.25.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-devel-4.10.4_06-lp150.2.25.1.x86_64",
"product": {
"name": "xen-devel-4.10.4_06-lp150.2.25.1.x86_64",
"product_id": "xen-devel-4.10.4_06-lp150.2.25.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-doc-html-4.10.4_06-lp150.2.25.1.x86_64",
"product": {
"name": "xen-doc-html-4.10.4_06-lp150.2.25.1.x86_64",
"product_id": "xen-doc-html-4.10.4_06-lp150.2.25.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-libs-4.10.4_06-lp150.2.25.1.x86_64",
"product": {
"name": "xen-libs-4.10.4_06-lp150.2.25.1.x86_64",
"product_id": "xen-libs-4.10.4_06-lp150.2.25.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-libs-32bit-4.10.4_06-lp150.2.25.1.x86_64",
"product": {
"name": "xen-libs-32bit-4.10.4_06-lp150.2.25.1.x86_64",
"product_id": "xen-libs-32bit-4.10.4_06-lp150.2.25.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-tools-4.10.4_06-lp150.2.25.1.x86_64",
"product": {
"name": "xen-tools-4.10.4_06-lp150.2.25.1.x86_64",
"product_id": "xen-tools-4.10.4_06-lp150.2.25.1.x86_64"
}
},
{
"category": "product_version",
"name": "xen-tools-domU-4.10.4_06-lp150.2.25.1.x86_64",
"product": {
"name": "xen-tools-domU-4.10.4_06-lp150.2.25.1.x86_64",
"product_id": "xen-tools-domU-4.10.4_06-lp150.2.25.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 15.0",
"product": {
"name": "openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.0"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-4.10.4_06-lp150.2.25.1.x86_64 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:xen-4.10.4_06-lp150.2.25.1.x86_64"
},
"product_reference": "xen-4.10.4_06-lp150.2.25.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-devel-4.10.4_06-lp150.2.25.1.i586 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:xen-devel-4.10.4_06-lp150.2.25.1.i586"
},
"product_reference": "xen-devel-4.10.4_06-lp150.2.25.1.i586",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-devel-4.10.4_06-lp150.2.25.1.x86_64 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:xen-devel-4.10.4_06-lp150.2.25.1.x86_64"
},
"product_reference": "xen-devel-4.10.4_06-lp150.2.25.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-doc-html-4.10.4_06-lp150.2.25.1.x86_64 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:xen-doc-html-4.10.4_06-lp150.2.25.1.x86_64"
},
"product_reference": "xen-doc-html-4.10.4_06-lp150.2.25.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.10.4_06-lp150.2.25.1.i586 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:xen-libs-4.10.4_06-lp150.2.25.1.i586"
},
"product_reference": "xen-libs-4.10.4_06-lp150.2.25.1.i586",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-4.10.4_06-lp150.2.25.1.x86_64 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:xen-libs-4.10.4_06-lp150.2.25.1.x86_64"
},
"product_reference": "xen-libs-4.10.4_06-lp150.2.25.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-libs-32bit-4.10.4_06-lp150.2.25.1.x86_64 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:xen-libs-32bit-4.10.4_06-lp150.2.25.1.x86_64"
},
"product_reference": "xen-libs-32bit-4.10.4_06-lp150.2.25.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-4.10.4_06-lp150.2.25.1.x86_64 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:xen-tools-4.10.4_06-lp150.2.25.1.x86_64"
},
"product_reference": "xen-tools-4.10.4_06-lp150.2.25.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-domU-4.10.4_06-lp150.2.25.1.i586 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:xen-tools-domU-4.10.4_06-lp150.2.25.1.i586"
},
"product_reference": "xen-tools-domU-4.10.4_06-lp150.2.25.1.i586",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xen-tools-domU-4.10.4_06-lp150.2.25.1.x86_64 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:xen-tools-domU-4.10.4_06-lp150.2.25.1.x86_64"
},
"product_reference": "xen-tools-domU-4.10.4_06-lp150.2.25.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-12207",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-12207"
}
],
"notes": [
{
"category": "general",
"text": "Improper invalidation for page table updates by a virtual guest operating system for multiple Intel(R) Processors may allow an authenticated user to potentially enable denial of service of the host system via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:xen-4.10.4_06-lp150.2.25.1.x86_64",
"openSUSE Leap 15.0:xen-devel-4.10.4_06-lp150.2.25.1.i586",
"openSUSE Leap 15.0:xen-devel-4.10.4_06-lp150.2.25.1.x86_64",
"openSUSE Leap 15.0:xen-doc-html-4.10.4_06-lp150.2.25.1.x86_64",
"openSUSE Leap 15.0:xen-libs-32bit-4.10.4_06-lp150.2.25.1.x86_64",
"openSUSE Leap 15.0:xen-libs-4.10.4_06-lp150.2.25.1.i586",
"openSUSE Leap 15.0:xen-libs-4.10.4_06-lp150.2.25.1.x86_64",
"openSUSE Leap 15.0:xen-tools-4.10.4_06-lp150.2.25.1.x86_64",
"openSUSE Leap 15.0:xen-tools-domU-4.10.4_06-lp150.2.25.1.i586",
"openSUSE Leap 15.0:xen-tools-domU-4.10.4_06-lp150.2.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-12207",
"url": "https://www.suse.com/security/cve/CVE-2018-12207"
},
{
"category": "external",
"summary": "SUSE Bug 1117665 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1117665"
},
{
"category": "external",
"summary": "SUSE Bug 1139073 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1139073"
},
{
"category": "external",
"summary": "SUSE Bug 1152505 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1152505"
},
{
"category": "external",
"summary": "SUSE Bug 1155812 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1155812"
},
{
"category": "external",
"summary": "SUSE Bug 1155817 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1155817"
},
{
"category": "external",
"summary": "SUSE Bug 1155945 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1155945"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1201877"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:xen-4.10.4_06-lp150.2.25.1.x86_64",
"openSUSE Leap 15.0:xen-devel-4.10.4_06-lp150.2.25.1.i586",
"openSUSE Leap 15.0:xen-devel-4.10.4_06-lp150.2.25.1.x86_64",
"openSUSE Leap 15.0:xen-doc-html-4.10.4_06-lp150.2.25.1.x86_64",
"openSUSE Leap 15.0:xen-libs-32bit-4.10.4_06-lp150.2.25.1.x86_64",
"openSUSE Leap 15.0:xen-libs-4.10.4_06-lp150.2.25.1.i586",
"openSUSE Leap 15.0:xen-libs-4.10.4_06-lp150.2.25.1.x86_64",
"openSUSE Leap 15.0:xen-tools-4.10.4_06-lp150.2.25.1.x86_64",
"openSUSE Leap 15.0:xen-tools-domU-4.10.4_06-lp150.2.25.1.i586",
"openSUSE Leap 15.0:xen-tools-domU-4.10.4_06-lp150.2.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:xen-4.10.4_06-lp150.2.25.1.x86_64",
"openSUSE Leap 15.0:xen-devel-4.10.4_06-lp150.2.25.1.i586",
"openSUSE Leap 15.0:xen-devel-4.10.4_06-lp150.2.25.1.x86_64",
"openSUSE Leap 15.0:xen-doc-html-4.10.4_06-lp150.2.25.1.x86_64",
"openSUSE Leap 15.0:xen-libs-32bit-4.10.4_06-lp150.2.25.1.x86_64",
"openSUSE Leap 15.0:xen-libs-4.10.4_06-lp150.2.25.1.i586",
"openSUSE Leap 15.0:xen-libs-4.10.4_06-lp150.2.25.1.x86_64",
"openSUSE Leap 15.0:xen-tools-4.10.4_06-lp150.2.25.1.x86_64",
"openSUSE Leap 15.0:xen-tools-domU-4.10.4_06-lp150.2.25.1.i586",
"openSUSE Leap 15.0:xen-tools-domU-4.10.4_06-lp150.2.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-14T05:54:33Z",
"details": "moderate"
}
],
"title": "CVE-2018-12207"
},
{
"cve": "CVE-2019-11135",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11135"
}
],
"notes": [
{
"category": "general",
"text": "TSX Asynchronous Abort condition on some CPUs utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:xen-4.10.4_06-lp150.2.25.1.x86_64",
"openSUSE Leap 15.0:xen-devel-4.10.4_06-lp150.2.25.1.i586",
"openSUSE Leap 15.0:xen-devel-4.10.4_06-lp150.2.25.1.x86_64",
"openSUSE Leap 15.0:xen-doc-html-4.10.4_06-lp150.2.25.1.x86_64",
"openSUSE Leap 15.0:xen-libs-32bit-4.10.4_06-lp150.2.25.1.x86_64",
"openSUSE Leap 15.0:xen-libs-4.10.4_06-lp150.2.25.1.i586",
"openSUSE Leap 15.0:xen-libs-4.10.4_06-lp150.2.25.1.x86_64",
"openSUSE Leap 15.0:xen-tools-4.10.4_06-lp150.2.25.1.x86_64",
"openSUSE Leap 15.0:xen-tools-domU-4.10.4_06-lp150.2.25.1.i586",
"openSUSE Leap 15.0:xen-tools-domU-4.10.4_06-lp150.2.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11135",
"url": "https://www.suse.com/security/cve/CVE-2019-11135"
},
{
"category": "external",
"summary": "SUSE Bug 1139073 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1139073"
},
{
"category": "external",
"summary": "SUSE Bug 1152497 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1152497"
},
{
"category": "external",
"summary": "SUSE Bug 1152505 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1152505"
},
{
"category": "external",
"summary": "SUSE Bug 1152506 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1152506"
},
{
"category": "external",
"summary": "SUSE Bug 1160120 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1160120"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1201877"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:xen-4.10.4_06-lp150.2.25.1.x86_64",
"openSUSE Leap 15.0:xen-devel-4.10.4_06-lp150.2.25.1.i586",
"openSUSE Leap 15.0:xen-devel-4.10.4_06-lp150.2.25.1.x86_64",
"openSUSE Leap 15.0:xen-doc-html-4.10.4_06-lp150.2.25.1.x86_64",
"openSUSE Leap 15.0:xen-libs-32bit-4.10.4_06-lp150.2.25.1.x86_64",
"openSUSE Leap 15.0:xen-libs-4.10.4_06-lp150.2.25.1.i586",
"openSUSE Leap 15.0:xen-libs-4.10.4_06-lp150.2.25.1.x86_64",
"openSUSE Leap 15.0:xen-tools-4.10.4_06-lp150.2.25.1.x86_64",
"openSUSE Leap 15.0:xen-tools-domU-4.10.4_06-lp150.2.25.1.i586",
"openSUSE Leap 15.0:xen-tools-domU-4.10.4_06-lp150.2.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:xen-4.10.4_06-lp150.2.25.1.x86_64",
"openSUSE Leap 15.0:xen-devel-4.10.4_06-lp150.2.25.1.i586",
"openSUSE Leap 15.0:xen-devel-4.10.4_06-lp150.2.25.1.x86_64",
"openSUSE Leap 15.0:xen-doc-html-4.10.4_06-lp150.2.25.1.x86_64",
"openSUSE Leap 15.0:xen-libs-32bit-4.10.4_06-lp150.2.25.1.x86_64",
"openSUSE Leap 15.0:xen-libs-4.10.4_06-lp150.2.25.1.i586",
"openSUSE Leap 15.0:xen-libs-4.10.4_06-lp150.2.25.1.x86_64",
"openSUSE Leap 15.0:xen-tools-4.10.4_06-lp150.2.25.1.x86_64",
"openSUSE Leap 15.0:xen-tools-domU-4.10.4_06-lp150.2.25.1.i586",
"openSUSE Leap 15.0:xen-tools-domU-4.10.4_06-lp150.2.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-14T05:54:33Z",
"details": "moderate"
}
],
"title": "CVE-2019-11135"
},
{
"cve": "CVE-2019-18420",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-18420"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Xen through 4.12.x allowing x86 PV guest OS users to cause a denial of service via a VCPUOP_initialise hypercall. hypercall_create_continuation() is a variadic function which uses a printf-like format string to interpret its parameters. Error handling for a bad format character was done using BUG(), which crashes Xen. One path, via the VCPUOP_initialise hypercall, has a bad format character. The BUG() can be hit if VCPUOP_initialise executes for a sufficiently long period of time for a continuation to be created. Malicious guests may cause a hypervisor crash, resulting in a Denial of Service (DoS). Xen versions 4.6 and newer are vulnerable. Xen versions 4.5 and earlier are not vulnerable. Only x86 PV guests can exploit the vulnerability. HVM and PVH guests, and guests on ARM systems, cannot exploit the vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:xen-4.10.4_06-lp150.2.25.1.x86_64",
"openSUSE Leap 15.0:xen-devel-4.10.4_06-lp150.2.25.1.i586",
"openSUSE Leap 15.0:xen-devel-4.10.4_06-lp150.2.25.1.x86_64",
"openSUSE Leap 15.0:xen-doc-html-4.10.4_06-lp150.2.25.1.x86_64",
"openSUSE Leap 15.0:xen-libs-32bit-4.10.4_06-lp150.2.25.1.x86_64",
"openSUSE Leap 15.0:xen-libs-4.10.4_06-lp150.2.25.1.i586",
"openSUSE Leap 15.0:xen-libs-4.10.4_06-lp150.2.25.1.x86_64",
"openSUSE Leap 15.0:xen-tools-4.10.4_06-lp150.2.25.1.x86_64",
"openSUSE Leap 15.0:xen-tools-domU-4.10.4_06-lp150.2.25.1.i586",
"openSUSE Leap 15.0:xen-tools-domU-4.10.4_06-lp150.2.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-18420",
"url": "https://www.suse.com/security/cve/CVE-2019-18420"
},
{
"category": "external",
"summary": "SUSE Bug 1154448 for CVE-2019-18420",
"url": "https://bugzilla.suse.com/1154448"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:xen-4.10.4_06-lp150.2.25.1.x86_64",
"openSUSE Leap 15.0:xen-devel-4.10.4_06-lp150.2.25.1.i586",
"openSUSE Leap 15.0:xen-devel-4.10.4_06-lp150.2.25.1.x86_64",
"openSUSE Leap 15.0:xen-doc-html-4.10.4_06-lp150.2.25.1.x86_64",
"openSUSE Leap 15.0:xen-libs-32bit-4.10.4_06-lp150.2.25.1.x86_64",
"openSUSE Leap 15.0:xen-libs-4.10.4_06-lp150.2.25.1.i586",
"openSUSE Leap 15.0:xen-libs-4.10.4_06-lp150.2.25.1.x86_64",
"openSUSE Leap 15.0:xen-tools-4.10.4_06-lp150.2.25.1.x86_64",
"openSUSE Leap 15.0:xen-tools-domU-4.10.4_06-lp150.2.25.1.i586",
"openSUSE Leap 15.0:xen-tools-domU-4.10.4_06-lp150.2.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:xen-4.10.4_06-lp150.2.25.1.x86_64",
"openSUSE Leap 15.0:xen-devel-4.10.4_06-lp150.2.25.1.i586",
"openSUSE Leap 15.0:xen-devel-4.10.4_06-lp150.2.25.1.x86_64",
"openSUSE Leap 15.0:xen-doc-html-4.10.4_06-lp150.2.25.1.x86_64",
"openSUSE Leap 15.0:xen-libs-32bit-4.10.4_06-lp150.2.25.1.x86_64",
"openSUSE Leap 15.0:xen-libs-4.10.4_06-lp150.2.25.1.i586",
"openSUSE Leap 15.0:xen-libs-4.10.4_06-lp150.2.25.1.x86_64",
"openSUSE Leap 15.0:xen-tools-4.10.4_06-lp150.2.25.1.x86_64",
"openSUSE Leap 15.0:xen-tools-domU-4.10.4_06-lp150.2.25.1.i586",
"openSUSE Leap 15.0:xen-tools-domU-4.10.4_06-lp150.2.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-14T05:54:33Z",
"details": "important"
}
],
"title": "CVE-2019-18420"
},
{
"cve": "CVE-2019-18421",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-18421"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Xen through 4.12.x allowing x86 PV guest OS users to gain host OS privileges by leveraging race conditions in pagetable promotion and demotion operations. There are issues with restartable PV type change operations. To avoid using shadow pagetables for PV guests, Xen exposes the actual hardware pagetables to the guest. In order to prevent the guest from modifying these page tables directly, Xen keeps track of how pages are used using a type system; pages must be \"promoted\" before being used as a pagetable, and \"demoted\" before being used for any other type. Xen also allows for \"recursive\" promotions: i.e., an operating system promoting a page to an L4 pagetable may end up causing pages to be promoted to L3s, which may in turn cause pages to be promoted to L2s, and so on. These operations may take an arbitrarily large amount of time, and so must be re-startable. Unfortunately, making recursive pagetable promotion and demotion operations restartable is incredibly complicated, and the code contains several races which, if triggered, can cause Xen to drop or retain extra type counts, potentially allowing guests to get write access to in-use pagetables. A malicious PV guest administrator may be able to escalate their privilege to that of the host. All x86 systems with untrusted PV guests are vulnerable. HVM and PVH guests cannot exercise this vulnerability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:xen-4.10.4_06-lp150.2.25.1.x86_64",
"openSUSE Leap 15.0:xen-devel-4.10.4_06-lp150.2.25.1.i586",
"openSUSE Leap 15.0:xen-devel-4.10.4_06-lp150.2.25.1.x86_64",
"openSUSE Leap 15.0:xen-doc-html-4.10.4_06-lp150.2.25.1.x86_64",
"openSUSE Leap 15.0:xen-libs-32bit-4.10.4_06-lp150.2.25.1.x86_64",
"openSUSE Leap 15.0:xen-libs-4.10.4_06-lp150.2.25.1.i586",
"openSUSE Leap 15.0:xen-libs-4.10.4_06-lp150.2.25.1.x86_64",
"openSUSE Leap 15.0:xen-tools-4.10.4_06-lp150.2.25.1.x86_64",
"openSUSE Leap 15.0:xen-tools-domU-4.10.4_06-lp150.2.25.1.i586",
"openSUSE Leap 15.0:xen-tools-domU-4.10.4_06-lp150.2.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-18421",
"url": "https://www.suse.com/security/cve/CVE-2019-18421"
},
{
"category": "external",
"summary": "SUSE Bug 1154458 for CVE-2019-18421",
"url": "https://bugzilla.suse.com/1154458"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2019-18421",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:xen-4.10.4_06-lp150.2.25.1.x86_64",
"openSUSE Leap 15.0:xen-devel-4.10.4_06-lp150.2.25.1.i586",
"openSUSE Leap 15.0:xen-devel-4.10.4_06-lp150.2.25.1.x86_64",
"openSUSE Leap 15.0:xen-doc-html-4.10.4_06-lp150.2.25.1.x86_64",
"openSUSE Leap 15.0:xen-libs-32bit-4.10.4_06-lp150.2.25.1.x86_64",
"openSUSE Leap 15.0:xen-libs-4.10.4_06-lp150.2.25.1.i586",
"openSUSE Leap 15.0:xen-libs-4.10.4_06-lp150.2.25.1.x86_64",
"openSUSE Leap 15.0:xen-tools-4.10.4_06-lp150.2.25.1.x86_64",
"openSUSE Leap 15.0:xen-tools-domU-4.10.4_06-lp150.2.25.1.i586",
"openSUSE Leap 15.0:xen-tools-domU-4.10.4_06-lp150.2.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:xen-4.10.4_06-lp150.2.25.1.x86_64",
"openSUSE Leap 15.0:xen-devel-4.10.4_06-lp150.2.25.1.i586",
"openSUSE Leap 15.0:xen-devel-4.10.4_06-lp150.2.25.1.x86_64",
"openSUSE Leap 15.0:xen-doc-html-4.10.4_06-lp150.2.25.1.x86_64",
"openSUSE Leap 15.0:xen-libs-32bit-4.10.4_06-lp150.2.25.1.x86_64",
"openSUSE Leap 15.0:xen-libs-4.10.4_06-lp150.2.25.1.i586",
"openSUSE Leap 15.0:xen-libs-4.10.4_06-lp150.2.25.1.x86_64",
"openSUSE Leap 15.0:xen-tools-4.10.4_06-lp150.2.25.1.x86_64",
"openSUSE Leap 15.0:xen-tools-domU-4.10.4_06-lp150.2.25.1.i586",
"openSUSE Leap 15.0:xen-tools-domU-4.10.4_06-lp150.2.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-14T05:54:33Z",
"details": "important"
}
],
"title": "CVE-2019-18421"
},
{
"cve": "CVE-2019-18424",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-18424"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Xen through 4.12.x allowing attackers to gain host OS privileges via DMA in a situation where an untrusted domain has access to a physical device. This occurs because passed through PCI devices may corrupt host memory after deassignment. When a PCI device is assigned to an untrusted domain, it is possible for that domain to program the device to DMA to an arbitrary address. The IOMMU is used to protect the host from malicious DMA by making sure that the device addresses can only target memory assigned to the guest. However, when the guest domain is torn down, or the device is deassigned, the device is assigned back to dom0, thus allowing any in-flight DMA to potentially target critical host data. An untrusted domain with access to a physical device can DMA into host memory, leading to privilege escalation. Only systems where guests are given direct access to physical devices capable of DMA (PCI pass-through) are vulnerable. Systems which do not use PCI pass-through are not vulnerable.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:xen-4.10.4_06-lp150.2.25.1.x86_64",
"openSUSE Leap 15.0:xen-devel-4.10.4_06-lp150.2.25.1.i586",
"openSUSE Leap 15.0:xen-devel-4.10.4_06-lp150.2.25.1.x86_64",
"openSUSE Leap 15.0:xen-doc-html-4.10.4_06-lp150.2.25.1.x86_64",
"openSUSE Leap 15.0:xen-libs-32bit-4.10.4_06-lp150.2.25.1.x86_64",
"openSUSE Leap 15.0:xen-libs-4.10.4_06-lp150.2.25.1.i586",
"openSUSE Leap 15.0:xen-libs-4.10.4_06-lp150.2.25.1.x86_64",
"openSUSE Leap 15.0:xen-tools-4.10.4_06-lp150.2.25.1.x86_64",
"openSUSE Leap 15.0:xen-tools-domU-4.10.4_06-lp150.2.25.1.i586",
"openSUSE Leap 15.0:xen-tools-domU-4.10.4_06-lp150.2.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-18424",
"url": "https://www.suse.com/security/cve/CVE-2019-18424"
},
{
"category": "external",
"summary": "SUSE Bug 1154461 for CVE-2019-18424",
"url": "https://bugzilla.suse.com/1154461"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:xen-4.10.4_06-lp150.2.25.1.x86_64",
"openSUSE Leap 15.0:xen-devel-4.10.4_06-lp150.2.25.1.i586",
"openSUSE Leap 15.0:xen-devel-4.10.4_06-lp150.2.25.1.x86_64",
"openSUSE Leap 15.0:xen-doc-html-4.10.4_06-lp150.2.25.1.x86_64",
"openSUSE Leap 15.0:xen-libs-32bit-4.10.4_06-lp150.2.25.1.x86_64",
"openSUSE Leap 15.0:xen-libs-4.10.4_06-lp150.2.25.1.i586",
"openSUSE Leap 15.0:xen-libs-4.10.4_06-lp150.2.25.1.x86_64",
"openSUSE Leap 15.0:xen-tools-4.10.4_06-lp150.2.25.1.x86_64",
"openSUSE Leap 15.0:xen-tools-domU-4.10.4_06-lp150.2.25.1.i586",
"openSUSE Leap 15.0:xen-tools-domU-4.10.4_06-lp150.2.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.6,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.0:xen-4.10.4_06-lp150.2.25.1.x86_64",
"openSUSE Leap 15.0:xen-devel-4.10.4_06-lp150.2.25.1.i586",
"openSUSE Leap 15.0:xen-devel-4.10.4_06-lp150.2.25.1.x86_64",
"openSUSE Leap 15.0:xen-doc-html-4.10.4_06-lp150.2.25.1.x86_64",
"openSUSE Leap 15.0:xen-libs-32bit-4.10.4_06-lp150.2.25.1.x86_64",
"openSUSE Leap 15.0:xen-libs-4.10.4_06-lp150.2.25.1.i586",
"openSUSE Leap 15.0:xen-libs-4.10.4_06-lp150.2.25.1.x86_64",
"openSUSE Leap 15.0:xen-tools-4.10.4_06-lp150.2.25.1.x86_64",
"openSUSE Leap 15.0:xen-tools-domU-4.10.4_06-lp150.2.25.1.i586",
"openSUSE Leap 15.0:xen-tools-domU-4.10.4_06-lp150.2.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-14T05:54:33Z",
"details": "important"
}
],
"title": "CVE-2019-18424"
},
{
"cve": "CVE-2019-18425",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-18425"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Xen through 4.12.x allowing 32-bit PV guest OS users to gain guest OS privileges by installing and using descriptors. There is missing descriptor table limit checking in x86 PV emulation. When emulating certain PV guest operations, descriptor table accesses are performed by the emulating code. Such accesses should respect the guest specified limits, unless otherwise guaranteed to fail in such a case. Without this, emulation of 32-bit guest user mode calls through call gates would allow guest user mode to install and then use descriptors of their choice, as long as the guest kernel did not itself install an LDT. (Most OSes don\u0027t install any LDT by default). 32-bit PV guest user mode can elevate its privileges to that of the guest kernel. Xen versions from at least 3.2 onwards are affected. Only 32-bit PV guest user mode can leverage this vulnerability. HVM, PVH, as well as 64-bit PV guests cannot leverage this vulnerability. Arm systems are unaffected.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:xen-4.10.4_06-lp150.2.25.1.x86_64",
"openSUSE Leap 15.0:xen-devel-4.10.4_06-lp150.2.25.1.i586",
"openSUSE Leap 15.0:xen-devel-4.10.4_06-lp150.2.25.1.x86_64",
"openSUSE Leap 15.0:xen-doc-html-4.10.4_06-lp150.2.25.1.x86_64",
"openSUSE Leap 15.0:xen-libs-32bit-4.10.4_06-lp150.2.25.1.x86_64",
"openSUSE Leap 15.0:xen-libs-4.10.4_06-lp150.2.25.1.i586",
"openSUSE Leap 15.0:xen-libs-4.10.4_06-lp150.2.25.1.x86_64",
"openSUSE Leap 15.0:xen-tools-4.10.4_06-lp150.2.25.1.x86_64",
"openSUSE Leap 15.0:xen-tools-domU-4.10.4_06-lp150.2.25.1.i586",
"openSUSE Leap 15.0:xen-tools-domU-4.10.4_06-lp150.2.25.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-18425",
"url": "https://www.suse.com/security/cve/CVE-2019-18425"
},
{
"category": "external",
"summary": "SUSE Bug 1154456 for CVE-2019-18425",
"url": "https://bugzilla.suse.com/1154456"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2019-18425",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:xen-4.10.4_06-lp150.2.25.1.x86_64",
"openSUSE Leap 15.0:xen-devel-4.10.4_06-lp150.2.25.1.i586",
"openSUSE Leap 15.0:xen-devel-4.10.4_06-lp150.2.25.1.x86_64",
"openSUSE Leap 15.0:xen-doc-html-4.10.4_06-lp150.2.25.1.x86_64",
"openSUSE Leap 15.0:xen-libs-32bit-4.10.4_06-lp150.2.25.1.x86_64",
"openSUSE Leap 15.0:xen-libs-4.10.4_06-lp150.2.25.1.i586",
"openSUSE Leap 15.0:xen-libs-4.10.4_06-lp150.2.25.1.x86_64",
"openSUSE Leap 15.0:xen-tools-4.10.4_06-lp150.2.25.1.x86_64",
"openSUSE Leap 15.0:xen-tools-domU-4.10.4_06-lp150.2.25.1.i586",
"openSUSE Leap 15.0:xen-tools-domU-4.10.4_06-lp150.2.25.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:xen-4.10.4_06-lp150.2.25.1.x86_64",
"openSUSE Leap 15.0:xen-devel-4.10.4_06-lp150.2.25.1.i586",
"openSUSE Leap 15.0:xen-devel-4.10.4_06-lp150.2.25.1.x86_64",
"openSUSE Leap 15.0:xen-doc-html-4.10.4_06-lp150.2.25.1.x86_64",
"openSUSE Leap 15.0:xen-libs-32bit-4.10.4_06-lp150.2.25.1.x86_64",
"openSUSE Leap 15.0:xen-libs-4.10.4_06-lp150.2.25.1.i586",
"openSUSE Leap 15.0:xen-libs-4.10.4_06-lp150.2.25.1.x86_64",
"openSUSE Leap 15.0:xen-tools-4.10.4_06-lp150.2.25.1.x86_64",
"openSUSE Leap 15.0:xen-tools-domU-4.10.4_06-lp150.2.25.1.i586",
"openSUSE Leap 15.0:xen-tools-domU-4.10.4_06-lp150.2.25.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-14T05:54:33Z",
"details": "important"
}
],
"title": "CVE-2019-18425"
}
]
}
opensuse-su-2024:11396-1
Vulnerability from csaf_opensuse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "spectre-meltdown-checker-0.44-1.2 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the spectre-meltdown-checker-0.44-1.2 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-11396",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_11396-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-12207 page",
"url": "https://www.suse.com/security/cve/CVE-2018-12207/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11135 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11135/"
}
],
"title": "spectre-meltdown-checker-0.44-1.2 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:11396-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "spectre-meltdown-checker-0.44-1.2.aarch64",
"product": {
"name": "spectre-meltdown-checker-0.44-1.2.aarch64",
"product_id": "spectre-meltdown-checker-0.44-1.2.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "spectre-meltdown-checker-0.44-1.2.ppc64le",
"product": {
"name": "spectre-meltdown-checker-0.44-1.2.ppc64le",
"product_id": "spectre-meltdown-checker-0.44-1.2.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "spectre-meltdown-checker-0.44-1.2.s390x",
"product": {
"name": "spectre-meltdown-checker-0.44-1.2.s390x",
"product_id": "spectre-meltdown-checker-0.44-1.2.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "spectre-meltdown-checker-0.44-1.2.x86_64",
"product": {
"name": "spectre-meltdown-checker-0.44-1.2.x86_64",
"product_id": "spectre-meltdown-checker-0.44-1.2.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "spectre-meltdown-checker-0.44-1.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:spectre-meltdown-checker-0.44-1.2.aarch64"
},
"product_reference": "spectre-meltdown-checker-0.44-1.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spectre-meltdown-checker-0.44-1.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:spectre-meltdown-checker-0.44-1.2.ppc64le"
},
"product_reference": "spectre-meltdown-checker-0.44-1.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spectre-meltdown-checker-0.44-1.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:spectre-meltdown-checker-0.44-1.2.s390x"
},
"product_reference": "spectre-meltdown-checker-0.44-1.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "spectre-meltdown-checker-0.44-1.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:spectre-meltdown-checker-0.44-1.2.x86_64"
},
"product_reference": "spectre-meltdown-checker-0.44-1.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-12207",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-12207"
}
],
"notes": [
{
"category": "general",
"text": "Improper invalidation for page table updates by a virtual guest operating system for multiple Intel(R) Processors may allow an authenticated user to potentially enable denial of service of the host system via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:spectre-meltdown-checker-0.44-1.2.aarch64",
"openSUSE Tumbleweed:spectre-meltdown-checker-0.44-1.2.ppc64le",
"openSUSE Tumbleweed:spectre-meltdown-checker-0.44-1.2.s390x",
"openSUSE Tumbleweed:spectre-meltdown-checker-0.44-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-12207",
"url": "https://www.suse.com/security/cve/CVE-2018-12207"
},
{
"category": "external",
"summary": "SUSE Bug 1117665 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1117665"
},
{
"category": "external",
"summary": "SUSE Bug 1139073 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1139073"
},
{
"category": "external",
"summary": "SUSE Bug 1152505 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1152505"
},
{
"category": "external",
"summary": "SUSE Bug 1155812 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1155812"
},
{
"category": "external",
"summary": "SUSE Bug 1155817 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1155817"
},
{
"category": "external",
"summary": "SUSE Bug 1155945 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1155945"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1201877"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:spectre-meltdown-checker-0.44-1.2.aarch64",
"openSUSE Tumbleweed:spectre-meltdown-checker-0.44-1.2.ppc64le",
"openSUSE Tumbleweed:spectre-meltdown-checker-0.44-1.2.s390x",
"openSUSE Tumbleweed:spectre-meltdown-checker-0.44-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:spectre-meltdown-checker-0.44-1.2.aarch64",
"openSUSE Tumbleweed:spectre-meltdown-checker-0.44-1.2.ppc64le",
"openSUSE Tumbleweed:spectre-meltdown-checker-0.44-1.2.s390x",
"openSUSE Tumbleweed:spectre-meltdown-checker-0.44-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-12207"
},
{
"cve": "CVE-2019-11135",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11135"
}
],
"notes": [
{
"category": "general",
"text": "TSX Asynchronous Abort condition on some CPUs utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:spectre-meltdown-checker-0.44-1.2.aarch64",
"openSUSE Tumbleweed:spectre-meltdown-checker-0.44-1.2.ppc64le",
"openSUSE Tumbleweed:spectre-meltdown-checker-0.44-1.2.s390x",
"openSUSE Tumbleweed:spectre-meltdown-checker-0.44-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11135",
"url": "https://www.suse.com/security/cve/CVE-2019-11135"
},
{
"category": "external",
"summary": "SUSE Bug 1139073 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1139073"
},
{
"category": "external",
"summary": "SUSE Bug 1152497 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1152497"
},
{
"category": "external",
"summary": "SUSE Bug 1152505 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1152505"
},
{
"category": "external",
"summary": "SUSE Bug 1152506 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1152506"
},
{
"category": "external",
"summary": "SUSE Bug 1160120 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1160120"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1201877"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:spectre-meltdown-checker-0.44-1.2.aarch64",
"openSUSE Tumbleweed:spectre-meltdown-checker-0.44-1.2.ppc64le",
"openSUSE Tumbleweed:spectre-meltdown-checker-0.44-1.2.s390x",
"openSUSE Tumbleweed:spectre-meltdown-checker-0.44-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:spectre-meltdown-checker-0.44-1.2.aarch64",
"openSUSE Tumbleweed:spectre-meltdown-checker-0.44-1.2.ppc64le",
"openSUSE Tumbleweed:spectre-meltdown-checker-0.44-1.2.s390x",
"openSUSE Tumbleweed:spectre-meltdown-checker-0.44-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-11135"
}
]
}
opensuse-su-2019:2505-1
Vulnerability from csaf_opensuse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for qemu",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for qemu fixes the following issues:\n\n- Patch queue updated from https://gitlab.suse.de/virtualization/qemu.git SLE15\n- Fix use-after-free in slirp (CVE-2018-20126 bsc#1119991)\n- Fix potential DOS in lsi scsi controller emulation (CVE-2019-12068 bsc#1146873)\n- Expose taa-no \u0027feature\u0027, indicating CPU does not have the\n TSX Async Abort vulnerability. (CVE-2019-11135 bsc#1152506)\n- Expose pschange-mc-no \u0027feature\u0027, indicating CPU does not have\n the page size change machine check vulnerability (CVE-2018-12207 bsc#1155812)\n\nThis update was imported from the SUSE:SLE-15:Update update project.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-2019-2505",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2019_2505-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2019:2505-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YGK33QVVCMOM3HRWRJ6FPIFV2JBB4XDB/#YGK33QVVCMOM3HRWRJ6FPIFV2JBB4XDB"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2019:2505-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YGK33QVVCMOM3HRWRJ6FPIFV2JBB4XDB/#YGK33QVVCMOM3HRWRJ6FPIFV2JBB4XDB"
},
{
"category": "self",
"summary": "SUSE Bug 1119991",
"url": "https://bugzilla.suse.com/1119991"
},
{
"category": "self",
"summary": "SUSE Bug 1146873",
"url": "https://bugzilla.suse.com/1146873"
},
{
"category": "self",
"summary": "SUSE Bug 1152506",
"url": "https://bugzilla.suse.com/1152506"
},
{
"category": "self",
"summary": "SUSE Bug 1155812",
"url": "https://bugzilla.suse.com/1155812"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-12207 page",
"url": "https://www.suse.com/security/cve/CVE-2018-12207/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-20126 page",
"url": "https://www.suse.com/security/cve/CVE-2018-20126/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11135 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11135/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-12068 page",
"url": "https://www.suse.com/security/cve/CVE-2019-12068/"
}
],
"title": "Security update for qemu",
"tracking": {
"current_release_date": "2019-11-14T05:54:23Z",
"generator": {
"date": "2019-11-14T05:54:23Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2019:2505-1",
"initial_release_date": "2019-11-14T05:54:23Z",
"revision_history": [
{
"date": "2019-11-14T05:54:23Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "qemu-ipxe-1.0.0+-lp150.7.28.1.noarch",
"product": {
"name": "qemu-ipxe-1.0.0+-lp150.7.28.1.noarch",
"product_id": "qemu-ipxe-1.0.0+-lp150.7.28.1.noarch"
}
},
{
"category": "product_version",
"name": "qemu-seabios-1.11.0-lp150.7.28.1.noarch",
"product": {
"name": "qemu-seabios-1.11.0-lp150.7.28.1.noarch",
"product_id": "qemu-seabios-1.11.0-lp150.7.28.1.noarch"
}
},
{
"category": "product_version",
"name": "qemu-sgabios-8-lp150.7.28.1.noarch",
"product": {
"name": "qemu-sgabios-8-lp150.7.28.1.noarch",
"product_id": "qemu-sgabios-8-lp150.7.28.1.noarch"
}
},
{
"category": "product_version",
"name": "qemu-vgabios-1.11.0-lp150.7.28.1.noarch",
"product": {
"name": "qemu-vgabios-1.11.0-lp150.7.28.1.noarch",
"product_id": "qemu-vgabios-1.11.0-lp150.7.28.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-2.11.2-lp150.7.28.1.x86_64",
"product": {
"name": "qemu-2.11.2-lp150.7.28.1.x86_64",
"product_id": "qemu-2.11.2-lp150.7.28.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-arm-2.11.2-lp150.7.28.1.x86_64",
"product": {
"name": "qemu-arm-2.11.2-lp150.7.28.1.x86_64",
"product_id": "qemu-arm-2.11.2-lp150.7.28.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-block-curl-2.11.2-lp150.7.28.1.x86_64",
"product": {
"name": "qemu-block-curl-2.11.2-lp150.7.28.1.x86_64",
"product_id": "qemu-block-curl-2.11.2-lp150.7.28.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-block-dmg-2.11.2-lp150.7.28.1.x86_64",
"product": {
"name": "qemu-block-dmg-2.11.2-lp150.7.28.1.x86_64",
"product_id": "qemu-block-dmg-2.11.2-lp150.7.28.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-block-gluster-2.11.2-lp150.7.28.1.x86_64",
"product": {
"name": "qemu-block-gluster-2.11.2-lp150.7.28.1.x86_64",
"product_id": "qemu-block-gluster-2.11.2-lp150.7.28.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-block-iscsi-2.11.2-lp150.7.28.1.x86_64",
"product": {
"name": "qemu-block-iscsi-2.11.2-lp150.7.28.1.x86_64",
"product_id": "qemu-block-iscsi-2.11.2-lp150.7.28.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-block-rbd-2.11.2-lp150.7.28.1.x86_64",
"product": {
"name": "qemu-block-rbd-2.11.2-lp150.7.28.1.x86_64",
"product_id": "qemu-block-rbd-2.11.2-lp150.7.28.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-block-ssh-2.11.2-lp150.7.28.1.x86_64",
"product": {
"name": "qemu-block-ssh-2.11.2-lp150.7.28.1.x86_64",
"product_id": "qemu-block-ssh-2.11.2-lp150.7.28.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-extra-2.11.2-lp150.7.28.1.x86_64",
"product": {
"name": "qemu-extra-2.11.2-lp150.7.28.1.x86_64",
"product_id": "qemu-extra-2.11.2-lp150.7.28.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-guest-agent-2.11.2-lp150.7.28.1.x86_64",
"product": {
"name": "qemu-guest-agent-2.11.2-lp150.7.28.1.x86_64",
"product_id": "qemu-guest-agent-2.11.2-lp150.7.28.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-ksm-2.11.2-lp150.7.28.1.x86_64",
"product": {
"name": "qemu-ksm-2.11.2-lp150.7.28.1.x86_64",
"product_id": "qemu-ksm-2.11.2-lp150.7.28.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-kvm-2.11.2-lp150.7.28.1.x86_64",
"product": {
"name": "qemu-kvm-2.11.2-lp150.7.28.1.x86_64",
"product_id": "qemu-kvm-2.11.2-lp150.7.28.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-lang-2.11.2-lp150.7.28.1.x86_64",
"product": {
"name": "qemu-lang-2.11.2-lp150.7.28.1.x86_64",
"product_id": "qemu-lang-2.11.2-lp150.7.28.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-ppc-2.11.2-lp150.7.28.1.x86_64",
"product": {
"name": "qemu-ppc-2.11.2-lp150.7.28.1.x86_64",
"product_id": "qemu-ppc-2.11.2-lp150.7.28.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-s390-2.11.2-lp150.7.28.1.x86_64",
"product": {
"name": "qemu-s390-2.11.2-lp150.7.28.1.x86_64",
"product_id": "qemu-s390-2.11.2-lp150.7.28.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-tools-2.11.2-lp150.7.28.1.x86_64",
"product": {
"name": "qemu-tools-2.11.2-lp150.7.28.1.x86_64",
"product_id": "qemu-tools-2.11.2-lp150.7.28.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-x86-2.11.2-lp150.7.28.1.x86_64",
"product": {
"name": "qemu-x86-2.11.2-lp150.7.28.1.x86_64",
"product_id": "qemu-x86-2.11.2-lp150.7.28.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 15.0",
"product": {
"name": "openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.0"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-2.11.2-lp150.7.28.1.x86_64 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:qemu-2.11.2-lp150.7.28.1.x86_64"
},
"product_reference": "qemu-2.11.2-lp150.7.28.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-arm-2.11.2-lp150.7.28.1.x86_64 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:qemu-arm-2.11.2-lp150.7.28.1.x86_64"
},
"product_reference": "qemu-arm-2.11.2-lp150.7.28.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-2.11.2-lp150.7.28.1.x86_64 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:qemu-block-curl-2.11.2-lp150.7.28.1.x86_64"
},
"product_reference": "qemu-block-curl-2.11.2-lp150.7.28.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-dmg-2.11.2-lp150.7.28.1.x86_64 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:qemu-block-dmg-2.11.2-lp150.7.28.1.x86_64"
},
"product_reference": "qemu-block-dmg-2.11.2-lp150.7.28.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-gluster-2.11.2-lp150.7.28.1.x86_64 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:qemu-block-gluster-2.11.2-lp150.7.28.1.x86_64"
},
"product_reference": "qemu-block-gluster-2.11.2-lp150.7.28.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-iscsi-2.11.2-lp150.7.28.1.x86_64 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:qemu-block-iscsi-2.11.2-lp150.7.28.1.x86_64"
},
"product_reference": "qemu-block-iscsi-2.11.2-lp150.7.28.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-rbd-2.11.2-lp150.7.28.1.x86_64 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:qemu-block-rbd-2.11.2-lp150.7.28.1.x86_64"
},
"product_reference": "qemu-block-rbd-2.11.2-lp150.7.28.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-ssh-2.11.2-lp150.7.28.1.x86_64 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:qemu-block-ssh-2.11.2-lp150.7.28.1.x86_64"
},
"product_reference": "qemu-block-ssh-2.11.2-lp150.7.28.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-extra-2.11.2-lp150.7.28.1.x86_64 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:qemu-extra-2.11.2-lp150.7.28.1.x86_64"
},
"product_reference": "qemu-extra-2.11.2-lp150.7.28.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-2.11.2-lp150.7.28.1.x86_64 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:qemu-guest-agent-2.11.2-lp150.7.28.1.x86_64"
},
"product_reference": "qemu-guest-agent-2.11.2-lp150.7.28.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ipxe-1.0.0+-lp150.7.28.1.noarch as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:qemu-ipxe-1.0.0+-lp150.7.28.1.noarch"
},
"product_reference": "qemu-ipxe-1.0.0+-lp150.7.28.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ksm-2.11.2-lp150.7.28.1.x86_64 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:qemu-ksm-2.11.2-lp150.7.28.1.x86_64"
},
"product_reference": "qemu-ksm-2.11.2-lp150.7.28.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-2.11.2-lp150.7.28.1.x86_64 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:qemu-kvm-2.11.2-lp150.7.28.1.x86_64"
},
"product_reference": "qemu-kvm-2.11.2-lp150.7.28.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-2.11.2-lp150.7.28.1.x86_64 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:qemu-lang-2.11.2-lp150.7.28.1.x86_64"
},
"product_reference": "qemu-lang-2.11.2-lp150.7.28.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ppc-2.11.2-lp150.7.28.1.x86_64 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:qemu-ppc-2.11.2-lp150.7.28.1.x86_64"
},
"product_reference": "qemu-ppc-2.11.2-lp150.7.28.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-s390-2.11.2-lp150.7.28.1.x86_64 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:qemu-s390-2.11.2-lp150.7.28.1.x86_64"
},
"product_reference": "qemu-s390-2.11.2-lp150.7.28.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-seabios-1.11.0-lp150.7.28.1.noarch as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:qemu-seabios-1.11.0-lp150.7.28.1.noarch"
},
"product_reference": "qemu-seabios-1.11.0-lp150.7.28.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-sgabios-8-lp150.7.28.1.noarch as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:qemu-sgabios-8-lp150.7.28.1.noarch"
},
"product_reference": "qemu-sgabios-8-lp150.7.28.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-2.11.2-lp150.7.28.1.x86_64 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:qemu-tools-2.11.2-lp150.7.28.1.x86_64"
},
"product_reference": "qemu-tools-2.11.2-lp150.7.28.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-vgabios-1.11.0-lp150.7.28.1.noarch as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:qemu-vgabios-1.11.0-lp150.7.28.1.noarch"
},
"product_reference": "qemu-vgabios-1.11.0-lp150.7.28.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-x86-2.11.2-lp150.7.28.1.x86_64 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:qemu-x86-2.11.2-lp150.7.28.1.x86_64"
},
"product_reference": "qemu-x86-2.11.2-lp150.7.28.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-12207",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-12207"
}
],
"notes": [
{
"category": "general",
"text": "Improper invalidation for page table updates by a virtual guest operating system for multiple Intel(R) Processors may allow an authenticated user to potentially enable denial of service of the host system via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:qemu-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-arm-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-block-curl-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-block-dmg-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-block-gluster-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-block-iscsi-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-block-rbd-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-block-ssh-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-extra-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-guest-agent-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-ipxe-1.0.0+-lp150.7.28.1.noarch",
"openSUSE Leap 15.0:qemu-ksm-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-kvm-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-lang-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-ppc-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-s390-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-seabios-1.11.0-lp150.7.28.1.noarch",
"openSUSE Leap 15.0:qemu-sgabios-8-lp150.7.28.1.noarch",
"openSUSE Leap 15.0:qemu-tools-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-vgabios-1.11.0-lp150.7.28.1.noarch",
"openSUSE Leap 15.0:qemu-x86-2.11.2-lp150.7.28.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-12207",
"url": "https://www.suse.com/security/cve/CVE-2018-12207"
},
{
"category": "external",
"summary": "SUSE Bug 1117665 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1117665"
},
{
"category": "external",
"summary": "SUSE Bug 1139073 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1139073"
},
{
"category": "external",
"summary": "SUSE Bug 1152505 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1152505"
},
{
"category": "external",
"summary": "SUSE Bug 1155812 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1155812"
},
{
"category": "external",
"summary": "SUSE Bug 1155817 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1155817"
},
{
"category": "external",
"summary": "SUSE Bug 1155945 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1155945"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1201877"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:qemu-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-arm-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-block-curl-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-block-dmg-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-block-gluster-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-block-iscsi-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-block-rbd-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-block-ssh-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-extra-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-guest-agent-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-ipxe-1.0.0+-lp150.7.28.1.noarch",
"openSUSE Leap 15.0:qemu-ksm-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-kvm-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-lang-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-ppc-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-s390-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-seabios-1.11.0-lp150.7.28.1.noarch",
"openSUSE Leap 15.0:qemu-sgabios-8-lp150.7.28.1.noarch",
"openSUSE Leap 15.0:qemu-tools-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-vgabios-1.11.0-lp150.7.28.1.noarch",
"openSUSE Leap 15.0:qemu-x86-2.11.2-lp150.7.28.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:qemu-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-arm-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-block-curl-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-block-dmg-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-block-gluster-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-block-iscsi-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-block-rbd-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-block-ssh-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-extra-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-guest-agent-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-ipxe-1.0.0+-lp150.7.28.1.noarch",
"openSUSE Leap 15.0:qemu-ksm-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-kvm-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-lang-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-ppc-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-s390-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-seabios-1.11.0-lp150.7.28.1.noarch",
"openSUSE Leap 15.0:qemu-sgabios-8-lp150.7.28.1.noarch",
"openSUSE Leap 15.0:qemu-tools-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-vgabios-1.11.0-lp150.7.28.1.noarch",
"openSUSE Leap 15.0:qemu-x86-2.11.2-lp150.7.28.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-14T05:54:23Z",
"details": "moderate"
}
],
"title": "CVE-2018-12207"
},
{
"cve": "CVE-2018-20126",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-20126"
}
],
"notes": [
{
"category": "general",
"text": "hw/rdma/vmw/pvrdma_cmd.c in QEMU allows create_cq and create_qp memory leaks because errors are mishandled.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:qemu-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-arm-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-block-curl-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-block-dmg-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-block-gluster-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-block-iscsi-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-block-rbd-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-block-ssh-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-extra-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-guest-agent-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-ipxe-1.0.0+-lp150.7.28.1.noarch",
"openSUSE Leap 15.0:qemu-ksm-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-kvm-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-lang-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-ppc-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-s390-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-seabios-1.11.0-lp150.7.28.1.noarch",
"openSUSE Leap 15.0:qemu-sgabios-8-lp150.7.28.1.noarch",
"openSUSE Leap 15.0:qemu-tools-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-vgabios-1.11.0-lp150.7.28.1.noarch",
"openSUSE Leap 15.0:qemu-x86-2.11.2-lp150.7.28.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-20126",
"url": "https://www.suse.com/security/cve/CVE-2018-20126"
},
{
"category": "external",
"summary": "SUSE Bug 1119991 for CVE-2018-20126",
"url": "https://bugzilla.suse.com/1119991"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:qemu-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-arm-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-block-curl-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-block-dmg-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-block-gluster-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-block-iscsi-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-block-rbd-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-block-ssh-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-extra-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-guest-agent-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-ipxe-1.0.0+-lp150.7.28.1.noarch",
"openSUSE Leap 15.0:qemu-ksm-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-kvm-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-lang-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-ppc-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-s390-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-seabios-1.11.0-lp150.7.28.1.noarch",
"openSUSE Leap 15.0:qemu-sgabios-8-lp150.7.28.1.noarch",
"openSUSE Leap 15.0:qemu-tools-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-vgabios-1.11.0-lp150.7.28.1.noarch",
"openSUSE Leap 15.0:qemu-x86-2.11.2-lp150.7.28.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.8,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.0:qemu-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-arm-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-block-curl-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-block-dmg-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-block-gluster-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-block-iscsi-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-block-rbd-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-block-ssh-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-extra-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-guest-agent-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-ipxe-1.0.0+-lp150.7.28.1.noarch",
"openSUSE Leap 15.0:qemu-ksm-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-kvm-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-lang-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-ppc-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-s390-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-seabios-1.11.0-lp150.7.28.1.noarch",
"openSUSE Leap 15.0:qemu-sgabios-8-lp150.7.28.1.noarch",
"openSUSE Leap 15.0:qemu-tools-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-vgabios-1.11.0-lp150.7.28.1.noarch",
"openSUSE Leap 15.0:qemu-x86-2.11.2-lp150.7.28.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-14T05:54:23Z",
"details": "low"
}
],
"title": "CVE-2018-20126"
},
{
"cve": "CVE-2019-11135",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11135"
}
],
"notes": [
{
"category": "general",
"text": "TSX Asynchronous Abort condition on some CPUs utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:qemu-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-arm-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-block-curl-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-block-dmg-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-block-gluster-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-block-iscsi-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-block-rbd-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-block-ssh-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-extra-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-guest-agent-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-ipxe-1.0.0+-lp150.7.28.1.noarch",
"openSUSE Leap 15.0:qemu-ksm-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-kvm-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-lang-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-ppc-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-s390-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-seabios-1.11.0-lp150.7.28.1.noarch",
"openSUSE Leap 15.0:qemu-sgabios-8-lp150.7.28.1.noarch",
"openSUSE Leap 15.0:qemu-tools-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-vgabios-1.11.0-lp150.7.28.1.noarch",
"openSUSE Leap 15.0:qemu-x86-2.11.2-lp150.7.28.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11135",
"url": "https://www.suse.com/security/cve/CVE-2019-11135"
},
{
"category": "external",
"summary": "SUSE Bug 1139073 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1139073"
},
{
"category": "external",
"summary": "SUSE Bug 1152497 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1152497"
},
{
"category": "external",
"summary": "SUSE Bug 1152505 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1152505"
},
{
"category": "external",
"summary": "SUSE Bug 1152506 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1152506"
},
{
"category": "external",
"summary": "SUSE Bug 1160120 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1160120"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1201877"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:qemu-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-arm-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-block-curl-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-block-dmg-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-block-gluster-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-block-iscsi-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-block-rbd-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-block-ssh-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-extra-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-guest-agent-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-ipxe-1.0.0+-lp150.7.28.1.noarch",
"openSUSE Leap 15.0:qemu-ksm-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-kvm-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-lang-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-ppc-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-s390-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-seabios-1.11.0-lp150.7.28.1.noarch",
"openSUSE Leap 15.0:qemu-sgabios-8-lp150.7.28.1.noarch",
"openSUSE Leap 15.0:qemu-tools-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-vgabios-1.11.0-lp150.7.28.1.noarch",
"openSUSE Leap 15.0:qemu-x86-2.11.2-lp150.7.28.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:qemu-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-arm-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-block-curl-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-block-dmg-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-block-gluster-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-block-iscsi-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-block-rbd-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-block-ssh-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-extra-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-guest-agent-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-ipxe-1.0.0+-lp150.7.28.1.noarch",
"openSUSE Leap 15.0:qemu-ksm-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-kvm-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-lang-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-ppc-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-s390-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-seabios-1.11.0-lp150.7.28.1.noarch",
"openSUSE Leap 15.0:qemu-sgabios-8-lp150.7.28.1.noarch",
"openSUSE Leap 15.0:qemu-tools-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-vgabios-1.11.0-lp150.7.28.1.noarch",
"openSUSE Leap 15.0:qemu-x86-2.11.2-lp150.7.28.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-14T05:54:23Z",
"details": "moderate"
}
],
"title": "CVE-2019-11135"
},
{
"cve": "CVE-2019-12068",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-12068"
}
],
"notes": [
{
"category": "general",
"text": "In QEMU 1:4.1-1, 1:2.1+dfsg-12+deb8u6, 1:2.8+dfsg-6+deb9u8, 1:3.1+dfsg-8~deb10u1, 1:3.1+dfsg-8+deb10u2, and 1:2.1+dfsg-12+deb8u12 (fixed), when executing script in lsi_execute_script(), the LSI scsi adapter emulator advances \u0027s-\u003edsp\u0027 index to read next opcode. This can lead to an infinite loop if the next opcode is empty. Move the existing loop exit after 10k iterations so that it covers no-op opcodes as well.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:qemu-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-arm-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-block-curl-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-block-dmg-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-block-gluster-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-block-iscsi-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-block-rbd-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-block-ssh-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-extra-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-guest-agent-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-ipxe-1.0.0+-lp150.7.28.1.noarch",
"openSUSE Leap 15.0:qemu-ksm-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-kvm-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-lang-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-ppc-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-s390-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-seabios-1.11.0-lp150.7.28.1.noarch",
"openSUSE Leap 15.0:qemu-sgabios-8-lp150.7.28.1.noarch",
"openSUSE Leap 15.0:qemu-tools-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-vgabios-1.11.0-lp150.7.28.1.noarch",
"openSUSE Leap 15.0:qemu-x86-2.11.2-lp150.7.28.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-12068",
"url": "https://www.suse.com/security/cve/CVE-2019-12068"
},
{
"category": "external",
"summary": "SUSE Bug 1146873 for CVE-2019-12068",
"url": "https://bugzilla.suse.com/1146873"
},
{
"category": "external",
"summary": "SUSE Bug 1146874 for CVE-2019-12068",
"url": "https://bugzilla.suse.com/1146874"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2019-12068",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:qemu-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-arm-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-block-curl-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-block-dmg-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-block-gluster-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-block-iscsi-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-block-rbd-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-block-ssh-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-extra-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-guest-agent-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-ipxe-1.0.0+-lp150.7.28.1.noarch",
"openSUSE Leap 15.0:qemu-ksm-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-kvm-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-lang-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-ppc-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-s390-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-seabios-1.11.0-lp150.7.28.1.noarch",
"openSUSE Leap 15.0:qemu-sgabios-8-lp150.7.28.1.noarch",
"openSUSE Leap 15.0:qemu-tools-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-vgabios-1.11.0-lp150.7.28.1.noarch",
"openSUSE Leap 15.0:qemu-x86-2.11.2-lp150.7.28.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:qemu-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-arm-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-block-curl-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-block-dmg-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-block-gluster-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-block-iscsi-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-block-rbd-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-block-ssh-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-extra-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-guest-agent-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-ipxe-1.0.0+-lp150.7.28.1.noarch",
"openSUSE Leap 15.0:qemu-ksm-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-kvm-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-lang-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-ppc-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-s390-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-seabios-1.11.0-lp150.7.28.1.noarch",
"openSUSE Leap 15.0:qemu-sgabios-8-lp150.7.28.1.noarch",
"openSUSE Leap 15.0:qemu-tools-2.11.2-lp150.7.28.1.x86_64",
"openSUSE Leap 15.0:qemu-vgabios-1.11.0-lp150.7.28.1.noarch",
"openSUSE Leap 15.0:qemu-x86-2.11.2-lp150.7.28.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-14T05:54:23Z",
"details": "moderate"
}
],
"title": "CVE-2019-12068"
}
]
}
opensuse-su-2019:2510-1
Vulnerability from csaf_opensuse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for qemu",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for qemu fixes the following issues:\n\nqemu was updated to v3.1.1.1, a stable, bug-fix-only release, which\nincludes 2 fixes we already carry, as well as one additional use-\nafter-free fix in slirp. (CVE-2018-20126 bsc#1119991,\nCVE-2019-14378 bsc#1143794, and CVE-2019-15890 bsc#1149811\nrespectively)\n\nSecurity issues fixed:\n\n- CVE-2019-12068: Fixed potential DOS in lsi scsi controller emulation (bsc#1146873)\n- CVE-2019-11135: Expose taa-no \u0027feature\u0027, indicating CPU does not have the TSX Async Abort vulnerability. (bsc#1152506)\n- CVE-2018-12207: Expose pschange-mc-no \u0027feature\u0027, indicating CPU does not have the page size change machine check vulnerability (bsc#1117665)\n\nOther issues fixed:\n\n- Change how this bug gets fixed (bsc#1144087)\n- Disable file locking in the Xen PV disk backend to avoid locking\n issues with PV domUs during migration. The issues triggered by\n the locking can not be properly handled in libxl. The locking\n introduced in qemu-2.10 was removed again in qemu-4.0.\n (bsc#1079730, bsc#1098403, bsc#1111025, bsc#1145427, bsc#1145774)\n- Feature support for vfio-ccw dasd ipl (bsc#1145379 jira-SLE-6132)\n- Additional hardware instruction support for s390, also update\n qemu linux headers to 5.2-rc1 (bsc#1145436 jira-SLE-6237)\n\n\nThis update was imported from the SUSE:SLE-15-SP1:Update update project.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-2019-2510",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2019_2510-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2019:2510-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KGVFZGJMBR53343ITOTWO7YW2JVKGHDT/#KGVFZGJMBR53343ITOTWO7YW2JVKGHDT"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2019:2510-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KGVFZGJMBR53343ITOTWO7YW2JVKGHDT/#KGVFZGJMBR53343ITOTWO7YW2JVKGHDT"
},
{
"category": "self",
"summary": "SUSE Bug 1079730",
"url": "https://bugzilla.suse.com/1079730"
},
{
"category": "self",
"summary": "SUSE Bug 1098403",
"url": "https://bugzilla.suse.com/1098403"
},
{
"category": "self",
"summary": "SUSE Bug 1111025",
"url": "https://bugzilla.suse.com/1111025"
},
{
"category": "self",
"summary": "SUSE Bug 1117665",
"url": "https://bugzilla.suse.com/1117665"
},
{
"category": "self",
"summary": "SUSE Bug 1119991",
"url": "https://bugzilla.suse.com/1119991"
},
{
"category": "self",
"summary": "SUSE Bug 1143794",
"url": "https://bugzilla.suse.com/1143794"
},
{
"category": "self",
"summary": "SUSE Bug 1144087",
"url": "https://bugzilla.suse.com/1144087"
},
{
"category": "self",
"summary": "SUSE Bug 1145379",
"url": "https://bugzilla.suse.com/1145379"
},
{
"category": "self",
"summary": "SUSE Bug 1145427",
"url": "https://bugzilla.suse.com/1145427"
},
{
"category": "self",
"summary": "SUSE Bug 1145436",
"url": "https://bugzilla.suse.com/1145436"
},
{
"category": "self",
"summary": "SUSE Bug 1145774",
"url": "https://bugzilla.suse.com/1145774"
},
{
"category": "self",
"summary": "SUSE Bug 1146873",
"url": "https://bugzilla.suse.com/1146873"
},
{
"category": "self",
"summary": "SUSE Bug 1149811",
"url": "https://bugzilla.suse.com/1149811"
},
{
"category": "self",
"summary": "SUSE Bug 1152506",
"url": "https://bugzilla.suse.com/1152506"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-12207 page",
"url": "https://www.suse.com/security/cve/CVE-2018-12207/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-20126 page",
"url": "https://www.suse.com/security/cve/CVE-2018-20126/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11135 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11135/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-12068 page",
"url": "https://www.suse.com/security/cve/CVE-2019-12068/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-14378 page",
"url": "https://www.suse.com/security/cve/CVE-2019-14378/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15890 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15890/"
}
],
"title": "Security update for qemu",
"tracking": {
"current_release_date": "2019-11-14T06:31:05Z",
"generator": {
"date": "2019-11-14T06:31:05Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2019:2510-1",
"initial_release_date": "2019-11-14T06:31:05Z",
"revision_history": [
{
"date": "2019-11-14T06:31:05Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "qemu-ipxe-1.0.0+-lp151.7.6.1.noarch",
"product": {
"name": "qemu-ipxe-1.0.0+-lp151.7.6.1.noarch",
"product_id": "qemu-ipxe-1.0.0+-lp151.7.6.1.noarch"
}
},
{
"category": "product_version",
"name": "qemu-seabios-1.12.0-lp151.7.6.1.noarch",
"product": {
"name": "qemu-seabios-1.12.0-lp151.7.6.1.noarch",
"product_id": "qemu-seabios-1.12.0-lp151.7.6.1.noarch"
}
},
{
"category": "product_version",
"name": "qemu-sgabios-8-lp151.7.6.1.noarch",
"product": {
"name": "qemu-sgabios-8-lp151.7.6.1.noarch",
"product_id": "qemu-sgabios-8-lp151.7.6.1.noarch"
}
},
{
"category": "product_version",
"name": "qemu-vgabios-1.12.0-lp151.7.6.1.noarch",
"product": {
"name": "qemu-vgabios-1.12.0-lp151.7.6.1.noarch",
"product_id": "qemu-vgabios-1.12.0-lp151.7.6.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-3.1.1.1-lp151.7.6.1.x86_64",
"product": {
"name": "qemu-3.1.1.1-lp151.7.6.1.x86_64",
"product_id": "qemu-3.1.1.1-lp151.7.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-arm-3.1.1.1-lp151.7.6.1.x86_64",
"product": {
"name": "qemu-arm-3.1.1.1-lp151.7.6.1.x86_64",
"product_id": "qemu-arm-3.1.1.1-lp151.7.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-audio-alsa-3.1.1.1-lp151.7.6.1.x86_64",
"product": {
"name": "qemu-audio-alsa-3.1.1.1-lp151.7.6.1.x86_64",
"product_id": "qemu-audio-alsa-3.1.1.1-lp151.7.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-audio-oss-3.1.1.1-lp151.7.6.1.x86_64",
"product": {
"name": "qemu-audio-oss-3.1.1.1-lp151.7.6.1.x86_64",
"product_id": "qemu-audio-oss-3.1.1.1-lp151.7.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-audio-pa-3.1.1.1-lp151.7.6.1.x86_64",
"product": {
"name": "qemu-audio-pa-3.1.1.1-lp151.7.6.1.x86_64",
"product_id": "qemu-audio-pa-3.1.1.1-lp151.7.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-audio-sdl-3.1.1.1-lp151.7.6.1.x86_64",
"product": {
"name": "qemu-audio-sdl-3.1.1.1-lp151.7.6.1.x86_64",
"product_id": "qemu-audio-sdl-3.1.1.1-lp151.7.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-block-curl-3.1.1.1-lp151.7.6.1.x86_64",
"product": {
"name": "qemu-block-curl-3.1.1.1-lp151.7.6.1.x86_64",
"product_id": "qemu-block-curl-3.1.1.1-lp151.7.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-block-dmg-3.1.1.1-lp151.7.6.1.x86_64",
"product": {
"name": "qemu-block-dmg-3.1.1.1-lp151.7.6.1.x86_64",
"product_id": "qemu-block-dmg-3.1.1.1-lp151.7.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-block-gluster-3.1.1.1-lp151.7.6.1.x86_64",
"product": {
"name": "qemu-block-gluster-3.1.1.1-lp151.7.6.1.x86_64",
"product_id": "qemu-block-gluster-3.1.1.1-lp151.7.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-block-iscsi-3.1.1.1-lp151.7.6.1.x86_64",
"product": {
"name": "qemu-block-iscsi-3.1.1.1-lp151.7.6.1.x86_64",
"product_id": "qemu-block-iscsi-3.1.1.1-lp151.7.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-block-nfs-3.1.1.1-lp151.7.6.1.x86_64",
"product": {
"name": "qemu-block-nfs-3.1.1.1-lp151.7.6.1.x86_64",
"product_id": "qemu-block-nfs-3.1.1.1-lp151.7.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-block-rbd-3.1.1.1-lp151.7.6.1.x86_64",
"product": {
"name": "qemu-block-rbd-3.1.1.1-lp151.7.6.1.x86_64",
"product_id": "qemu-block-rbd-3.1.1.1-lp151.7.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-block-ssh-3.1.1.1-lp151.7.6.1.x86_64",
"product": {
"name": "qemu-block-ssh-3.1.1.1-lp151.7.6.1.x86_64",
"product_id": "qemu-block-ssh-3.1.1.1-lp151.7.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-extra-3.1.1.1-lp151.7.6.1.x86_64",
"product": {
"name": "qemu-extra-3.1.1.1-lp151.7.6.1.x86_64",
"product_id": "qemu-extra-3.1.1.1-lp151.7.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-guest-agent-3.1.1.1-lp151.7.6.1.x86_64",
"product": {
"name": "qemu-guest-agent-3.1.1.1-lp151.7.6.1.x86_64",
"product_id": "qemu-guest-agent-3.1.1.1-lp151.7.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-ksm-3.1.1.1-lp151.7.6.1.x86_64",
"product": {
"name": "qemu-ksm-3.1.1.1-lp151.7.6.1.x86_64",
"product_id": "qemu-ksm-3.1.1.1-lp151.7.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-kvm-3.1.1.1-lp151.7.6.1.x86_64",
"product": {
"name": "qemu-kvm-3.1.1.1-lp151.7.6.1.x86_64",
"product_id": "qemu-kvm-3.1.1.1-lp151.7.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-lang-3.1.1.1-lp151.7.6.1.x86_64",
"product": {
"name": "qemu-lang-3.1.1.1-lp151.7.6.1.x86_64",
"product_id": "qemu-lang-3.1.1.1-lp151.7.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-linux-user-3.1.1.1-lp151.7.6.1.x86_64",
"product": {
"name": "qemu-linux-user-3.1.1.1-lp151.7.6.1.x86_64",
"product_id": "qemu-linux-user-3.1.1.1-lp151.7.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-ppc-3.1.1.1-lp151.7.6.1.x86_64",
"product": {
"name": "qemu-ppc-3.1.1.1-lp151.7.6.1.x86_64",
"product_id": "qemu-ppc-3.1.1.1-lp151.7.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-s390-3.1.1.1-lp151.7.6.1.x86_64",
"product": {
"name": "qemu-s390-3.1.1.1-lp151.7.6.1.x86_64",
"product_id": "qemu-s390-3.1.1.1-lp151.7.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-tools-3.1.1.1-lp151.7.6.1.x86_64",
"product": {
"name": "qemu-tools-3.1.1.1-lp151.7.6.1.x86_64",
"product_id": "qemu-tools-3.1.1.1-lp151.7.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-ui-curses-3.1.1.1-lp151.7.6.1.x86_64",
"product": {
"name": "qemu-ui-curses-3.1.1.1-lp151.7.6.1.x86_64",
"product_id": "qemu-ui-curses-3.1.1.1-lp151.7.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-ui-gtk-3.1.1.1-lp151.7.6.1.x86_64",
"product": {
"name": "qemu-ui-gtk-3.1.1.1-lp151.7.6.1.x86_64",
"product_id": "qemu-ui-gtk-3.1.1.1-lp151.7.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-ui-sdl-3.1.1.1-lp151.7.6.1.x86_64",
"product": {
"name": "qemu-ui-sdl-3.1.1.1-lp151.7.6.1.x86_64",
"product_id": "qemu-ui-sdl-3.1.1.1-lp151.7.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-x86-3.1.1.1-lp151.7.6.1.x86_64",
"product": {
"name": "qemu-x86-3.1.1.1-lp151.7.6.1.x86_64",
"product_id": "qemu-x86-3.1.1.1-lp151.7.6.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 15.1",
"product": {
"name": "openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.1"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-3.1.1.1-lp151.7.6.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:qemu-3.1.1.1-lp151.7.6.1.x86_64"
},
"product_reference": "qemu-3.1.1.1-lp151.7.6.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-arm-3.1.1.1-lp151.7.6.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:qemu-arm-3.1.1.1-lp151.7.6.1.x86_64"
},
"product_reference": "qemu-arm-3.1.1.1-lp151.7.6.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-audio-alsa-3.1.1.1-lp151.7.6.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:qemu-audio-alsa-3.1.1.1-lp151.7.6.1.x86_64"
},
"product_reference": "qemu-audio-alsa-3.1.1.1-lp151.7.6.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-audio-oss-3.1.1.1-lp151.7.6.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:qemu-audio-oss-3.1.1.1-lp151.7.6.1.x86_64"
},
"product_reference": "qemu-audio-oss-3.1.1.1-lp151.7.6.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-audio-pa-3.1.1.1-lp151.7.6.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:qemu-audio-pa-3.1.1.1-lp151.7.6.1.x86_64"
},
"product_reference": "qemu-audio-pa-3.1.1.1-lp151.7.6.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-audio-sdl-3.1.1.1-lp151.7.6.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:qemu-audio-sdl-3.1.1.1-lp151.7.6.1.x86_64"
},
"product_reference": "qemu-audio-sdl-3.1.1.1-lp151.7.6.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-3.1.1.1-lp151.7.6.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:qemu-block-curl-3.1.1.1-lp151.7.6.1.x86_64"
},
"product_reference": "qemu-block-curl-3.1.1.1-lp151.7.6.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-dmg-3.1.1.1-lp151.7.6.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:qemu-block-dmg-3.1.1.1-lp151.7.6.1.x86_64"
},
"product_reference": "qemu-block-dmg-3.1.1.1-lp151.7.6.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-gluster-3.1.1.1-lp151.7.6.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:qemu-block-gluster-3.1.1.1-lp151.7.6.1.x86_64"
},
"product_reference": "qemu-block-gluster-3.1.1.1-lp151.7.6.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-iscsi-3.1.1.1-lp151.7.6.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:qemu-block-iscsi-3.1.1.1-lp151.7.6.1.x86_64"
},
"product_reference": "qemu-block-iscsi-3.1.1.1-lp151.7.6.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-nfs-3.1.1.1-lp151.7.6.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:qemu-block-nfs-3.1.1.1-lp151.7.6.1.x86_64"
},
"product_reference": "qemu-block-nfs-3.1.1.1-lp151.7.6.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-rbd-3.1.1.1-lp151.7.6.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:qemu-block-rbd-3.1.1.1-lp151.7.6.1.x86_64"
},
"product_reference": "qemu-block-rbd-3.1.1.1-lp151.7.6.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-ssh-3.1.1.1-lp151.7.6.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:qemu-block-ssh-3.1.1.1-lp151.7.6.1.x86_64"
},
"product_reference": "qemu-block-ssh-3.1.1.1-lp151.7.6.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-extra-3.1.1.1-lp151.7.6.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:qemu-extra-3.1.1.1-lp151.7.6.1.x86_64"
},
"product_reference": "qemu-extra-3.1.1.1-lp151.7.6.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-3.1.1.1-lp151.7.6.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:qemu-guest-agent-3.1.1.1-lp151.7.6.1.x86_64"
},
"product_reference": "qemu-guest-agent-3.1.1.1-lp151.7.6.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ipxe-1.0.0+-lp151.7.6.1.noarch as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:qemu-ipxe-1.0.0+-lp151.7.6.1.noarch"
},
"product_reference": "qemu-ipxe-1.0.0+-lp151.7.6.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ksm-3.1.1.1-lp151.7.6.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:qemu-ksm-3.1.1.1-lp151.7.6.1.x86_64"
},
"product_reference": "qemu-ksm-3.1.1.1-lp151.7.6.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-3.1.1.1-lp151.7.6.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:qemu-kvm-3.1.1.1-lp151.7.6.1.x86_64"
},
"product_reference": "qemu-kvm-3.1.1.1-lp151.7.6.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-3.1.1.1-lp151.7.6.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:qemu-lang-3.1.1.1-lp151.7.6.1.x86_64"
},
"product_reference": "qemu-lang-3.1.1.1-lp151.7.6.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-linux-user-3.1.1.1-lp151.7.6.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:qemu-linux-user-3.1.1.1-lp151.7.6.1.x86_64"
},
"product_reference": "qemu-linux-user-3.1.1.1-lp151.7.6.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ppc-3.1.1.1-lp151.7.6.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:qemu-ppc-3.1.1.1-lp151.7.6.1.x86_64"
},
"product_reference": "qemu-ppc-3.1.1.1-lp151.7.6.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-s390-3.1.1.1-lp151.7.6.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:qemu-s390-3.1.1.1-lp151.7.6.1.x86_64"
},
"product_reference": "qemu-s390-3.1.1.1-lp151.7.6.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-seabios-1.12.0-lp151.7.6.1.noarch as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:qemu-seabios-1.12.0-lp151.7.6.1.noarch"
},
"product_reference": "qemu-seabios-1.12.0-lp151.7.6.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-sgabios-8-lp151.7.6.1.noarch as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:qemu-sgabios-8-lp151.7.6.1.noarch"
},
"product_reference": "qemu-sgabios-8-lp151.7.6.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-3.1.1.1-lp151.7.6.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:qemu-tools-3.1.1.1-lp151.7.6.1.x86_64"
},
"product_reference": "qemu-tools-3.1.1.1-lp151.7.6.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ui-curses-3.1.1.1-lp151.7.6.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:qemu-ui-curses-3.1.1.1-lp151.7.6.1.x86_64"
},
"product_reference": "qemu-ui-curses-3.1.1.1-lp151.7.6.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ui-gtk-3.1.1.1-lp151.7.6.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:qemu-ui-gtk-3.1.1.1-lp151.7.6.1.x86_64"
},
"product_reference": "qemu-ui-gtk-3.1.1.1-lp151.7.6.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ui-sdl-3.1.1.1-lp151.7.6.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:qemu-ui-sdl-3.1.1.1-lp151.7.6.1.x86_64"
},
"product_reference": "qemu-ui-sdl-3.1.1.1-lp151.7.6.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-vgabios-1.12.0-lp151.7.6.1.noarch as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:qemu-vgabios-1.12.0-lp151.7.6.1.noarch"
},
"product_reference": "qemu-vgabios-1.12.0-lp151.7.6.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-x86-3.1.1.1-lp151.7.6.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:qemu-x86-3.1.1.1-lp151.7.6.1.x86_64"
},
"product_reference": "qemu-x86-3.1.1.1-lp151.7.6.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-12207",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-12207"
}
],
"notes": [
{
"category": "general",
"text": "Improper invalidation for page table updates by a virtual guest operating system for multiple Intel(R) Processors may allow an authenticated user to potentially enable denial of service of the host system via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:qemu-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-arm-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-audio-alsa-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-audio-oss-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-audio-pa-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-audio-sdl-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-block-curl-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-block-dmg-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-block-gluster-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-block-iscsi-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-block-nfs-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-block-rbd-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-block-ssh-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-extra-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-guest-agent-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-ipxe-1.0.0+-lp151.7.6.1.noarch",
"openSUSE Leap 15.1:qemu-ksm-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-kvm-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-lang-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-linux-user-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-ppc-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-s390-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-seabios-1.12.0-lp151.7.6.1.noarch",
"openSUSE Leap 15.1:qemu-sgabios-8-lp151.7.6.1.noarch",
"openSUSE Leap 15.1:qemu-tools-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-ui-curses-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-ui-gtk-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-ui-sdl-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-vgabios-1.12.0-lp151.7.6.1.noarch",
"openSUSE Leap 15.1:qemu-x86-3.1.1.1-lp151.7.6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-12207",
"url": "https://www.suse.com/security/cve/CVE-2018-12207"
},
{
"category": "external",
"summary": "SUSE Bug 1117665 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1117665"
},
{
"category": "external",
"summary": "SUSE Bug 1139073 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1139073"
},
{
"category": "external",
"summary": "SUSE Bug 1152505 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1152505"
},
{
"category": "external",
"summary": "SUSE Bug 1155812 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1155812"
},
{
"category": "external",
"summary": "SUSE Bug 1155817 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1155817"
},
{
"category": "external",
"summary": "SUSE Bug 1155945 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1155945"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1201877"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:qemu-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-arm-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-audio-alsa-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-audio-oss-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-audio-pa-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-audio-sdl-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-block-curl-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-block-dmg-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-block-gluster-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-block-iscsi-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-block-nfs-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-block-rbd-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-block-ssh-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-extra-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-guest-agent-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-ipxe-1.0.0+-lp151.7.6.1.noarch",
"openSUSE Leap 15.1:qemu-ksm-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-kvm-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-lang-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-linux-user-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-ppc-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-s390-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-seabios-1.12.0-lp151.7.6.1.noarch",
"openSUSE Leap 15.1:qemu-sgabios-8-lp151.7.6.1.noarch",
"openSUSE Leap 15.1:qemu-tools-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-ui-curses-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-ui-gtk-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-ui-sdl-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-vgabios-1.12.0-lp151.7.6.1.noarch",
"openSUSE Leap 15.1:qemu-x86-3.1.1.1-lp151.7.6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.1:qemu-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-arm-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-audio-alsa-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-audio-oss-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-audio-pa-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-audio-sdl-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-block-curl-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-block-dmg-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-block-gluster-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-block-iscsi-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-block-nfs-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-block-rbd-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-block-ssh-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-extra-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-guest-agent-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-ipxe-1.0.0+-lp151.7.6.1.noarch",
"openSUSE Leap 15.1:qemu-ksm-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-kvm-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-lang-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-linux-user-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-ppc-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-s390-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-seabios-1.12.0-lp151.7.6.1.noarch",
"openSUSE Leap 15.1:qemu-sgabios-8-lp151.7.6.1.noarch",
"openSUSE Leap 15.1:qemu-tools-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-ui-curses-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-ui-gtk-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-ui-sdl-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-vgabios-1.12.0-lp151.7.6.1.noarch",
"openSUSE Leap 15.1:qemu-x86-3.1.1.1-lp151.7.6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-14T06:31:05Z",
"details": "moderate"
}
],
"title": "CVE-2018-12207"
},
{
"cve": "CVE-2018-20126",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-20126"
}
],
"notes": [
{
"category": "general",
"text": "hw/rdma/vmw/pvrdma_cmd.c in QEMU allows create_cq and create_qp memory leaks because errors are mishandled.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:qemu-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-arm-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-audio-alsa-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-audio-oss-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-audio-pa-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-audio-sdl-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-block-curl-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-block-dmg-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-block-gluster-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-block-iscsi-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-block-nfs-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-block-rbd-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-block-ssh-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-extra-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-guest-agent-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-ipxe-1.0.0+-lp151.7.6.1.noarch",
"openSUSE Leap 15.1:qemu-ksm-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-kvm-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-lang-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-linux-user-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-ppc-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-s390-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-seabios-1.12.0-lp151.7.6.1.noarch",
"openSUSE Leap 15.1:qemu-sgabios-8-lp151.7.6.1.noarch",
"openSUSE Leap 15.1:qemu-tools-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-ui-curses-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-ui-gtk-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-ui-sdl-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-vgabios-1.12.0-lp151.7.6.1.noarch",
"openSUSE Leap 15.1:qemu-x86-3.1.1.1-lp151.7.6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-20126",
"url": "https://www.suse.com/security/cve/CVE-2018-20126"
},
{
"category": "external",
"summary": "SUSE Bug 1119991 for CVE-2018-20126",
"url": "https://bugzilla.suse.com/1119991"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:qemu-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-arm-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-audio-alsa-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-audio-oss-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-audio-pa-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-audio-sdl-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-block-curl-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-block-dmg-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-block-gluster-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-block-iscsi-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-block-nfs-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-block-rbd-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-block-ssh-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-extra-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-guest-agent-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-ipxe-1.0.0+-lp151.7.6.1.noarch",
"openSUSE Leap 15.1:qemu-ksm-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-kvm-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-lang-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-linux-user-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-ppc-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-s390-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-seabios-1.12.0-lp151.7.6.1.noarch",
"openSUSE Leap 15.1:qemu-sgabios-8-lp151.7.6.1.noarch",
"openSUSE Leap 15.1:qemu-tools-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-ui-curses-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-ui-gtk-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-ui-sdl-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-vgabios-1.12.0-lp151.7.6.1.noarch",
"openSUSE Leap 15.1:qemu-x86-3.1.1.1-lp151.7.6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.8,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1:qemu-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-arm-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-audio-alsa-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-audio-oss-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-audio-pa-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-audio-sdl-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-block-curl-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-block-dmg-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-block-gluster-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-block-iscsi-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-block-nfs-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-block-rbd-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-block-ssh-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-extra-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-guest-agent-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-ipxe-1.0.0+-lp151.7.6.1.noarch",
"openSUSE Leap 15.1:qemu-ksm-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-kvm-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-lang-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-linux-user-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-ppc-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-s390-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-seabios-1.12.0-lp151.7.6.1.noarch",
"openSUSE Leap 15.1:qemu-sgabios-8-lp151.7.6.1.noarch",
"openSUSE Leap 15.1:qemu-tools-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-ui-curses-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-ui-gtk-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-ui-sdl-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-vgabios-1.12.0-lp151.7.6.1.noarch",
"openSUSE Leap 15.1:qemu-x86-3.1.1.1-lp151.7.6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-14T06:31:05Z",
"details": "low"
}
],
"title": "CVE-2018-20126"
},
{
"cve": "CVE-2019-11135",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11135"
}
],
"notes": [
{
"category": "general",
"text": "TSX Asynchronous Abort condition on some CPUs utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:qemu-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-arm-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-audio-alsa-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-audio-oss-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-audio-pa-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-audio-sdl-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-block-curl-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-block-dmg-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-block-gluster-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-block-iscsi-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-block-nfs-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-block-rbd-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-block-ssh-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-extra-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-guest-agent-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-ipxe-1.0.0+-lp151.7.6.1.noarch",
"openSUSE Leap 15.1:qemu-ksm-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-kvm-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-lang-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-linux-user-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-ppc-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-s390-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-seabios-1.12.0-lp151.7.6.1.noarch",
"openSUSE Leap 15.1:qemu-sgabios-8-lp151.7.6.1.noarch",
"openSUSE Leap 15.1:qemu-tools-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-ui-curses-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-ui-gtk-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-ui-sdl-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-vgabios-1.12.0-lp151.7.6.1.noarch",
"openSUSE Leap 15.1:qemu-x86-3.1.1.1-lp151.7.6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11135",
"url": "https://www.suse.com/security/cve/CVE-2019-11135"
},
{
"category": "external",
"summary": "SUSE Bug 1139073 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1139073"
},
{
"category": "external",
"summary": "SUSE Bug 1152497 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1152497"
},
{
"category": "external",
"summary": "SUSE Bug 1152505 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1152505"
},
{
"category": "external",
"summary": "SUSE Bug 1152506 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1152506"
},
{
"category": "external",
"summary": "SUSE Bug 1160120 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1160120"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1201877"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:qemu-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-arm-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-audio-alsa-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-audio-oss-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-audio-pa-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-audio-sdl-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-block-curl-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-block-dmg-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-block-gluster-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-block-iscsi-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-block-nfs-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-block-rbd-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-block-ssh-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-extra-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-guest-agent-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-ipxe-1.0.0+-lp151.7.6.1.noarch",
"openSUSE Leap 15.1:qemu-ksm-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-kvm-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-lang-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-linux-user-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-ppc-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-s390-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-seabios-1.12.0-lp151.7.6.1.noarch",
"openSUSE Leap 15.1:qemu-sgabios-8-lp151.7.6.1.noarch",
"openSUSE Leap 15.1:qemu-tools-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-ui-curses-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-ui-gtk-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-ui-sdl-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-vgabios-1.12.0-lp151.7.6.1.noarch",
"openSUSE Leap 15.1:qemu-x86-3.1.1.1-lp151.7.6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.1:qemu-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-arm-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-audio-alsa-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-audio-oss-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-audio-pa-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-audio-sdl-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-block-curl-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-block-dmg-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-block-gluster-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-block-iscsi-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-block-nfs-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-block-rbd-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-block-ssh-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-extra-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-guest-agent-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-ipxe-1.0.0+-lp151.7.6.1.noarch",
"openSUSE Leap 15.1:qemu-ksm-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-kvm-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-lang-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-linux-user-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-ppc-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-s390-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-seabios-1.12.0-lp151.7.6.1.noarch",
"openSUSE Leap 15.1:qemu-sgabios-8-lp151.7.6.1.noarch",
"openSUSE Leap 15.1:qemu-tools-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-ui-curses-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-ui-gtk-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-ui-sdl-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-vgabios-1.12.0-lp151.7.6.1.noarch",
"openSUSE Leap 15.1:qemu-x86-3.1.1.1-lp151.7.6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-14T06:31:05Z",
"details": "moderate"
}
],
"title": "CVE-2019-11135"
},
{
"cve": "CVE-2019-12068",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-12068"
}
],
"notes": [
{
"category": "general",
"text": "In QEMU 1:4.1-1, 1:2.1+dfsg-12+deb8u6, 1:2.8+dfsg-6+deb9u8, 1:3.1+dfsg-8~deb10u1, 1:3.1+dfsg-8+deb10u2, and 1:2.1+dfsg-12+deb8u12 (fixed), when executing script in lsi_execute_script(), the LSI scsi adapter emulator advances \u0027s-\u003edsp\u0027 index to read next opcode. This can lead to an infinite loop if the next opcode is empty. Move the existing loop exit after 10k iterations so that it covers no-op opcodes as well.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:qemu-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-arm-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-audio-alsa-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-audio-oss-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-audio-pa-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-audio-sdl-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-block-curl-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-block-dmg-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-block-gluster-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-block-iscsi-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-block-nfs-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-block-rbd-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-block-ssh-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-extra-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-guest-agent-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-ipxe-1.0.0+-lp151.7.6.1.noarch",
"openSUSE Leap 15.1:qemu-ksm-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-kvm-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-lang-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-linux-user-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-ppc-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-s390-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-seabios-1.12.0-lp151.7.6.1.noarch",
"openSUSE Leap 15.1:qemu-sgabios-8-lp151.7.6.1.noarch",
"openSUSE Leap 15.1:qemu-tools-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-ui-curses-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-ui-gtk-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-ui-sdl-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-vgabios-1.12.0-lp151.7.6.1.noarch",
"openSUSE Leap 15.1:qemu-x86-3.1.1.1-lp151.7.6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-12068",
"url": "https://www.suse.com/security/cve/CVE-2019-12068"
},
{
"category": "external",
"summary": "SUSE Bug 1146873 for CVE-2019-12068",
"url": "https://bugzilla.suse.com/1146873"
},
{
"category": "external",
"summary": "SUSE Bug 1146874 for CVE-2019-12068",
"url": "https://bugzilla.suse.com/1146874"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2019-12068",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:qemu-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-arm-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-audio-alsa-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-audio-oss-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-audio-pa-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-audio-sdl-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-block-curl-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-block-dmg-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-block-gluster-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-block-iscsi-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-block-nfs-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-block-rbd-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-block-ssh-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-extra-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-guest-agent-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-ipxe-1.0.0+-lp151.7.6.1.noarch",
"openSUSE Leap 15.1:qemu-ksm-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-kvm-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-lang-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-linux-user-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-ppc-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-s390-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-seabios-1.12.0-lp151.7.6.1.noarch",
"openSUSE Leap 15.1:qemu-sgabios-8-lp151.7.6.1.noarch",
"openSUSE Leap 15.1:qemu-tools-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-ui-curses-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-ui-gtk-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-ui-sdl-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-vgabios-1.12.0-lp151.7.6.1.noarch",
"openSUSE Leap 15.1:qemu-x86-3.1.1.1-lp151.7.6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.1:qemu-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-arm-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-audio-alsa-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-audio-oss-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-audio-pa-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-audio-sdl-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-block-curl-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-block-dmg-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-block-gluster-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-block-iscsi-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-block-nfs-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-block-rbd-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-block-ssh-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-extra-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-guest-agent-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-ipxe-1.0.0+-lp151.7.6.1.noarch",
"openSUSE Leap 15.1:qemu-ksm-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-kvm-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-lang-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-linux-user-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-ppc-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-s390-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-seabios-1.12.0-lp151.7.6.1.noarch",
"openSUSE Leap 15.1:qemu-sgabios-8-lp151.7.6.1.noarch",
"openSUSE Leap 15.1:qemu-tools-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-ui-curses-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-ui-gtk-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-ui-sdl-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-vgabios-1.12.0-lp151.7.6.1.noarch",
"openSUSE Leap 15.1:qemu-x86-3.1.1.1-lp151.7.6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-14T06:31:05Z",
"details": "moderate"
}
],
"title": "CVE-2019-12068"
},
{
"cve": "CVE-2019-14378",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-14378"
}
],
"notes": [
{
"category": "general",
"text": "ip_reass in ip_input.c in libslirp 4.0.0 has a heap-based buffer overflow via a large packet because it mishandles a case involving the first fragment.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:qemu-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-arm-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-audio-alsa-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-audio-oss-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-audio-pa-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-audio-sdl-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-block-curl-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-block-dmg-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-block-gluster-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-block-iscsi-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-block-nfs-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-block-rbd-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-block-ssh-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-extra-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-guest-agent-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-ipxe-1.0.0+-lp151.7.6.1.noarch",
"openSUSE Leap 15.1:qemu-ksm-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-kvm-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-lang-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-linux-user-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-ppc-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-s390-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-seabios-1.12.0-lp151.7.6.1.noarch",
"openSUSE Leap 15.1:qemu-sgabios-8-lp151.7.6.1.noarch",
"openSUSE Leap 15.1:qemu-tools-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-ui-curses-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-ui-gtk-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-ui-sdl-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-vgabios-1.12.0-lp151.7.6.1.noarch",
"openSUSE Leap 15.1:qemu-x86-3.1.1.1-lp151.7.6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-14378",
"url": "https://www.suse.com/security/cve/CVE-2019-14378"
},
{
"category": "external",
"summary": "SUSE Bug 1143794 for CVE-2019-14378",
"url": "https://bugzilla.suse.com/1143794"
},
{
"category": "external",
"summary": "SUSE Bug 1143797 for CVE-2019-14378",
"url": "https://bugzilla.suse.com/1143797"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2019-14378",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:qemu-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-arm-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-audio-alsa-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-audio-oss-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-audio-pa-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-audio-sdl-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-block-curl-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-block-dmg-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-block-gluster-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-block-iscsi-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-block-nfs-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-block-rbd-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-block-ssh-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-extra-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-guest-agent-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-ipxe-1.0.0+-lp151.7.6.1.noarch",
"openSUSE Leap 15.1:qemu-ksm-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-kvm-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-lang-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-linux-user-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-ppc-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-s390-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-seabios-1.12.0-lp151.7.6.1.noarch",
"openSUSE Leap 15.1:qemu-sgabios-8-lp151.7.6.1.noarch",
"openSUSE Leap 15.1:qemu-tools-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-ui-curses-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-ui-gtk-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-ui-sdl-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-vgabios-1.12.0-lp151.7.6.1.noarch",
"openSUSE Leap 15.1:qemu-x86-3.1.1.1-lp151.7.6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.1:qemu-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-arm-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-audio-alsa-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-audio-oss-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-audio-pa-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-audio-sdl-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-block-curl-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-block-dmg-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-block-gluster-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-block-iscsi-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-block-nfs-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-block-rbd-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-block-ssh-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-extra-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-guest-agent-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-ipxe-1.0.0+-lp151.7.6.1.noarch",
"openSUSE Leap 15.1:qemu-ksm-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-kvm-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-lang-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-linux-user-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-ppc-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-s390-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-seabios-1.12.0-lp151.7.6.1.noarch",
"openSUSE Leap 15.1:qemu-sgabios-8-lp151.7.6.1.noarch",
"openSUSE Leap 15.1:qemu-tools-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-ui-curses-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-ui-gtk-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-ui-sdl-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-vgabios-1.12.0-lp151.7.6.1.noarch",
"openSUSE Leap 15.1:qemu-x86-3.1.1.1-lp151.7.6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-14T06:31:05Z",
"details": "important"
}
],
"title": "CVE-2019-14378"
},
{
"cve": "CVE-2019-15890",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15890"
}
],
"notes": [
{
"category": "general",
"text": "libslirp 4.0.0, as used in QEMU 4.1.0, has a use-after-free in ip_reass in ip_input.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:qemu-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-arm-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-audio-alsa-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-audio-oss-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-audio-pa-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-audio-sdl-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-block-curl-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-block-dmg-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-block-gluster-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-block-iscsi-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-block-nfs-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-block-rbd-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-block-ssh-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-extra-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-guest-agent-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-ipxe-1.0.0+-lp151.7.6.1.noarch",
"openSUSE Leap 15.1:qemu-ksm-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-kvm-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-lang-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-linux-user-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-ppc-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-s390-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-seabios-1.12.0-lp151.7.6.1.noarch",
"openSUSE Leap 15.1:qemu-sgabios-8-lp151.7.6.1.noarch",
"openSUSE Leap 15.1:qemu-tools-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-ui-curses-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-ui-gtk-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-ui-sdl-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-vgabios-1.12.0-lp151.7.6.1.noarch",
"openSUSE Leap 15.1:qemu-x86-3.1.1.1-lp151.7.6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15890",
"url": "https://www.suse.com/security/cve/CVE-2019-15890"
},
{
"category": "external",
"summary": "SUSE Bug 1149811 for CVE-2019-15890",
"url": "https://bugzilla.suse.com/1149811"
},
{
"category": "external",
"summary": "SUSE Bug 1149813 for CVE-2019-15890",
"url": "https://bugzilla.suse.com/1149813"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2019-15890",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:qemu-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-arm-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-audio-alsa-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-audio-oss-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-audio-pa-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-audio-sdl-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-block-curl-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-block-dmg-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-block-gluster-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-block-iscsi-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-block-nfs-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-block-rbd-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-block-ssh-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-extra-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-guest-agent-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-ipxe-1.0.0+-lp151.7.6.1.noarch",
"openSUSE Leap 15.1:qemu-ksm-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-kvm-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-lang-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-linux-user-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-ppc-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-s390-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-seabios-1.12.0-lp151.7.6.1.noarch",
"openSUSE Leap 15.1:qemu-sgabios-8-lp151.7.6.1.noarch",
"openSUSE Leap 15.1:qemu-tools-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-ui-curses-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-ui-gtk-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-ui-sdl-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-vgabios-1.12.0-lp151.7.6.1.noarch",
"openSUSE Leap 15.1:qemu-x86-3.1.1.1-lp151.7.6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.1:qemu-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-arm-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-audio-alsa-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-audio-oss-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-audio-pa-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-audio-sdl-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-block-curl-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-block-dmg-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-block-gluster-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-block-iscsi-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-block-nfs-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-block-rbd-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-block-ssh-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-extra-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-guest-agent-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-ipxe-1.0.0+-lp151.7.6.1.noarch",
"openSUSE Leap 15.1:qemu-ksm-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-kvm-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-lang-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-linux-user-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-ppc-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-s390-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-seabios-1.12.0-lp151.7.6.1.noarch",
"openSUSE Leap 15.1:qemu-sgabios-8-lp151.7.6.1.noarch",
"openSUSE Leap 15.1:qemu-tools-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-ui-curses-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-ui-gtk-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-ui-sdl-3.1.1.1-lp151.7.6.1.x86_64",
"openSUSE Leap 15.1:qemu-vgabios-1.12.0-lp151.7.6.1.noarch",
"openSUSE Leap 15.1:qemu-x86-3.1.1.1-lp151.7.6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-14T06:31:05Z",
"details": "moderate"
}
],
"title": "CVE-2019-15890"
}
]
}
opensuse-su-2019:2710-1
Vulnerability from csaf_opensuse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for spectre-meltdown-checker",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for spectre-meltdown-checker fixes the following issues:\n\n - feat: implement TAA detection (CVE-2019-11135 bsc#1139073)\n - feat: implement MCEPSC / iTLB Multihit detection (CVE-2018-12207 bsc#1117665)\n - feat: taa: add TSX_CTRL MSR detection in hardware info\n - feat: fwdb: use both Intel GitHub repo and MCEdb to build our firmware version database\n - feat: use --live with --kernel/--config/--map to override file detection in live mode\n - enh: rework the vuln logic of MDS with --paranoid (fixes #307)\n - enh: explain that Enhanced IBRS is better for performance than classic IBRS\n - enh: kernel: autodetect customized arch kernels from cmdline\n - enh: kernel decompression: better tolerance against missing tools\n - enh: mock: implement reading from /proc/cmdline\n - fix: variant3a: Silvermont CPUs are not vulnerable to variant 3a\n - fix: lockdown: detect Red Hat locked down kernels (impacts MSR writes)\n - fix: lockdown: detect locked down mode in vanilla 5.4+ kernels\n - fix: sgx: on locked down kernels, fallback to CPUID bit for detection\n - fix: fwdb: builtin version takes precedence if the local cached version is older\n - fix: pteinv: don\u0027t check kernel image if not available\n - fix: silence useless error from grep (fixes #322)\n - fix: msr: fix msr module detection under Ubuntu 19.10 (fixes #316)\n - fix: mocking value for read_msr\n - chore: rename mcedb cmdline parameters to fwdb, and change db version scheme\n - chore: fwdb: update to v130.20191104+i20191027\n - chore: add GitHub check workflow\n\nThis update was imported from the SUSE:SLE-15-SP1:Update update project.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-2019-2710",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2019_2710-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2019:2710-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VPOZE7PRHYWJK54T4PNLQG6ZIUGENA75/#VPOZE7PRHYWJK54T4PNLQG6ZIUGENA75"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2019:2710-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VPOZE7PRHYWJK54T4PNLQG6ZIUGENA75/#VPOZE7PRHYWJK54T4PNLQG6ZIUGENA75"
},
{
"category": "self",
"summary": "SUSE Bug 1117665",
"url": "https://bugzilla.suse.com/1117665"
},
{
"category": "self",
"summary": "SUSE Bug 1139073",
"url": "https://bugzilla.suse.com/1139073"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-12207 page",
"url": "https://www.suse.com/security/cve/CVE-2018-12207/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11135 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11135/"
}
],
"title": "Security update for spectre-meltdown-checker",
"tracking": {
"current_release_date": "2019-12-30T23:14:20Z",
"generator": {
"date": "2019-12-30T23:14:20Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2019:2710-1",
"initial_release_date": "2019-12-30T23:14:20Z",
"revision_history": [
{
"date": "2019-12-30T23:14:20Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "spectre-meltdown-checker-0.43-lp151.3.3.1.x86_64",
"product": {
"name": "spectre-meltdown-checker-0.43-lp151.3.3.1.x86_64",
"product_id": "spectre-meltdown-checker-0.43-lp151.3.3.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 15.1",
"product": {
"name": "openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.1"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "spectre-meltdown-checker-0.43-lp151.3.3.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:spectre-meltdown-checker-0.43-lp151.3.3.1.x86_64"
},
"product_reference": "spectre-meltdown-checker-0.43-lp151.3.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-12207",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-12207"
}
],
"notes": [
{
"category": "general",
"text": "Improper invalidation for page table updates by a virtual guest operating system for multiple Intel(R) Processors may allow an authenticated user to potentially enable denial of service of the host system via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:spectre-meltdown-checker-0.43-lp151.3.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-12207",
"url": "https://www.suse.com/security/cve/CVE-2018-12207"
},
{
"category": "external",
"summary": "SUSE Bug 1117665 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1117665"
},
{
"category": "external",
"summary": "SUSE Bug 1139073 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1139073"
},
{
"category": "external",
"summary": "SUSE Bug 1152505 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1152505"
},
{
"category": "external",
"summary": "SUSE Bug 1155812 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1155812"
},
{
"category": "external",
"summary": "SUSE Bug 1155817 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1155817"
},
{
"category": "external",
"summary": "SUSE Bug 1155945 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1155945"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1201877"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:spectre-meltdown-checker-0.43-lp151.3.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.1:spectre-meltdown-checker-0.43-lp151.3.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-12-30T23:14:20Z",
"details": "moderate"
}
],
"title": "CVE-2018-12207"
},
{
"cve": "CVE-2019-11135",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11135"
}
],
"notes": [
{
"category": "general",
"text": "TSX Asynchronous Abort condition on some CPUs utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:spectre-meltdown-checker-0.43-lp151.3.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11135",
"url": "https://www.suse.com/security/cve/CVE-2019-11135"
},
{
"category": "external",
"summary": "SUSE Bug 1139073 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1139073"
},
{
"category": "external",
"summary": "SUSE Bug 1152497 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1152497"
},
{
"category": "external",
"summary": "SUSE Bug 1152505 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1152505"
},
{
"category": "external",
"summary": "SUSE Bug 1152506 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1152506"
},
{
"category": "external",
"summary": "SUSE Bug 1160120 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1160120"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1201877"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:spectre-meltdown-checker-0.43-lp151.3.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.1:spectre-meltdown-checker-0.43-lp151.3.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-12-30T23:14:20Z",
"details": "moderate"
}
],
"title": "CVE-2019-11135"
}
]
}
opensuse-su-2019:2503-1
Vulnerability from csaf_opensuse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\n\nThe openSUSE Leap 15.0 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2019-0154: An unprotected read access to i915 registers has been fixed that could have been abused to facilitate a local denial-of-service attack. (bsc#1135966)\n- CVE-2019-0155: A privilege escalation vulnerability has been fixed in the i915 module that allowed batch buffers from user mode to gain super user privileges. (bsc#1135967)\n- CVE-2019-16231: drivers/net/fjes/fjes_main.c did not check the alloc_workqueue return value, leading to a NULL pointer dereference (bnc#1150466).\n- CVE-2019-18805: There was a net/ipv4/tcp_input.c signed integer overflow in tcp_ack_update_rtt() when userspace writes a very large integer to /proc/sys/net/ipv4/tcp_min_rtt_wlen, leading to a denial of service or possibly unspecified other impact, aka CID-19fad20d15a6 (bnc#1156187).\n- CVE-2019-17055: base_sock_create in drivers/isdn/mISDN/socket.c in the AF_ISDN network module did not enforce CAP_NET_RAW, which means that unprivileged users can create a raw socket, aka CID-b91ee4aa2a21 (bnc#1152782).\n- CVE-2019-16995: A memory leak exits in hsr_dev_finalize() in net/hsr/hsr_device.c, if hsr_add_port fails to add a port, which may cause denial of service, aka CID-6caabe7f197d (bnc#1152685).\n- CVE-2019-11135: Aborting an asynchronous TSX operation on Intel CPUs with Transactional Memory support could be used to facilitate sidechannel information leaks out of microarchitectural buffers, similar to the previously described \u0027Microarchitectural Data Sampling\u0027 attack.\n\n The Linux kernel was supplemented with the option to disable TSX operation altogether (requiring CPU Microcode updates on older systems) and better flushing of microarchitectural buffers (VERW).\n\n The set of options available is described in our TID at https://www.suse.com/support/kb/doc/?id=7024251\n\n- CVE-2019-16233: drivers/scsi/qla2xxx/qla_os.c did not check the alloc_workqueue return value, leading to a NULL pointer dereference (bnc#1150457).\n- CVE-2018-12207: Untrusted virtual machines on Intel CPUs could exploit a race condition in the Instruction Fetch Unit of the Intel CPU to cause a Machine Exception during Page Size Change, causing the CPU core to be non-functional.\n\n The Linux Kernel kvm hypervisor was adjusted to avoid page size changes in executable pages by splitting / merging huge pages into small pages as needed.\n\n More information can be found on https://www.suse.com/support/kb/doc/?id=7023735\n\n- CVE-2019-10220: Added sanity checks on the pathnames passed to the user space. (bsc#1144903).\n\nThe following non-security bugs were fixed:\n\n- ALSA: bebob: Fix prototype of helper function to return negative value (bsc#1051510).\n- ALSA: bebob: fix to detect configured source of sampling clock for Focusrite Saffire Pro i/o series (git-fixes).\n- ALSA: hda: Add Elkhart Lake PCI ID (bsc#1051510).\n- ALSA: hda: Add Tigerlake/Jasperlake PCI ID (bsc#1051510).\n- ALSA: hda/ca0132 - Fix possible workqueue stall (bsc#1155836).\n- ALSA: hda/realtek - Add support for ALC623 (bsc#1051510).\n- ALSA: hda/realtek - Add support for ALC711 (bsc#1051510).\n- ALSA: hda/realtek - Fix 2 front mics of codec 0x623 (bsc#1051510).\n- ALSA: timer: Fix incorrectly assigned timer instance (git-fixes).\n- ALSA: timer: Fix mutex deadlock at releasing card (bsc#1051510).\n- arcnet: provide a buffer big enough to actually receive packets (networking-stable-19_09_30).\n- ASoc: rockchip: i2s: Fix RPM imbalance (bsc#1051510).\n- ASoC: rsnd: Reinitialize bit clock inversion flag for every format setting (bsc#1051510).\n- bpf: fix use after free in prog symbol exposure (bsc#1083647).\n- btrfs: block-group: Fix a memory leak due to missing btrfs_put_block_group() (bsc#1155178).\n- btrfs: qgroup: Always free PREALLOC META reserve in btrfs_delalloc_release_extents() (bsc#1155179).\n- btrfs: tracepoints: Fix bad entry members of qgroup events (bsc#1155186).\n- btrfs: tracepoints: Fix wrong parameter order for qgroup events (bsc#1155184).\n- can: dev: call netif_carrier_off() in register_candev() (bsc#1051510).\n- crypto: af_alg - consolidation of duplicate code (bsc#1154737).\n- crypto: af_alg - fix race accessing cipher request (bsc#1154737).\n- crypto: af_alg - Fix race around ctx-\u003ercvused by making it atomic_t (bsc#1154737).\n- crypto: af_alg - Initialize sg_num_bytes in error code path (bsc#1051510).\n- crypto: af_alg - remove locking in async callback (bsc#1154737).\n- crypto: af_alg - update correct dst SGL entry (bsc#1051510).\n- crypto: af_alg - wait for data at beginning of recvmsg (bsc#1154737).\n- crypto: algif_aead - copy AAD from src to dst (bsc#1154737).\n- crypto: algif_aead - fix reference counting of null skcipher (bsc#1154737).\n- crypto: algif_aead - overhaul memory management (bsc#1154737).\n- crypto: algif_aead - skip SGL entries with NULL page (bsc#1154737).\n- crypto: algif - return error code when no data was processed (bsc#1154737).\n- crypto: algif_skcipher - overhaul memory management (bsc#1154737).\n- cxgb4:Fix out-of-bounds MSI-X info array access (networking-stable-19_10_05).\n- dmaengine: bcm2835: Print error in case setting DMA mask fails (bsc#1051510).\n- dmaengine: imx-sdma: fix size check for sdma script_number (bsc#1051510).\n- drm/edid: Add 6 bpc quirk for SDC panel in Lenovo G50 (bsc#1051510).\n- drm/i915: Add gen9 BCS cmdparsing (bsc#1135967)\n- drm/i915: Add support for mandatory cmdparsing (bsc#1135967)\n- drm/i915: Allow parsing of unsized batches (bsc#1135967)\n- drm/i915/cmdparser: Add support for backward jumps (bsc#1135967)\n- drm/i915/cmdparser: Ignore Length operands during command matching (bsc#1135967)\n- drm/i915/cmdparser: Use explicit goto for error paths (bsc#1135967)\n- drm/i915: Disable Secure Batches for gen6+\n- drm/i915/gen8+: Add RC6 CTX corruption WA (bsc#1135967)\n- drm/i915/gtt: Add read only pages to gen8_pte_encode (bsc#1135967)\n- drm/i915/gtt: Disable read-only support under GVT (bsc#1135967)\n- drm/i915/gtt: Read-only pages for insert_entries on bdw (bsc#1135967)\n- drm/i915: Lower RM timeout to avoid DSI hard hangs (bsc#1135967)\n- drm/i915: Prevent writing into a read-only object via a GGTT mmap (bsc#1135967)\n- drm/i915: Remove Master tables from cmdparser\n- drm/i915: Rename gen7 cmdparser tables (bsc#1135967)\n- drm/i915: Support ro ppgtt mapped cmdparser shadow buffers (bsc#1135967)\n- efi: cper: print AER info of PCIe fatal error (bsc#1051510).\n- efi/memattr: Do not bail on zero VA if it equals the region\u0027s PA (bsc#1051510).\n- efivar/ssdt: Do not iterate over EFI vars if no SSDT override was specified (bsc#1051510).\n- HID: fix error message in hid_open_report() (bsc#1051510).\n- HID: logitech-hidpp: do all FF cleanup in hidpp_ff_destroy() (bsc#1051510).\n- hso: fix NULL-deref on tty open (bsc#1051510).\n- hyperv: set nvme msi interrupts to unmanaged (jsc#SLE-8953, jsc#SLE-9221, jsc#SLE-4941, bsc#1119461, bsc#1119465, bsc#1138190, bsc#1154905).\n- IB/core: Add mitigation for Spectre V1 (bsc#1155671)\n- ieee802154: ca8210: prevent memory leak (bsc#1051510).\n- input: synaptics-rmi4 - avoid processing unknown IRQs (bsc#1051510).\n- integrity: prevent deadlock during digsig verification (bsc#1090631).\n- ipv6: drop incoming packets having a v4mapped source address (networking-stable-19_10_05).\n- ipv6: Handle missing host route in __ipv6_ifa_notify (networking-stable-19_10_05).\n- iwlwifi: do not panic in error path on non-msix systems (bsc#1155692).\n- iwlwifi: exclude GEO SAR support for 3168 (git-fixes).\n- kABI workaround for crypto/af_alg changes (bsc#1154737).\n- kABI workaround for drm_vma_offset_node readonly field addition (bsc#1135967)\n- ksm: cleanup stable_node chain collapse case (bnc#1144338).\n- ksm: fix use after free with merge_across_nodes = 0 (bnc#1144338).\n- ksm: introduce ksm_max_page_sharing per page deduplication limit (bnc#1144338).\n- ksm: optimize refile of stable_node_dup at the head of the chain (bnc#1144338).\n- ksm: swap the two output parameters of chain/chain_prune (bnc#1144338).\n- KVM: vmx, svm: always run with EFER.NXE=1 when shadow paging is active (bsc#1117665).\n- mac80211: fix txq null pointer dereference (bsc#1051510).\n- mac80211: Reject malformed SSID elements (bsc#1051510).\n- md/raid0: avoid RAID0 data corruption due to layout confusion (bsc#1140090).\n- md/raid0: fix warning message for parameter default_layout (bsc#1140090).\n- Move upstreamed CA0132 fix into sorted section\n- netfilter: nf_nat: do not bug when mapping already exists (bsc#1146612).\n- net: openvswitch: free vport unless register_netdevice() succeeds (git-fixes).\n- net/phy: fix DP83865 10 Mbps HDX loopback disable function (networking-stable-19_09_30).\n- net: qlogic: Fix memory leak in ql_alloc_large_buffers (networking-stable-19_10_05).\n- net: qrtr: Stop rx_worker before freeing node (networking-stable-19_09_30).\n- net/rds: Fix error handling in rds_ib_add_one() (networking-stable-19_10_05).\n- net/rds: fix warn in rds_message_alloc_sgs (bsc#1154848).\n- net/rds: remove user triggered WARN_ON in rds_sendmsg (bsc#1154848).\n- net: Replace NF_CT_ASSERT() with WARN_ON() (bsc#1146612).\n- net/sched: act_sample: do not push mac header on ip6gre ingress (networking-stable-19_09_30).\n- net_sched: add policy validation for action attributes (networking-stable-19_09_30).\n- net_sched: fix backward compatibility for TCA_ACT_KIND (git-fixes).\n- net: Unpublish sk from sk_reuseport_cb before call_rcu (networking-stable-19_10_05).\n- NFSv4.1 - backchannel request should hold ref on xprt (bsc#1152624).\n- nl80211: fix null pointer dereference (bsc#1051510).\n- openvswitch: change type of UPCALL_PID attribute to NLA_UNSPEC (networking-stable-19_09_30).\n- power: supply: max14656: fix potential use-after-free (bsc#1051510).\n- qmi_wwan: add support for Cinterion CLS8 devices (networking-stable-19_10_05).\n- r8152: Set macpassthru in reset_resume callback (bsc#1051510).\n- rds: Fix warning (bsc#1154848).\n- Revert \u0027ALSA: hda: Flush interrupts on disabling\u0027 (bsc#1051510).\n- Revert \u0027drm/radeon: Fix EEH during kexec\u0027 (bsc#1051510).\n- Revert synaptics-rmi4 patch due to regression (bsc#1155982) Also blacklisting it\n- rpm/kernel-subpackage-spec: Mention debuginfo in the subpackage description (bsc#1149119).\n- s390/cmf: set_schib_wait add timeout (bsc#1153509, bsc#1153476).\n- s390/cpumsf: Check for CPU Measurement sampling (bsc#1153681 LTC#181855).\n- sc16is7xx: Fix for \u0027Unexpected interrupt: 8\u0027 (bsc#1051510).\n- sch_cbq: validate TCA_CBQ_WRROPT to avoid crash (networking-stable-19_10_05).\n- sch_dsmark: fix potential NULL deref in dsmark_init() (networking-stable-19_10_05).\n- sched/fair: Avoid divide by zero when rebalancing domains (bsc#1096254).\n- sch_netem: fix a divide by zero in tabledist() (networking-stable-19_09_30).\n- scsi: lpfc: Fix devices that do not return after devloss followed by rediscovery (bsc#1137040).\n- scsi: lpfc: Limit xri count for kdump environment (bsc#1154124).\n- scsi: qla2xxx: Add error handling for PLOGI ELS passthrough (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Capture FW dump on MPI heartbeat stop event (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Check for MB timeout while capturing ISP27/28xx FW dump (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Do command completion on abort timeout (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: qla2xxx: do not use zero for FC4_PRIORITY_NVME (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: qla2xxx: Dual FCP-NVMe target port support (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Fix a dma_pool_free() call (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: qla2xxx: Fix device connect issues in P2P configuration (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: qla2xxx: Fix double scsi_done for abort path (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: qla2xxx: Fix driver unload hang (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: qla2xxx: Fix memory leak when sending I/O fails (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: qla2xxx: Fix N2N link reset (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Fix N2N link up fail (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Fix partial flash write of MBI (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Fix SRB leak on switch command timeout (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: qla2xxx: Fix stale mem access on driver unload (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Fix unbound sleep in fcport delete path (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: fixup incorrect usage of host_byte (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Fix wait condition in loop (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Improve logging for scan thread (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Initialized mailbox to prevent driver load failure (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: initialize fc4_type_priority (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: qla2xxx: Optimize NPIV tear down process (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Remove an include directive (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: qla2xxx: remove redundant assignment to pointer host (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Retry PLOGI on FC-NVMe PRLI failure (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: qla2xxx: Set remove flag for all VP (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Silence fwdump template message (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: stop timer in shutdown path (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Update driver version to 10.01.00.20-k (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Update driver version to 10.01.00.21-k (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: sd: Ignore a failure to sync cache due to lack of authorization (git-fixes).\n- scsi: storvsc: Add ability to change scsi queue depth (bsc#1155021).\n- scsi: zfcp: fix reaction on bit error threshold notification (bsc#1154956 LTC#182054).\n- serial: fix kernel-doc warning in comments (bsc#1051510).\n- serial: mctrl_gpio: Check for NULL pointer (bsc#1051510).\n- serial: uartlite: fix exit path null pointer (bsc#1051510).\n- skge: fix checksum byte order (networking-stable-19_09_30).\n- staging: rtl8188eu: fix null dereference when kzalloc fails (bsc#1051510).\n- staging: wlan-ng: fix exit return when sme-\u003ekey_idx \u003e= NUM_WEPKEYS (bsc#1051510).\n- supporte.conf: add efivarfs to kernel-default-base (bsc#1154858).\n- tipc: fix unlimited bundling of small messages (networking-stable-19_10_05).\n- tracing: Get trace_array reference for available_tracers files (bsc#1156429).\n- usb: gadget: Reject endpoints with 0 maxpacket value (bsc#1051510).\n- usb: gadget: udc: atmel: Fix interrupt storm in FIFO mode (bsc#1051510).\n- usb: handle warm-reset port requests on hub resume (bsc#1051510).\n- usb: ldusb: fix control-message timeout (bsc#1051510).\n- usb: ldusb: fix memleak on disconnect (bsc#1051510).\n- usb: ldusb: fix NULL-derefs on driver unbind (bsc#1051510).\n- usb: ldusb: fix read info leaks (bsc#1051510).\n- usb: ldusb: fix ring-buffer locking (bsc#1051510).\n- usb: legousbtower: fix a signedness bug in tower_probe() (bsc#1051510).\n- usb: legousbtower: fix memleak on disconnect (bsc#1051510).\n- usb: serial: ti_usb_3410_5052: fix port-close races (bsc#1051510).\n- usb: serial: whiteheat: fix line-speed endianness (bsc#1051510).\n- usb: serial: whiteheat: fix potential slab corruption (bsc#1051510).\n- usb-storage: Revert commit 747668dbc061 (\u0027usb-storage: Set virt_boundary_mask to avoid SG overflows\u0027) (bsc#1051510).\n- usb: udc: lpc32xx: fix bad bit shift operation (bsc#1051510).\n- usb: usblp: fix use-after-free on disconnect (bsc#1051510).\n- vsock: Fix a lockdep warning in __vsock_release() (networking-stable-19_10_05).\n- x86/boot/64: Make level2_kernel_pgt pages invalid outside kernel area (bnc#1153969).\n- x86/boot/64: Round memory hole size up to next PMD page (bnc#1153969).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-2019-2503",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2019_2503-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2019:2503-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GT2JTOAOVM6XT2DFUS6CAXI4NAAVMRVR/#GT2JTOAOVM6XT2DFUS6CAXI4NAAVMRVR"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2019:2503-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GT2JTOAOVM6XT2DFUS6CAXI4NAAVMRVR/#GT2JTOAOVM6XT2DFUS6CAXI4NAAVMRVR"
},
{
"category": "self",
"summary": "SUSE Bug 1048942",
"url": "https://bugzilla.suse.com/1048942"
},
{
"category": "self",
"summary": "SUSE Bug 1051510",
"url": "https://bugzilla.suse.com/1051510"
},
{
"category": "self",
"summary": "SUSE Bug 1082635",
"url": "https://bugzilla.suse.com/1082635"
},
{
"category": "self",
"summary": "SUSE Bug 1083647",
"url": "https://bugzilla.suse.com/1083647"
},
{
"category": "self",
"summary": "SUSE Bug 1090631",
"url": "https://bugzilla.suse.com/1090631"
},
{
"category": "self",
"summary": "SUSE Bug 1096254",
"url": "https://bugzilla.suse.com/1096254"
},
{
"category": "self",
"summary": "SUSE Bug 1117665",
"url": "https://bugzilla.suse.com/1117665"
},
{
"category": "self",
"summary": "SUSE Bug 1119461",
"url": "https://bugzilla.suse.com/1119461"
},
{
"category": "self",
"summary": "SUSE Bug 1119465",
"url": "https://bugzilla.suse.com/1119465"
},
{
"category": "self",
"summary": "SUSE Bug 1123034",
"url": "https://bugzilla.suse.com/1123034"
},
{
"category": "self",
"summary": "SUSE Bug 1135966",
"url": "https://bugzilla.suse.com/1135966"
},
{
"category": "self",
"summary": "SUSE Bug 1135967",
"url": "https://bugzilla.suse.com/1135967"
},
{
"category": "self",
"summary": "SUSE Bug 1137040",
"url": "https://bugzilla.suse.com/1137040"
},
{
"category": "self",
"summary": "SUSE Bug 1138190",
"url": "https://bugzilla.suse.com/1138190"
},
{
"category": "self",
"summary": "SUSE Bug 1139073",
"url": "https://bugzilla.suse.com/1139073"
},
{
"category": "self",
"summary": "SUSE Bug 1140090",
"url": "https://bugzilla.suse.com/1140090"
},
{
"category": "self",
"summary": "SUSE Bug 1143706",
"url": "https://bugzilla.suse.com/1143706"
},
{
"category": "self",
"summary": "SUSE Bug 1144338",
"url": "https://bugzilla.suse.com/1144338"
},
{
"category": "self",
"summary": "SUSE Bug 1144903",
"url": "https://bugzilla.suse.com/1144903"
},
{
"category": "self",
"summary": "SUSE Bug 1146612",
"url": "https://bugzilla.suse.com/1146612"
},
{
"category": "self",
"summary": "SUSE Bug 1149119",
"url": "https://bugzilla.suse.com/1149119"
},
{
"category": "self",
"summary": "SUSE Bug 1150457",
"url": "https://bugzilla.suse.com/1150457"
},
{
"category": "self",
"summary": "SUSE Bug 1150466",
"url": "https://bugzilla.suse.com/1150466"
},
{
"category": "self",
"summary": "SUSE Bug 1152624",
"url": "https://bugzilla.suse.com/1152624"
},
{
"category": "self",
"summary": "SUSE Bug 1152685",
"url": "https://bugzilla.suse.com/1152685"
},
{
"category": "self",
"summary": "SUSE Bug 1152782",
"url": "https://bugzilla.suse.com/1152782"
},
{
"category": "self",
"summary": "SUSE Bug 1153476",
"url": "https://bugzilla.suse.com/1153476"
},
{
"category": "self",
"summary": "SUSE Bug 1153509",
"url": "https://bugzilla.suse.com/1153509"
},
{
"category": "self",
"summary": "SUSE Bug 1153681",
"url": "https://bugzilla.suse.com/1153681"
},
{
"category": "self",
"summary": "SUSE Bug 1153969",
"url": "https://bugzilla.suse.com/1153969"
},
{
"category": "self",
"summary": "SUSE Bug 1154124",
"url": "https://bugzilla.suse.com/1154124"
},
{
"category": "self",
"summary": "SUSE Bug 1154526",
"url": "https://bugzilla.suse.com/1154526"
},
{
"category": "self",
"summary": "SUSE Bug 1154737",
"url": "https://bugzilla.suse.com/1154737"
},
{
"category": "self",
"summary": "SUSE Bug 1154848",
"url": "https://bugzilla.suse.com/1154848"
},
{
"category": "self",
"summary": "SUSE Bug 1154858",
"url": "https://bugzilla.suse.com/1154858"
},
{
"category": "self",
"summary": "SUSE Bug 1154905",
"url": "https://bugzilla.suse.com/1154905"
},
{
"category": "self",
"summary": "SUSE Bug 1154956",
"url": "https://bugzilla.suse.com/1154956"
},
{
"category": "self",
"summary": "SUSE Bug 1155021",
"url": "https://bugzilla.suse.com/1155021"
},
{
"category": "self",
"summary": "SUSE Bug 1155178",
"url": "https://bugzilla.suse.com/1155178"
},
{
"category": "self",
"summary": "SUSE Bug 1155179",
"url": "https://bugzilla.suse.com/1155179"
},
{
"category": "self",
"summary": "SUSE Bug 1155184",
"url": "https://bugzilla.suse.com/1155184"
},
{
"category": "self",
"summary": "SUSE Bug 1155186",
"url": "https://bugzilla.suse.com/1155186"
},
{
"category": "self",
"summary": "SUSE Bug 1155671",
"url": "https://bugzilla.suse.com/1155671"
},
{
"category": "self",
"summary": "SUSE Bug 1155692",
"url": "https://bugzilla.suse.com/1155692"
},
{
"category": "self",
"summary": "SUSE Bug 1155836",
"url": "https://bugzilla.suse.com/1155836"
},
{
"category": "self",
"summary": "SUSE Bug 1155982",
"url": "https://bugzilla.suse.com/1155982"
},
{
"category": "self",
"summary": "SUSE Bug 1156187",
"url": "https://bugzilla.suse.com/1156187"
},
{
"category": "self",
"summary": "SUSE Bug 1156429",
"url": "https://bugzilla.suse.com/1156429"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-12207 page",
"url": "https://www.suse.com/security/cve/CVE-2018-12207/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-0154 page",
"url": "https://www.suse.com/security/cve/CVE-2019-0154/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-0155 page",
"url": "https://www.suse.com/security/cve/CVE-2019-0155/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-10220 page",
"url": "https://www.suse.com/security/cve/CVE-2019-10220/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11135 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11135/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-16231 page",
"url": "https://www.suse.com/security/cve/CVE-2019-16231/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-16233 page",
"url": "https://www.suse.com/security/cve/CVE-2019-16233/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-16995 page",
"url": "https://www.suse.com/security/cve/CVE-2019-16995/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-17055 page",
"url": "https://www.suse.com/security/cve/CVE-2019-17055/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-18805 page",
"url": "https://www.suse.com/security/cve/CVE-2019-18805/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2019-11-14T05:53:54Z",
"generator": {
"date": "2019-11-14T05:53:54Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2019:2503-1",
"initial_release_date": "2019-11-14T05:53:54Z",
"revision_history": [
{
"date": "2019-11-14T05:53:54Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-4.12.14-lp150.12.82.1.noarch",
"product": {
"name": "kernel-devel-4.12.14-lp150.12.82.1.noarch",
"product_id": "kernel-devel-4.12.14-lp150.12.82.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-4.12.14-lp150.12.82.1.noarch",
"product": {
"name": "kernel-docs-4.12.14-lp150.12.82.1.noarch",
"product_id": "kernel-docs-4.12.14-lp150.12.82.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-html-4.12.14-lp150.12.82.1.noarch",
"product": {
"name": "kernel-docs-html-4.12.14-lp150.12.82.1.noarch",
"product_id": "kernel-docs-html-4.12.14-lp150.12.82.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-4.12.14-lp150.12.82.1.noarch",
"product": {
"name": "kernel-macros-4.12.14-lp150.12.82.1.noarch",
"product_id": "kernel-macros-4.12.14-lp150.12.82.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-4.12.14-lp150.12.82.1.noarch",
"product": {
"name": "kernel-source-4.12.14-lp150.12.82.1.noarch",
"product_id": "kernel-source-4.12.14-lp150.12.82.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-4.12.14-lp150.12.82.1.noarch",
"product": {
"name": "kernel-source-vanilla-4.12.14-lp150.12.82.1.noarch",
"product_id": "kernel-source-vanilla-4.12.14-lp150.12.82.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-4.12.14-lp150.12.82.1.x86_64",
"product": {
"name": "kernel-debug-4.12.14-lp150.12.82.1.x86_64",
"product_id": "kernel-debug-4.12.14-lp150.12.82.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-4.12.14-lp150.12.82.1.x86_64",
"product": {
"name": "kernel-debug-base-4.12.14-lp150.12.82.1.x86_64",
"product_id": "kernel-debug-base-4.12.14-lp150.12.82.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-4.12.14-lp150.12.82.1.x86_64",
"product": {
"name": "kernel-debug-devel-4.12.14-lp150.12.82.1.x86_64",
"product_id": "kernel-debug-devel-4.12.14-lp150.12.82.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-lp150.12.82.1.x86_64",
"product": {
"name": "kernel-default-4.12.14-lp150.12.82.1.x86_64",
"product_id": "kernel-default-4.12.14-lp150.12.82.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-lp150.12.82.1.x86_64",
"product": {
"name": "kernel-default-base-4.12.14-lp150.12.82.1.x86_64",
"product_id": "kernel-default-base-4.12.14-lp150.12.82.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-lp150.12.82.1.x86_64",
"product": {
"name": "kernel-default-devel-4.12.14-lp150.12.82.1.x86_64",
"product_id": "kernel-default-devel-4.12.14-lp150.12.82.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-4.12.14-lp150.12.82.1.x86_64",
"product": {
"name": "kernel-kvmsmall-4.12.14-lp150.12.82.1.x86_64",
"product_id": "kernel-kvmsmall-4.12.14-lp150.12.82.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-base-4.12.14-lp150.12.82.1.x86_64",
"product": {
"name": "kernel-kvmsmall-base-4.12.14-lp150.12.82.1.x86_64",
"product_id": "kernel-kvmsmall-base-4.12.14-lp150.12.82.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-4.12.14-lp150.12.82.1.x86_64",
"product": {
"name": "kernel-kvmsmall-devel-4.12.14-lp150.12.82.1.x86_64",
"product_id": "kernel-kvmsmall-devel-4.12.14-lp150.12.82.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-lp150.12.82.1.x86_64",
"product": {
"name": "kernel-obs-build-4.12.14-lp150.12.82.1.x86_64",
"product_id": "kernel-obs-build-4.12.14-lp150.12.82.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-lp150.12.82.1.x86_64",
"product": {
"name": "kernel-obs-qa-4.12.14-lp150.12.82.1.x86_64",
"product_id": "kernel-obs-qa-4.12.14-lp150.12.82.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-lp150.12.82.1.x86_64",
"product": {
"name": "kernel-syms-4.12.14-lp150.12.82.1.x86_64",
"product_id": "kernel-syms-4.12.14-lp150.12.82.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-lp150.12.82.1.x86_64",
"product": {
"name": "kernel-vanilla-4.12.14-lp150.12.82.1.x86_64",
"product_id": "kernel-vanilla-4.12.14-lp150.12.82.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-lp150.12.82.1.x86_64",
"product": {
"name": "kernel-vanilla-base-4.12.14-lp150.12.82.1.x86_64",
"product_id": "kernel-vanilla-base-4.12.14-lp150.12.82.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-lp150.12.82.1.x86_64",
"product": {
"name": "kernel-vanilla-devel-4.12.14-lp150.12.82.1.x86_64",
"product_id": "kernel-vanilla-devel-4.12.14-lp150.12.82.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 15.0",
"product": {
"name": "openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.0"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-4.12.14-lp150.12.82.1.x86_64 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.82.1.x86_64"
},
"product_reference": "kernel-debug-4.12.14-lp150.12.82.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-base-4.12.14-lp150.12.82.1.x86_64 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.82.1.x86_64"
},
"product_reference": "kernel-debug-base-4.12.14-lp150.12.82.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-4.12.14-lp150.12.82.1.x86_64 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.82.1.x86_64"
},
"product_reference": "kernel-debug-devel-4.12.14-lp150.12.82.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-lp150.12.82.1.x86_64 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.82.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-lp150.12.82.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-lp150.12.82.1.x86_64 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.82.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-lp150.12.82.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-lp150.12.82.1.x86_64 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.82.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-lp150.12.82.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-lp150.12.82.1.noarch as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.82.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-lp150.12.82.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.12.14-lp150.12.82.1.noarch as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.82.1.noarch"
},
"product_reference": "kernel-docs-4.12.14-lp150.12.82.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-html-4.12.14-lp150.12.82.1.noarch as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.82.1.noarch"
},
"product_reference": "kernel-docs-html-4.12.14-lp150.12.82.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-4.12.14-lp150.12.82.1.x86_64 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.82.1.x86_64"
},
"product_reference": "kernel-kvmsmall-4.12.14-lp150.12.82.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-base-4.12.14-lp150.12.82.1.x86_64 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.82.1.x86_64"
},
"product_reference": "kernel-kvmsmall-base-4.12.14-lp150.12.82.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-devel-4.12.14-lp150.12.82.1.x86_64 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.82.1.x86_64"
},
"product_reference": "kernel-kvmsmall-devel-4.12.14-lp150.12.82.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-lp150.12.82.1.noarch as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.82.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-lp150.12.82.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-lp150.12.82.1.x86_64 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.82.1.x86_64"
},
"product_reference": "kernel-obs-build-4.12.14-lp150.12.82.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-qa-4.12.14-lp150.12.82.1.x86_64 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.82.1.x86_64"
},
"product_reference": "kernel-obs-qa-4.12.14-lp150.12.82.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-lp150.12.82.1.noarch as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.82.1.noarch"
},
"product_reference": "kernel-source-4.12.14-lp150.12.82.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-vanilla-4.12.14-lp150.12.82.1.noarch as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.82.1.noarch"
},
"product_reference": "kernel-source-vanilla-4.12.14-lp150.12.82.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-lp150.12.82.1.x86_64 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.82.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-lp150.12.82.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-4.12.14-lp150.12.82.1.x86_64 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.82.1.x86_64"
},
"product_reference": "kernel-vanilla-4.12.14-lp150.12.82.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-lp150.12.82.1.x86_64 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.82.1.x86_64"
},
"product_reference": "kernel-vanilla-base-4.12.14-lp150.12.82.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-devel-4.12.14-lp150.12.82.1.x86_64 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.82.1.x86_64"
},
"product_reference": "kernel-vanilla-devel-4.12.14-lp150.12.82.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-12207",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-12207"
}
],
"notes": [
{
"category": "general",
"text": "Improper invalidation for page table updates by a virtual guest operating system for multiple Intel(R) Processors may allow an authenticated user to potentially enable denial of service of the host system via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.82.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-12207",
"url": "https://www.suse.com/security/cve/CVE-2018-12207"
},
{
"category": "external",
"summary": "SUSE Bug 1117665 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1117665"
},
{
"category": "external",
"summary": "SUSE Bug 1139073 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1139073"
},
{
"category": "external",
"summary": "SUSE Bug 1152505 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1152505"
},
{
"category": "external",
"summary": "SUSE Bug 1155812 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1155812"
},
{
"category": "external",
"summary": "SUSE Bug 1155817 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1155817"
},
{
"category": "external",
"summary": "SUSE Bug 1155945 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1155945"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1201877"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.82.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.82.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-14T05:53:54Z",
"details": "moderate"
}
],
"title": "CVE-2018-12207"
},
{
"cve": "CVE-2019-0154",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-0154"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient access control in subsystem for Intel (R) processor graphics in 6th, 7th, 8th and 9th Generation Intel(R) Core(TM) Processor Families; Intel(R) Pentium(R) Processor J, N, Silver and Gold Series; Intel(R) Celeron(R) Processor J, N, G3900 and G4900 Series; Intel(R) Atom(R) Processor A and E3900 Series; Intel(R) Xeon(R) Processor E3-1500 v5 and v6 and E-2100 Processor Families may allow an authenticated user to potentially enable denial of service via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.82.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-0154",
"url": "https://www.suse.com/security/cve/CVE-2019-0154"
},
{
"category": "external",
"summary": "SUSE Bug 1135966 for CVE-2019-0154",
"url": "https://bugzilla.suse.com/1135966"
},
{
"category": "external",
"summary": "SUSE Bug 1181720 for CVE-2019-0154",
"url": "https://bugzilla.suse.com/1181720"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.82.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.82.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-14T05:53:54Z",
"details": "important"
}
],
"title": "CVE-2019-0154"
},
{
"cve": "CVE-2019-0155",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-0155"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient access control in a subsystem for Intel (R) processor graphics in 6th, 7th, 8th and 9th Generation Intel(R) Core(TM) Processor Families; Intel(R) Pentium(R) Processor J, N, Silver and Gold Series; Intel(R) Celeron(R) Processor J, N, G3900 and G4900 Series; Intel(R) Atom(R) Processor A and E3900 Series; Intel(R) Xeon(R) Processor E3-1500 v5 and v6, E-2100 and E-2200 Processor Families; Intel(R) Graphics Driver for Windows before 26.20.100.6813 (DCH) or 26.20.100.6812 and before 21.20.x.5077 (aka15.45.5077), i915 Linux Driver for Intel(R) Processor Graphics before versions 5.4-rc7, 5.3.11, 4.19.84, 4.14.154, 4.9.201, 4.4.201 may allow an authenticated user to potentially enable escalation of privilege via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.82.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-0155",
"url": "https://www.suse.com/security/cve/CVE-2019-0155"
},
{
"category": "external",
"summary": "SUSE Bug 1135966 for CVE-2019-0155",
"url": "https://bugzilla.suse.com/1135966"
},
{
"category": "external",
"summary": "SUSE Bug 1135967 for CVE-2019-0155",
"url": "https://bugzilla.suse.com/1135967"
},
{
"category": "external",
"summary": "SUSE Bug 1173663 for CVE-2019-0155",
"url": "https://bugzilla.suse.com/1173663"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.82.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.82.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-14T05:53:54Z",
"details": "important"
}
],
"title": "CVE-2019-0155"
},
{
"cve": "CVE-2019-10220",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-10220"
}
],
"notes": [
{
"category": "general",
"text": "Linux kernel CIFS implementation, version 4.9.0 is vulnerable to a relative paths injection in directory entry lists.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.82.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-10220",
"url": "https://www.suse.com/security/cve/CVE-2019-10220"
},
{
"category": "external",
"summary": "SUSE Bug 1144903 for CVE-2019-10220",
"url": "https://bugzilla.suse.com/1144903"
},
{
"category": "external",
"summary": "SUSE Bug 1153108 for CVE-2019-10220",
"url": "https://bugzilla.suse.com/1153108"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.82.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.82.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-14T05:53:54Z",
"details": "moderate"
}
],
"title": "CVE-2019-10220"
},
{
"cve": "CVE-2019-11135",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11135"
}
],
"notes": [
{
"category": "general",
"text": "TSX Asynchronous Abort condition on some CPUs utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.82.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11135",
"url": "https://www.suse.com/security/cve/CVE-2019-11135"
},
{
"category": "external",
"summary": "SUSE Bug 1139073 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1139073"
},
{
"category": "external",
"summary": "SUSE Bug 1152497 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1152497"
},
{
"category": "external",
"summary": "SUSE Bug 1152505 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1152505"
},
{
"category": "external",
"summary": "SUSE Bug 1152506 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1152506"
},
{
"category": "external",
"summary": "SUSE Bug 1160120 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1160120"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1201877"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.82.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.82.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-14T05:53:54Z",
"details": "moderate"
}
],
"title": "CVE-2019-11135"
},
{
"cve": "CVE-2019-16231",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-16231"
}
],
"notes": [
{
"category": "general",
"text": "drivers/net/fjes/fjes_main.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.82.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-16231",
"url": "https://www.suse.com/security/cve/CVE-2019-16231"
},
{
"category": "external",
"summary": "SUSE Bug 1150466 for CVE-2019-16231",
"url": "https://bugzilla.suse.com/1150466"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.82.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.82.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-14T05:53:54Z",
"details": "moderate"
}
],
"title": "CVE-2019-16231"
},
{
"cve": "CVE-2019-16233",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-16233"
}
],
"notes": [
{
"category": "general",
"text": "drivers/scsi/qla2xxx/qla_os.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.82.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-16233",
"url": "https://www.suse.com/security/cve/CVE-2019-16233"
},
{
"category": "external",
"summary": "SUSE Bug 1150457 for CVE-2019-16233",
"url": "https://bugzilla.suse.com/1150457"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.82.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.82.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-14T05:53:54Z",
"details": "moderate"
}
],
"title": "CVE-2019-16233"
},
{
"cve": "CVE-2019-16995",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-16995"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel before 5.0.3, a memory leak exits in hsr_dev_finalize() in net/hsr/hsr_device.c if hsr_add_port fails to add a port, which may cause denial of service, aka CID-6caabe7f197d.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.82.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-16995",
"url": "https://www.suse.com/security/cve/CVE-2019-16995"
},
{
"category": "external",
"summary": "SUSE Bug 1152685 for CVE-2019-16995",
"url": "https://bugzilla.suse.com/1152685"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.82.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.82.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-14T05:53:54Z",
"details": "moderate"
}
],
"title": "CVE-2019-16995"
},
{
"cve": "CVE-2019-17055",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-17055"
}
],
"notes": [
{
"category": "general",
"text": "base_sock_create in drivers/isdn/mISDN/socket.c in the AF_ISDN network module in the Linux kernel through 5.3.2 does not enforce CAP_NET_RAW, which means that unprivileged users can create a raw socket, aka CID-b91ee4aa2a21.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.82.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-17055",
"url": "https://www.suse.com/security/cve/CVE-2019-17055"
},
{
"category": "external",
"summary": "SUSE Bug 1152782 for CVE-2019-17055",
"url": "https://bugzilla.suse.com/1152782"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.82.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.82.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-14T05:53:54Z",
"details": "moderate"
}
],
"title": "CVE-2019-17055"
},
{
"cve": "CVE-2019-18805",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-18805"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in net/ipv4/sysctl_net_ipv4.c in the Linux kernel before 5.0.11. There is a net/ipv4/tcp_input.c signed integer overflow in tcp_ack_update_rtt() when userspace writes a very large integer to /proc/sys/net/ipv4/tcp_min_rtt_wlen, leading to a denial of service or possibly unspecified other impact, aka CID-19fad20d15a6.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.82.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-18805",
"url": "https://www.suse.com/security/cve/CVE-2019-18805"
},
{
"category": "external",
"summary": "SUSE Bug 1156187 for CVE-2019-18805",
"url": "https://bugzilla.suse.com/1156187"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.82.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.82.1.noarch",
"openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.82.1.x86_64",
"openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.82.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-14T05:53:54Z",
"details": "low"
}
],
"title": "CVE-2019-18805"
}
]
}
opensuse-su-2024:11287-1
Vulnerability from csaf_opensuse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "qemu-6.1.0-32.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the qemu-6.1.0-32.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-11287",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_11287-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-0222 page",
"url": "https://www.suse.com/security/cve/CVE-2014-0222/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-8106 page",
"url": "https://www.suse.com/security/cve/CVE-2014-8106/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-5225 page",
"url": "https://www.suse.com/security/cve/CVE-2015-5225/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-6855 page",
"url": "https://www.suse.com/security/cve/CVE-2015-6855/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-8504 page",
"url": "https://www.suse.com/security/cve/CVE-2015-8504/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-8619 page",
"url": "https://www.suse.com/security/cve/CVE-2015-8619/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-10028 page",
"url": "https://www.suse.com/security/cve/CVE-2016-10028/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-10155 page",
"url": "https://www.suse.com/security/cve/CVE-2016-10155/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-1714 page",
"url": "https://www.suse.com/security/cve/CVE-2016-1714/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-6490 page",
"url": "https://www.suse.com/security/cve/CVE-2016-6490/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-6836 page",
"url": "https://www.suse.com/security/cve/CVE-2016-6836/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-7156 page",
"url": "https://www.suse.com/security/cve/CVE-2016-7156/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-7157 page",
"url": "https://www.suse.com/security/cve/CVE-2016-7157/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-7161 page",
"url": "https://www.suse.com/security/cve/CVE-2016-7161/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-7170 page",
"url": "https://www.suse.com/security/cve/CVE-2016-7170/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-7421 page",
"url": "https://www.suse.com/security/cve/CVE-2016-7421/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-7422 page",
"url": "https://www.suse.com/security/cve/CVE-2016-7422/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-7423 page",
"url": "https://www.suse.com/security/cve/CVE-2016-7423/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-7466 page",
"url": "https://www.suse.com/security/cve/CVE-2016-7466/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-7907 page",
"url": "https://www.suse.com/security/cve/CVE-2016-7907/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-7908 page",
"url": "https://www.suse.com/security/cve/CVE-2016-7908/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-7909 page",
"url": "https://www.suse.com/security/cve/CVE-2016-7909/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-7994 page",
"url": "https://www.suse.com/security/cve/CVE-2016-7994/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-7995 page",
"url": "https://www.suse.com/security/cve/CVE-2016-7995/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-8576 page",
"url": "https://www.suse.com/security/cve/CVE-2016-8576/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-8577 page",
"url": "https://www.suse.com/security/cve/CVE-2016-8577/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-8578 page",
"url": "https://www.suse.com/security/cve/CVE-2016-8578/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-8667 page",
"url": "https://www.suse.com/security/cve/CVE-2016-8667/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-8668 page",
"url": "https://www.suse.com/security/cve/CVE-2016-8668/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-8669 page",
"url": "https://www.suse.com/security/cve/CVE-2016-8669/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-8909 page",
"url": "https://www.suse.com/security/cve/CVE-2016-8909/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-8910 page",
"url": "https://www.suse.com/security/cve/CVE-2016-8910/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-9101 page",
"url": "https://www.suse.com/security/cve/CVE-2016-9101/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-9102 page",
"url": "https://www.suse.com/security/cve/CVE-2016-9102/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-9103 page",
"url": "https://www.suse.com/security/cve/CVE-2016-9103/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-9104 page",
"url": "https://www.suse.com/security/cve/CVE-2016-9104/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-9105 page",
"url": "https://www.suse.com/security/cve/CVE-2016-9105/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-9106 page",
"url": "https://www.suse.com/security/cve/CVE-2016-9106/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-9602 page",
"url": "https://www.suse.com/security/cve/CVE-2016-9602/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-9907 page",
"url": "https://www.suse.com/security/cve/CVE-2016-9907/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-9921 page",
"url": "https://www.suse.com/security/cve/CVE-2016-9921/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-10664 page",
"url": "https://www.suse.com/security/cve/CVE-2017-10664/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-10806 page",
"url": "https://www.suse.com/security/cve/CVE-2017-10806/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-11334 page",
"url": "https://www.suse.com/security/cve/CVE-2017-11334/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-11434 page",
"url": "https://www.suse.com/security/cve/CVE-2017-11434/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-13673 page",
"url": "https://www.suse.com/security/cve/CVE-2017-13673/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-13711 page",
"url": "https://www.suse.com/security/cve/CVE-2017-13711/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-14167 page",
"url": "https://www.suse.com/security/cve/CVE-2017-14167/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-15038 page",
"url": "https://www.suse.com/security/cve/CVE-2017-15038/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-15118 page",
"url": "https://www.suse.com/security/cve/CVE-2017-15118/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-15268 page",
"url": "https://www.suse.com/security/cve/CVE-2017-15268/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-15289 page",
"url": "https://www.suse.com/security/cve/CVE-2017-15289/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-2615 page",
"url": "https://www.suse.com/security/cve/CVE-2017-2615/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-2620 page",
"url": "https://www.suse.com/security/cve/CVE-2017-2620/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-2630 page",
"url": "https://www.suse.com/security/cve/CVE-2017-2630/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5525 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5525/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5526 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5526/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5552 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5552/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5578 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5578/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5579 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5579/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5667 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5667/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5715 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5715/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5856 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5856/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5857 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5857/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5898 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5898/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5973 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5973/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-6058 page",
"url": "https://www.suse.com/security/cve/CVE-2017-6058/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-7471 page",
"url": "https://www.suse.com/security/cve/CVE-2017-7471/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-7493 page",
"url": "https://www.suse.com/security/cve/CVE-2017-7493/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-8112 page",
"url": "https://www.suse.com/security/cve/CVE-2017-8112/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-8309 page",
"url": "https://www.suse.com/security/cve/CVE-2017-8309/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-8379 page",
"url": "https://www.suse.com/security/cve/CVE-2017-8379/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-8380 page",
"url": "https://www.suse.com/security/cve/CVE-2017-8380/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-9503 page",
"url": "https://www.suse.com/security/cve/CVE-2017-9503/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-9524 page",
"url": "https://www.suse.com/security/cve/CVE-2017-9524/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-10839 page",
"url": "https://www.suse.com/security/cve/CVE-2018-10839/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-11806 page",
"url": "https://www.suse.com/security/cve/CVE-2018-11806/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-12126 page",
"url": "https://www.suse.com/security/cve/CVE-2018-12126/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-12130 page",
"url": "https://www.suse.com/security/cve/CVE-2018-12130/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-12207 page",
"url": "https://www.suse.com/security/cve/CVE-2018-12207/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-15746 page",
"url": "https://www.suse.com/security/cve/CVE-2018-15746/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-16872 page",
"url": "https://www.suse.com/security/cve/CVE-2018-16872/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-17963 page",
"url": "https://www.suse.com/security/cve/CVE-2018-17963/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-20123 page",
"url": "https://www.suse.com/security/cve/CVE-2018-20123/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-20124 page",
"url": "https://www.suse.com/security/cve/CVE-2018-20124/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-20125 page",
"url": "https://www.suse.com/security/cve/CVE-2018-20125/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-20126 page",
"url": "https://www.suse.com/security/cve/CVE-2018-20126/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-20191 page",
"url": "https://www.suse.com/security/cve/CVE-2018-20191/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-20216 page",
"url": "https://www.suse.com/security/cve/CVE-2018-20216/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-20815 page",
"url": "https://www.suse.com/security/cve/CVE-2018-20815/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-3639 page",
"url": "https://www.suse.com/security/cve/CVE-2018-3639/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-7858 page",
"url": "https://www.suse.com/security/cve/CVE-2018-7858/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-03812 page",
"url": "https://www.suse.com/security/cve/CVE-2019-03812/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11135 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11135/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-12155 page",
"url": "https://www.suse.com/security/cve/CVE-2019-12155/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-13164 page",
"url": "https://www.suse.com/security/cve/CVE-2019-13164/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-14378 page",
"url": "https://www.suse.com/security/cve/CVE-2019-14378/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-15890 page",
"url": "https://www.suse.com/security/cve/CVE-2019-15890/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-6778 page",
"url": "https://www.suse.com/security/cve/CVE-2019-6778/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-8934 page",
"url": "https://www.suse.com/security/cve/CVE-2019-8934/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-9824 page",
"url": "https://www.suse.com/security/cve/CVE-2019-9824/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-10702 page",
"url": "https://www.suse.com/security/cve/CVE-2020-10702/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-10717 page",
"url": "https://www.suse.com/security/cve/CVE-2020-10717/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-10761 page",
"url": "https://www.suse.com/security/cve/CVE-2020-10761/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-11102 page",
"url": "https://www.suse.com/security/cve/CVE-2020-11102/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-11869 page",
"url": "https://www.suse.com/security/cve/CVE-2020-11869/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-13361 page",
"url": "https://www.suse.com/security/cve/CVE-2020-13361/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-13362 page",
"url": "https://www.suse.com/security/cve/CVE-2020-13362/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-13659 page",
"url": "https://www.suse.com/security/cve/CVE-2020-13659/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-13800 page",
"url": "https://www.suse.com/security/cve/CVE-2020-13800/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-14364 page",
"url": "https://www.suse.com/security/cve/CVE-2020-14364/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-16092 page",
"url": "https://www.suse.com/security/cve/CVE-2020-16092/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-1711 page",
"url": "https://www.suse.com/security/cve/CVE-2020-1711/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-17380 page",
"url": "https://www.suse.com/security/cve/CVE-2020-17380/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-1983 page",
"url": "https://www.suse.com/security/cve/CVE-2020-1983/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-25085 page",
"url": "https://www.suse.com/security/cve/CVE-2020-25085/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-25723 page",
"url": "https://www.suse.com/security/cve/CVE-2020-25723/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-27821 page",
"url": "https://www.suse.com/security/cve/CVE-2020-27821/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-29129 page",
"url": "https://www.suse.com/security/cve/CVE-2020-29129/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-7039 page",
"url": "https://www.suse.com/security/cve/CVE-2020-7039/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-8608 page",
"url": "https://www.suse.com/security/cve/CVE-2020-8608/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-20181 page",
"url": "https://www.suse.com/security/cve/CVE-2021-20181/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-20203 page",
"url": "https://www.suse.com/security/cve/CVE-2021-20203/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-20221 page",
"url": "https://www.suse.com/security/cve/CVE-2021-20221/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-20257 page",
"url": "https://www.suse.com/security/cve/CVE-2021-20257/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-20263 page",
"url": "https://www.suse.com/security/cve/CVE-2021-20263/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3416 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3416/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3527 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3527/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3544 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3544/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3545 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3545/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3546 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3546/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3582 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3582/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3607 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3607/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3608 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3608/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3682 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3682/"
}
],
"title": "qemu-6.1.0-32.1 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:11287-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "qemu-6.1.0-32.1.aarch64",
"product": {
"name": "qemu-6.1.0-32.1.aarch64",
"product_id": "qemu-6.1.0-32.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-accel-qtest-6.1.0-32.1.aarch64",
"product": {
"name": "qemu-accel-qtest-6.1.0-32.1.aarch64",
"product_id": "qemu-accel-qtest-6.1.0-32.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"product": {
"name": "qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"product_id": "qemu-accel-tcg-x86-6.1.0-32.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-arm-6.1.0-32.1.aarch64",
"product": {
"name": "qemu-arm-6.1.0-32.1.aarch64",
"product_id": "qemu-arm-6.1.0-32.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-audio-alsa-6.1.0-32.1.aarch64",
"product": {
"name": "qemu-audio-alsa-6.1.0-32.1.aarch64",
"product_id": "qemu-audio-alsa-6.1.0-32.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-audio-jack-6.1.0-32.1.aarch64",
"product": {
"name": "qemu-audio-jack-6.1.0-32.1.aarch64",
"product_id": "qemu-audio-jack-6.1.0-32.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-audio-pa-6.1.0-32.1.aarch64",
"product": {
"name": "qemu-audio-pa-6.1.0-32.1.aarch64",
"product_id": "qemu-audio-pa-6.1.0-32.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-audio-spice-6.1.0-32.1.aarch64",
"product": {
"name": "qemu-audio-spice-6.1.0-32.1.aarch64",
"product_id": "qemu-audio-spice-6.1.0-32.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-block-curl-6.1.0-32.1.aarch64",
"product": {
"name": "qemu-block-curl-6.1.0-32.1.aarch64",
"product_id": "qemu-block-curl-6.1.0-32.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-block-dmg-6.1.0-32.1.aarch64",
"product": {
"name": "qemu-block-dmg-6.1.0-32.1.aarch64",
"product_id": "qemu-block-dmg-6.1.0-32.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-block-gluster-6.1.0-32.1.aarch64",
"product": {
"name": "qemu-block-gluster-6.1.0-32.1.aarch64",
"product_id": "qemu-block-gluster-6.1.0-32.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-block-iscsi-6.1.0-32.1.aarch64",
"product": {
"name": "qemu-block-iscsi-6.1.0-32.1.aarch64",
"product_id": "qemu-block-iscsi-6.1.0-32.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-block-nfs-6.1.0-32.1.aarch64",
"product": {
"name": "qemu-block-nfs-6.1.0-32.1.aarch64",
"product_id": "qemu-block-nfs-6.1.0-32.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-block-rbd-6.1.0-32.1.aarch64",
"product": {
"name": "qemu-block-rbd-6.1.0-32.1.aarch64",
"product_id": "qemu-block-rbd-6.1.0-32.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-block-ssh-6.1.0-32.1.aarch64",
"product": {
"name": "qemu-block-ssh-6.1.0-32.1.aarch64",
"product_id": "qemu-block-ssh-6.1.0-32.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-chardev-baum-6.1.0-32.1.aarch64",
"product": {
"name": "qemu-chardev-baum-6.1.0-32.1.aarch64",
"product_id": "qemu-chardev-baum-6.1.0-32.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-chardev-spice-6.1.0-32.1.aarch64",
"product": {
"name": "qemu-chardev-spice-6.1.0-32.1.aarch64",
"product_id": "qemu-chardev-spice-6.1.0-32.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-extra-6.1.0-32.1.aarch64",
"product": {
"name": "qemu-extra-6.1.0-32.1.aarch64",
"product_id": "qemu-extra-6.1.0-32.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-guest-agent-6.1.0-32.1.aarch64",
"product": {
"name": "qemu-guest-agent-6.1.0-32.1.aarch64",
"product_id": "qemu-guest-agent-6.1.0-32.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"product": {
"name": "qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"product_id": "qemu-hw-display-qxl-6.1.0-32.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"product": {
"name": "qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"product_id": "qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"product": {
"name": "qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"product_id": "qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"product": {
"name": "qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"product_id": "qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"product": {
"name": "qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"product_id": "qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-hw-usb-host-6.1.0-32.1.aarch64",
"product": {
"name": "qemu-hw-usb-host-6.1.0-32.1.aarch64",
"product_id": "qemu-hw-usb-host-6.1.0-32.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"product": {
"name": "qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"product_id": "qemu-hw-usb-redirect-6.1.0-32.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"product": {
"name": "qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"product_id": "qemu-hw-usb-smartcard-6.1.0-32.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-ipxe-1.0.0+-32.1.aarch64",
"product": {
"name": "qemu-ipxe-1.0.0+-32.1.aarch64",
"product_id": "qemu-ipxe-1.0.0+-32.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"product": {
"name": "qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"product_id": "qemu-ivshmem-tools-6.1.0-32.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-ksm-6.1.0-32.1.aarch64",
"product": {
"name": "qemu-ksm-6.1.0-32.1.aarch64",
"product_id": "qemu-ksm-6.1.0-32.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-kvm-6.1.0-32.1.aarch64",
"product": {
"name": "qemu-kvm-6.1.0-32.1.aarch64",
"product_id": "qemu-kvm-6.1.0-32.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-lang-6.1.0-32.1.aarch64",
"product": {
"name": "qemu-lang-6.1.0-32.1.aarch64",
"product_id": "qemu-lang-6.1.0-32.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-microvm-6.1.0-32.1.aarch64",
"product": {
"name": "qemu-microvm-6.1.0-32.1.aarch64",
"product_id": "qemu-microvm-6.1.0-32.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-ppc-6.1.0-32.1.aarch64",
"product": {
"name": "qemu-ppc-6.1.0-32.1.aarch64",
"product_id": "qemu-ppc-6.1.0-32.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-s390x-6.1.0-32.1.aarch64",
"product": {
"name": "qemu-s390x-6.1.0-32.1.aarch64",
"product_id": "qemu-s390x-6.1.0-32.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"product": {
"name": "qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"product_id": "qemu-seabios-1.14.0_0_g155821a-32.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-sgabios-8-32.1.aarch64",
"product": {
"name": "qemu-sgabios-8-32.1.aarch64",
"product_id": "qemu-sgabios-8-32.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-skiboot-6.1.0-32.1.aarch64",
"product": {
"name": "qemu-skiboot-6.1.0-32.1.aarch64",
"product_id": "qemu-skiboot-6.1.0-32.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-tools-6.1.0-32.1.aarch64",
"product": {
"name": "qemu-tools-6.1.0-32.1.aarch64",
"product_id": "qemu-tools-6.1.0-32.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-ui-curses-6.1.0-32.1.aarch64",
"product": {
"name": "qemu-ui-curses-6.1.0-32.1.aarch64",
"product_id": "qemu-ui-curses-6.1.0-32.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-ui-gtk-6.1.0-32.1.aarch64",
"product": {
"name": "qemu-ui-gtk-6.1.0-32.1.aarch64",
"product_id": "qemu-ui-gtk-6.1.0-32.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-ui-opengl-6.1.0-32.1.aarch64",
"product": {
"name": "qemu-ui-opengl-6.1.0-32.1.aarch64",
"product_id": "qemu-ui-opengl-6.1.0-32.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-ui-spice-app-6.1.0-32.1.aarch64",
"product": {
"name": "qemu-ui-spice-app-6.1.0-32.1.aarch64",
"product_id": "qemu-ui-spice-app-6.1.0-32.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-ui-spice-core-6.1.0-32.1.aarch64",
"product": {
"name": "qemu-ui-spice-core-6.1.0-32.1.aarch64",
"product_id": "qemu-ui-spice-core-6.1.0-32.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"product": {
"name": "qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"product_id": "qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"product": {
"name": "qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"product_id": "qemu-vhost-user-gpu-6.1.0-32.1.aarch64"
}
},
{
"category": "product_version",
"name": "qemu-x86-6.1.0-32.1.aarch64",
"product": {
"name": "qemu-x86-6.1.0-32.1.aarch64",
"product_id": "qemu-x86-6.1.0-32.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-6.1.0-32.1.ppc64le",
"product": {
"name": "qemu-6.1.0-32.1.ppc64le",
"product_id": "qemu-6.1.0-32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-accel-qtest-6.1.0-32.1.ppc64le",
"product": {
"name": "qemu-accel-qtest-6.1.0-32.1.ppc64le",
"product_id": "qemu-accel-qtest-6.1.0-32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"product": {
"name": "qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"product_id": "qemu-accel-tcg-x86-6.1.0-32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-arm-6.1.0-32.1.ppc64le",
"product": {
"name": "qemu-arm-6.1.0-32.1.ppc64le",
"product_id": "qemu-arm-6.1.0-32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-audio-alsa-6.1.0-32.1.ppc64le",
"product": {
"name": "qemu-audio-alsa-6.1.0-32.1.ppc64le",
"product_id": "qemu-audio-alsa-6.1.0-32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-audio-jack-6.1.0-32.1.ppc64le",
"product": {
"name": "qemu-audio-jack-6.1.0-32.1.ppc64le",
"product_id": "qemu-audio-jack-6.1.0-32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-audio-pa-6.1.0-32.1.ppc64le",
"product": {
"name": "qemu-audio-pa-6.1.0-32.1.ppc64le",
"product_id": "qemu-audio-pa-6.1.0-32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-audio-spice-6.1.0-32.1.ppc64le",
"product": {
"name": "qemu-audio-spice-6.1.0-32.1.ppc64le",
"product_id": "qemu-audio-spice-6.1.0-32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-block-curl-6.1.0-32.1.ppc64le",
"product": {
"name": "qemu-block-curl-6.1.0-32.1.ppc64le",
"product_id": "qemu-block-curl-6.1.0-32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-block-dmg-6.1.0-32.1.ppc64le",
"product": {
"name": "qemu-block-dmg-6.1.0-32.1.ppc64le",
"product_id": "qemu-block-dmg-6.1.0-32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-block-gluster-6.1.0-32.1.ppc64le",
"product": {
"name": "qemu-block-gluster-6.1.0-32.1.ppc64le",
"product_id": "qemu-block-gluster-6.1.0-32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-block-iscsi-6.1.0-32.1.ppc64le",
"product": {
"name": "qemu-block-iscsi-6.1.0-32.1.ppc64le",
"product_id": "qemu-block-iscsi-6.1.0-32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-block-nfs-6.1.0-32.1.ppc64le",
"product": {
"name": "qemu-block-nfs-6.1.0-32.1.ppc64le",
"product_id": "qemu-block-nfs-6.1.0-32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-block-rbd-6.1.0-32.1.ppc64le",
"product": {
"name": "qemu-block-rbd-6.1.0-32.1.ppc64le",
"product_id": "qemu-block-rbd-6.1.0-32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-block-ssh-6.1.0-32.1.ppc64le",
"product": {
"name": "qemu-block-ssh-6.1.0-32.1.ppc64le",
"product_id": "qemu-block-ssh-6.1.0-32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-chardev-baum-6.1.0-32.1.ppc64le",
"product": {
"name": "qemu-chardev-baum-6.1.0-32.1.ppc64le",
"product_id": "qemu-chardev-baum-6.1.0-32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-chardev-spice-6.1.0-32.1.ppc64le",
"product": {
"name": "qemu-chardev-spice-6.1.0-32.1.ppc64le",
"product_id": "qemu-chardev-spice-6.1.0-32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-extra-6.1.0-32.1.ppc64le",
"product": {
"name": "qemu-extra-6.1.0-32.1.ppc64le",
"product_id": "qemu-extra-6.1.0-32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-guest-agent-6.1.0-32.1.ppc64le",
"product": {
"name": "qemu-guest-agent-6.1.0-32.1.ppc64le",
"product_id": "qemu-guest-agent-6.1.0-32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"product": {
"name": "qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"product_id": "qemu-hw-display-qxl-6.1.0-32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"product": {
"name": "qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"product_id": "qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"product": {
"name": "qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"product_id": "qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"product": {
"name": "qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"product_id": "qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"product": {
"name": "qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"product_id": "qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"product": {
"name": "qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"product_id": "qemu-hw-usb-host-6.1.0-32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"product": {
"name": "qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"product_id": "qemu-hw-usb-redirect-6.1.0-32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"product": {
"name": "qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"product_id": "qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-ipxe-1.0.0+-32.1.ppc64le",
"product": {
"name": "qemu-ipxe-1.0.0+-32.1.ppc64le",
"product_id": "qemu-ipxe-1.0.0+-32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"product": {
"name": "qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"product_id": "qemu-ivshmem-tools-6.1.0-32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-ksm-6.1.0-32.1.ppc64le",
"product": {
"name": "qemu-ksm-6.1.0-32.1.ppc64le",
"product_id": "qemu-ksm-6.1.0-32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-kvm-6.1.0-32.1.ppc64le",
"product": {
"name": "qemu-kvm-6.1.0-32.1.ppc64le",
"product_id": "qemu-kvm-6.1.0-32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-lang-6.1.0-32.1.ppc64le",
"product": {
"name": "qemu-lang-6.1.0-32.1.ppc64le",
"product_id": "qemu-lang-6.1.0-32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-microvm-6.1.0-32.1.ppc64le",
"product": {
"name": "qemu-microvm-6.1.0-32.1.ppc64le",
"product_id": "qemu-microvm-6.1.0-32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-ppc-6.1.0-32.1.ppc64le",
"product": {
"name": "qemu-ppc-6.1.0-32.1.ppc64le",
"product_id": "qemu-ppc-6.1.0-32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-s390x-6.1.0-32.1.ppc64le",
"product": {
"name": "qemu-s390x-6.1.0-32.1.ppc64le",
"product_id": "qemu-s390x-6.1.0-32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"product": {
"name": "qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"product_id": "qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-sgabios-8-32.1.ppc64le",
"product": {
"name": "qemu-sgabios-8-32.1.ppc64le",
"product_id": "qemu-sgabios-8-32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-skiboot-6.1.0-32.1.ppc64le",
"product": {
"name": "qemu-skiboot-6.1.0-32.1.ppc64le",
"product_id": "qemu-skiboot-6.1.0-32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-tools-6.1.0-32.1.ppc64le",
"product": {
"name": "qemu-tools-6.1.0-32.1.ppc64le",
"product_id": "qemu-tools-6.1.0-32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-ui-curses-6.1.0-32.1.ppc64le",
"product": {
"name": "qemu-ui-curses-6.1.0-32.1.ppc64le",
"product_id": "qemu-ui-curses-6.1.0-32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-ui-gtk-6.1.0-32.1.ppc64le",
"product": {
"name": "qemu-ui-gtk-6.1.0-32.1.ppc64le",
"product_id": "qemu-ui-gtk-6.1.0-32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-ui-opengl-6.1.0-32.1.ppc64le",
"product": {
"name": "qemu-ui-opengl-6.1.0-32.1.ppc64le",
"product_id": "qemu-ui-opengl-6.1.0-32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"product": {
"name": "qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"product_id": "qemu-ui-spice-app-6.1.0-32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"product": {
"name": "qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"product_id": "qemu-ui-spice-core-6.1.0-32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"product": {
"name": "qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"product_id": "qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"product": {
"name": "qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"product_id": "qemu-vhost-user-gpu-6.1.0-32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "qemu-x86-6.1.0-32.1.ppc64le",
"product": {
"name": "qemu-x86-6.1.0-32.1.ppc64le",
"product_id": "qemu-x86-6.1.0-32.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-6.1.0-32.1.s390x",
"product": {
"name": "qemu-6.1.0-32.1.s390x",
"product_id": "qemu-6.1.0-32.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-accel-qtest-6.1.0-32.1.s390x",
"product": {
"name": "qemu-accel-qtest-6.1.0-32.1.s390x",
"product_id": "qemu-accel-qtest-6.1.0-32.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"product": {
"name": "qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"product_id": "qemu-accel-tcg-x86-6.1.0-32.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-arm-6.1.0-32.1.s390x",
"product": {
"name": "qemu-arm-6.1.0-32.1.s390x",
"product_id": "qemu-arm-6.1.0-32.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-audio-alsa-6.1.0-32.1.s390x",
"product": {
"name": "qemu-audio-alsa-6.1.0-32.1.s390x",
"product_id": "qemu-audio-alsa-6.1.0-32.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-audio-jack-6.1.0-32.1.s390x",
"product": {
"name": "qemu-audio-jack-6.1.0-32.1.s390x",
"product_id": "qemu-audio-jack-6.1.0-32.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-audio-pa-6.1.0-32.1.s390x",
"product": {
"name": "qemu-audio-pa-6.1.0-32.1.s390x",
"product_id": "qemu-audio-pa-6.1.0-32.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-audio-spice-6.1.0-32.1.s390x",
"product": {
"name": "qemu-audio-spice-6.1.0-32.1.s390x",
"product_id": "qemu-audio-spice-6.1.0-32.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-block-curl-6.1.0-32.1.s390x",
"product": {
"name": "qemu-block-curl-6.1.0-32.1.s390x",
"product_id": "qemu-block-curl-6.1.0-32.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-block-dmg-6.1.0-32.1.s390x",
"product": {
"name": "qemu-block-dmg-6.1.0-32.1.s390x",
"product_id": "qemu-block-dmg-6.1.0-32.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-block-gluster-6.1.0-32.1.s390x",
"product": {
"name": "qemu-block-gluster-6.1.0-32.1.s390x",
"product_id": "qemu-block-gluster-6.1.0-32.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-block-iscsi-6.1.0-32.1.s390x",
"product": {
"name": "qemu-block-iscsi-6.1.0-32.1.s390x",
"product_id": "qemu-block-iscsi-6.1.0-32.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-block-nfs-6.1.0-32.1.s390x",
"product": {
"name": "qemu-block-nfs-6.1.0-32.1.s390x",
"product_id": "qemu-block-nfs-6.1.0-32.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-block-rbd-6.1.0-32.1.s390x",
"product": {
"name": "qemu-block-rbd-6.1.0-32.1.s390x",
"product_id": "qemu-block-rbd-6.1.0-32.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-block-ssh-6.1.0-32.1.s390x",
"product": {
"name": "qemu-block-ssh-6.1.0-32.1.s390x",
"product_id": "qemu-block-ssh-6.1.0-32.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-chardev-baum-6.1.0-32.1.s390x",
"product": {
"name": "qemu-chardev-baum-6.1.0-32.1.s390x",
"product_id": "qemu-chardev-baum-6.1.0-32.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-chardev-spice-6.1.0-32.1.s390x",
"product": {
"name": "qemu-chardev-spice-6.1.0-32.1.s390x",
"product_id": "qemu-chardev-spice-6.1.0-32.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-extra-6.1.0-32.1.s390x",
"product": {
"name": "qemu-extra-6.1.0-32.1.s390x",
"product_id": "qemu-extra-6.1.0-32.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-guest-agent-6.1.0-32.1.s390x",
"product": {
"name": "qemu-guest-agent-6.1.0-32.1.s390x",
"product_id": "qemu-guest-agent-6.1.0-32.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-hw-display-qxl-6.1.0-32.1.s390x",
"product": {
"name": "qemu-hw-display-qxl-6.1.0-32.1.s390x",
"product_id": "qemu-hw-display-qxl-6.1.0-32.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"product": {
"name": "qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"product_id": "qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"product": {
"name": "qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"product_id": "qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"product": {
"name": "qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"product_id": "qemu-hw-display-virtio-vga-6.1.0-32.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"product": {
"name": "qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"product_id": "qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-hw-usb-host-6.1.0-32.1.s390x",
"product": {
"name": "qemu-hw-usb-host-6.1.0-32.1.s390x",
"product_id": "qemu-hw-usb-host-6.1.0-32.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"product": {
"name": "qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"product_id": "qemu-hw-usb-redirect-6.1.0-32.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"product": {
"name": "qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"product_id": "qemu-hw-usb-smartcard-6.1.0-32.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-ipxe-1.0.0+-32.1.s390x",
"product": {
"name": "qemu-ipxe-1.0.0+-32.1.s390x",
"product_id": "qemu-ipxe-1.0.0+-32.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-ivshmem-tools-6.1.0-32.1.s390x",
"product": {
"name": "qemu-ivshmem-tools-6.1.0-32.1.s390x",
"product_id": "qemu-ivshmem-tools-6.1.0-32.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-ksm-6.1.0-32.1.s390x",
"product": {
"name": "qemu-ksm-6.1.0-32.1.s390x",
"product_id": "qemu-ksm-6.1.0-32.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-kvm-6.1.0-32.1.s390x",
"product": {
"name": "qemu-kvm-6.1.0-32.1.s390x",
"product_id": "qemu-kvm-6.1.0-32.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-lang-6.1.0-32.1.s390x",
"product": {
"name": "qemu-lang-6.1.0-32.1.s390x",
"product_id": "qemu-lang-6.1.0-32.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-microvm-6.1.0-32.1.s390x",
"product": {
"name": "qemu-microvm-6.1.0-32.1.s390x",
"product_id": "qemu-microvm-6.1.0-32.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-ppc-6.1.0-32.1.s390x",
"product": {
"name": "qemu-ppc-6.1.0-32.1.s390x",
"product_id": "qemu-ppc-6.1.0-32.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-s390x-6.1.0-32.1.s390x",
"product": {
"name": "qemu-s390x-6.1.0-32.1.s390x",
"product_id": "qemu-s390x-6.1.0-32.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"product": {
"name": "qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"product_id": "qemu-seabios-1.14.0_0_g155821a-32.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-sgabios-8-32.1.s390x",
"product": {
"name": "qemu-sgabios-8-32.1.s390x",
"product_id": "qemu-sgabios-8-32.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-skiboot-6.1.0-32.1.s390x",
"product": {
"name": "qemu-skiboot-6.1.0-32.1.s390x",
"product_id": "qemu-skiboot-6.1.0-32.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-tools-6.1.0-32.1.s390x",
"product": {
"name": "qemu-tools-6.1.0-32.1.s390x",
"product_id": "qemu-tools-6.1.0-32.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-ui-curses-6.1.0-32.1.s390x",
"product": {
"name": "qemu-ui-curses-6.1.0-32.1.s390x",
"product_id": "qemu-ui-curses-6.1.0-32.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-ui-gtk-6.1.0-32.1.s390x",
"product": {
"name": "qemu-ui-gtk-6.1.0-32.1.s390x",
"product_id": "qemu-ui-gtk-6.1.0-32.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-ui-opengl-6.1.0-32.1.s390x",
"product": {
"name": "qemu-ui-opengl-6.1.0-32.1.s390x",
"product_id": "qemu-ui-opengl-6.1.0-32.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-ui-spice-app-6.1.0-32.1.s390x",
"product": {
"name": "qemu-ui-spice-app-6.1.0-32.1.s390x",
"product_id": "qemu-ui-spice-app-6.1.0-32.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-ui-spice-core-6.1.0-32.1.s390x",
"product": {
"name": "qemu-ui-spice-core-6.1.0-32.1.s390x",
"product_id": "qemu-ui-spice-core-6.1.0-32.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"product": {
"name": "qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"product_id": "qemu-vgabios-1.14.0_0_g155821a-32.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"product": {
"name": "qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"product_id": "qemu-vhost-user-gpu-6.1.0-32.1.s390x"
}
},
{
"category": "product_version",
"name": "qemu-x86-6.1.0-32.1.s390x",
"product": {
"name": "qemu-x86-6.1.0-32.1.s390x",
"product_id": "qemu-x86-6.1.0-32.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "qemu-6.1.0-32.1.x86_64",
"product": {
"name": "qemu-6.1.0-32.1.x86_64",
"product_id": "qemu-6.1.0-32.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-accel-qtest-6.1.0-32.1.x86_64",
"product": {
"name": "qemu-accel-qtest-6.1.0-32.1.x86_64",
"product_id": "qemu-accel-qtest-6.1.0-32.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"product": {
"name": "qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"product_id": "qemu-accel-tcg-x86-6.1.0-32.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-arm-6.1.0-32.1.x86_64",
"product": {
"name": "qemu-arm-6.1.0-32.1.x86_64",
"product_id": "qemu-arm-6.1.0-32.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-audio-alsa-6.1.0-32.1.x86_64",
"product": {
"name": "qemu-audio-alsa-6.1.0-32.1.x86_64",
"product_id": "qemu-audio-alsa-6.1.0-32.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-audio-jack-6.1.0-32.1.x86_64",
"product": {
"name": "qemu-audio-jack-6.1.0-32.1.x86_64",
"product_id": "qemu-audio-jack-6.1.0-32.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-audio-pa-6.1.0-32.1.x86_64",
"product": {
"name": "qemu-audio-pa-6.1.0-32.1.x86_64",
"product_id": "qemu-audio-pa-6.1.0-32.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-audio-spice-6.1.0-32.1.x86_64",
"product": {
"name": "qemu-audio-spice-6.1.0-32.1.x86_64",
"product_id": "qemu-audio-spice-6.1.0-32.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-block-curl-6.1.0-32.1.x86_64",
"product": {
"name": "qemu-block-curl-6.1.0-32.1.x86_64",
"product_id": "qemu-block-curl-6.1.0-32.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-block-dmg-6.1.0-32.1.x86_64",
"product": {
"name": "qemu-block-dmg-6.1.0-32.1.x86_64",
"product_id": "qemu-block-dmg-6.1.0-32.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-block-gluster-6.1.0-32.1.x86_64",
"product": {
"name": "qemu-block-gluster-6.1.0-32.1.x86_64",
"product_id": "qemu-block-gluster-6.1.0-32.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-block-iscsi-6.1.0-32.1.x86_64",
"product": {
"name": "qemu-block-iscsi-6.1.0-32.1.x86_64",
"product_id": "qemu-block-iscsi-6.1.0-32.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-block-nfs-6.1.0-32.1.x86_64",
"product": {
"name": "qemu-block-nfs-6.1.0-32.1.x86_64",
"product_id": "qemu-block-nfs-6.1.0-32.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-block-rbd-6.1.0-32.1.x86_64",
"product": {
"name": "qemu-block-rbd-6.1.0-32.1.x86_64",
"product_id": "qemu-block-rbd-6.1.0-32.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-block-ssh-6.1.0-32.1.x86_64",
"product": {
"name": "qemu-block-ssh-6.1.0-32.1.x86_64",
"product_id": "qemu-block-ssh-6.1.0-32.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-chardev-baum-6.1.0-32.1.x86_64",
"product": {
"name": "qemu-chardev-baum-6.1.0-32.1.x86_64",
"product_id": "qemu-chardev-baum-6.1.0-32.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-chardev-spice-6.1.0-32.1.x86_64",
"product": {
"name": "qemu-chardev-spice-6.1.0-32.1.x86_64",
"product_id": "qemu-chardev-spice-6.1.0-32.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-extra-6.1.0-32.1.x86_64",
"product": {
"name": "qemu-extra-6.1.0-32.1.x86_64",
"product_id": "qemu-extra-6.1.0-32.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-guest-agent-6.1.0-32.1.x86_64",
"product": {
"name": "qemu-guest-agent-6.1.0-32.1.x86_64",
"product_id": "qemu-guest-agent-6.1.0-32.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"product": {
"name": "qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"product_id": "qemu-hw-display-qxl-6.1.0-32.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"product": {
"name": "qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"product_id": "qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"product": {
"name": "qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"product_id": "qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"product": {
"name": "qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"product_id": "qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"product": {
"name": "qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"product_id": "qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-hw-usb-host-6.1.0-32.1.x86_64",
"product": {
"name": "qemu-hw-usb-host-6.1.0-32.1.x86_64",
"product_id": "qemu-hw-usb-host-6.1.0-32.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"product": {
"name": "qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"product_id": "qemu-hw-usb-redirect-6.1.0-32.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"product": {
"name": "qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"product_id": "qemu-hw-usb-smartcard-6.1.0-32.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-ipxe-1.0.0+-32.1.x86_64",
"product": {
"name": "qemu-ipxe-1.0.0+-32.1.x86_64",
"product_id": "qemu-ipxe-1.0.0+-32.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"product": {
"name": "qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"product_id": "qemu-ivshmem-tools-6.1.0-32.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-ksm-6.1.0-32.1.x86_64",
"product": {
"name": "qemu-ksm-6.1.0-32.1.x86_64",
"product_id": "qemu-ksm-6.1.0-32.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-kvm-6.1.0-32.1.x86_64",
"product": {
"name": "qemu-kvm-6.1.0-32.1.x86_64",
"product_id": "qemu-kvm-6.1.0-32.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-lang-6.1.0-32.1.x86_64",
"product": {
"name": "qemu-lang-6.1.0-32.1.x86_64",
"product_id": "qemu-lang-6.1.0-32.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-microvm-6.1.0-32.1.x86_64",
"product": {
"name": "qemu-microvm-6.1.0-32.1.x86_64",
"product_id": "qemu-microvm-6.1.0-32.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-ppc-6.1.0-32.1.x86_64",
"product": {
"name": "qemu-ppc-6.1.0-32.1.x86_64",
"product_id": "qemu-ppc-6.1.0-32.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-s390x-6.1.0-32.1.x86_64",
"product": {
"name": "qemu-s390x-6.1.0-32.1.x86_64",
"product_id": "qemu-s390x-6.1.0-32.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"product": {
"name": "qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"product_id": "qemu-seabios-1.14.0_0_g155821a-32.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-sgabios-8-32.1.x86_64",
"product": {
"name": "qemu-sgabios-8-32.1.x86_64",
"product_id": "qemu-sgabios-8-32.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-skiboot-6.1.0-32.1.x86_64",
"product": {
"name": "qemu-skiboot-6.1.0-32.1.x86_64",
"product_id": "qemu-skiboot-6.1.0-32.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-tools-6.1.0-32.1.x86_64",
"product": {
"name": "qemu-tools-6.1.0-32.1.x86_64",
"product_id": "qemu-tools-6.1.0-32.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-ui-curses-6.1.0-32.1.x86_64",
"product": {
"name": "qemu-ui-curses-6.1.0-32.1.x86_64",
"product_id": "qemu-ui-curses-6.1.0-32.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-ui-gtk-6.1.0-32.1.x86_64",
"product": {
"name": "qemu-ui-gtk-6.1.0-32.1.x86_64",
"product_id": "qemu-ui-gtk-6.1.0-32.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-ui-opengl-6.1.0-32.1.x86_64",
"product": {
"name": "qemu-ui-opengl-6.1.0-32.1.x86_64",
"product_id": "qemu-ui-opengl-6.1.0-32.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-ui-spice-app-6.1.0-32.1.x86_64",
"product": {
"name": "qemu-ui-spice-app-6.1.0-32.1.x86_64",
"product_id": "qemu-ui-spice-app-6.1.0-32.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-ui-spice-core-6.1.0-32.1.x86_64",
"product": {
"name": "qemu-ui-spice-core-6.1.0-32.1.x86_64",
"product_id": "qemu-ui-spice-core-6.1.0-32.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"product": {
"name": "qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"product_id": "qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"product": {
"name": "qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"product_id": "qemu-vhost-user-gpu-6.1.0-32.1.x86_64"
}
},
{
"category": "product_version",
"name": "qemu-x86-6.1.0-32.1.x86_64",
"product": {
"name": "qemu-x86-6.1.0-32.1.x86_64",
"product_id": "qemu-x86-6.1.0-32.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-6.1.0-32.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64"
},
"product_reference": "qemu-6.1.0-32.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-6.1.0-32.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le"
},
"product_reference": "qemu-6.1.0-32.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-6.1.0-32.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x"
},
"product_reference": "qemu-6.1.0-32.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-6.1.0-32.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64"
},
"product_reference": "qemu-6.1.0-32.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-accel-qtest-6.1.0-32.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64"
},
"product_reference": "qemu-accel-qtest-6.1.0-32.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-accel-qtest-6.1.0-32.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le"
},
"product_reference": "qemu-accel-qtest-6.1.0-32.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-accel-qtest-6.1.0-32.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x"
},
"product_reference": "qemu-accel-qtest-6.1.0-32.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-accel-qtest-6.1.0-32.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64"
},
"product_reference": "qemu-accel-qtest-6.1.0-32.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-accel-tcg-x86-6.1.0-32.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64"
},
"product_reference": "qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-accel-tcg-x86-6.1.0-32.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le"
},
"product_reference": "qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-accel-tcg-x86-6.1.0-32.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x"
},
"product_reference": "qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-accel-tcg-x86-6.1.0-32.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64"
},
"product_reference": "qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-arm-6.1.0-32.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64"
},
"product_reference": "qemu-arm-6.1.0-32.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-arm-6.1.0-32.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le"
},
"product_reference": "qemu-arm-6.1.0-32.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-arm-6.1.0-32.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x"
},
"product_reference": "qemu-arm-6.1.0-32.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-arm-6.1.0-32.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64"
},
"product_reference": "qemu-arm-6.1.0-32.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-audio-alsa-6.1.0-32.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64"
},
"product_reference": "qemu-audio-alsa-6.1.0-32.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-audio-alsa-6.1.0-32.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le"
},
"product_reference": "qemu-audio-alsa-6.1.0-32.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-audio-alsa-6.1.0-32.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x"
},
"product_reference": "qemu-audio-alsa-6.1.0-32.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-audio-alsa-6.1.0-32.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64"
},
"product_reference": "qemu-audio-alsa-6.1.0-32.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-audio-jack-6.1.0-32.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64"
},
"product_reference": "qemu-audio-jack-6.1.0-32.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-audio-jack-6.1.0-32.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le"
},
"product_reference": "qemu-audio-jack-6.1.0-32.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-audio-jack-6.1.0-32.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x"
},
"product_reference": "qemu-audio-jack-6.1.0-32.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-audio-jack-6.1.0-32.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64"
},
"product_reference": "qemu-audio-jack-6.1.0-32.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-audio-pa-6.1.0-32.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64"
},
"product_reference": "qemu-audio-pa-6.1.0-32.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-audio-pa-6.1.0-32.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le"
},
"product_reference": "qemu-audio-pa-6.1.0-32.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-audio-pa-6.1.0-32.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x"
},
"product_reference": "qemu-audio-pa-6.1.0-32.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-audio-pa-6.1.0-32.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64"
},
"product_reference": "qemu-audio-pa-6.1.0-32.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-audio-spice-6.1.0-32.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64"
},
"product_reference": "qemu-audio-spice-6.1.0-32.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-audio-spice-6.1.0-32.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le"
},
"product_reference": "qemu-audio-spice-6.1.0-32.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-audio-spice-6.1.0-32.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x"
},
"product_reference": "qemu-audio-spice-6.1.0-32.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-audio-spice-6.1.0-32.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64"
},
"product_reference": "qemu-audio-spice-6.1.0-32.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-6.1.0-32.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64"
},
"product_reference": "qemu-block-curl-6.1.0-32.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-6.1.0-32.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le"
},
"product_reference": "qemu-block-curl-6.1.0-32.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-6.1.0-32.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x"
},
"product_reference": "qemu-block-curl-6.1.0-32.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-curl-6.1.0-32.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64"
},
"product_reference": "qemu-block-curl-6.1.0-32.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-dmg-6.1.0-32.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64"
},
"product_reference": "qemu-block-dmg-6.1.0-32.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-dmg-6.1.0-32.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le"
},
"product_reference": "qemu-block-dmg-6.1.0-32.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-dmg-6.1.0-32.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x"
},
"product_reference": "qemu-block-dmg-6.1.0-32.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-dmg-6.1.0-32.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64"
},
"product_reference": "qemu-block-dmg-6.1.0-32.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-gluster-6.1.0-32.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64"
},
"product_reference": "qemu-block-gluster-6.1.0-32.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-gluster-6.1.0-32.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le"
},
"product_reference": "qemu-block-gluster-6.1.0-32.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-gluster-6.1.0-32.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x"
},
"product_reference": "qemu-block-gluster-6.1.0-32.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-gluster-6.1.0-32.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64"
},
"product_reference": "qemu-block-gluster-6.1.0-32.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-iscsi-6.1.0-32.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64"
},
"product_reference": "qemu-block-iscsi-6.1.0-32.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-iscsi-6.1.0-32.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le"
},
"product_reference": "qemu-block-iscsi-6.1.0-32.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-iscsi-6.1.0-32.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x"
},
"product_reference": "qemu-block-iscsi-6.1.0-32.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-iscsi-6.1.0-32.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64"
},
"product_reference": "qemu-block-iscsi-6.1.0-32.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-nfs-6.1.0-32.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64"
},
"product_reference": "qemu-block-nfs-6.1.0-32.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-nfs-6.1.0-32.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le"
},
"product_reference": "qemu-block-nfs-6.1.0-32.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-nfs-6.1.0-32.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x"
},
"product_reference": "qemu-block-nfs-6.1.0-32.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-nfs-6.1.0-32.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64"
},
"product_reference": "qemu-block-nfs-6.1.0-32.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-rbd-6.1.0-32.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64"
},
"product_reference": "qemu-block-rbd-6.1.0-32.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-rbd-6.1.0-32.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le"
},
"product_reference": "qemu-block-rbd-6.1.0-32.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-rbd-6.1.0-32.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x"
},
"product_reference": "qemu-block-rbd-6.1.0-32.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-rbd-6.1.0-32.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64"
},
"product_reference": "qemu-block-rbd-6.1.0-32.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-ssh-6.1.0-32.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64"
},
"product_reference": "qemu-block-ssh-6.1.0-32.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-ssh-6.1.0-32.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le"
},
"product_reference": "qemu-block-ssh-6.1.0-32.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-ssh-6.1.0-32.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x"
},
"product_reference": "qemu-block-ssh-6.1.0-32.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-block-ssh-6.1.0-32.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64"
},
"product_reference": "qemu-block-ssh-6.1.0-32.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-chardev-baum-6.1.0-32.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64"
},
"product_reference": "qemu-chardev-baum-6.1.0-32.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-chardev-baum-6.1.0-32.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le"
},
"product_reference": "qemu-chardev-baum-6.1.0-32.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-chardev-baum-6.1.0-32.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x"
},
"product_reference": "qemu-chardev-baum-6.1.0-32.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-chardev-baum-6.1.0-32.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64"
},
"product_reference": "qemu-chardev-baum-6.1.0-32.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-chardev-spice-6.1.0-32.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64"
},
"product_reference": "qemu-chardev-spice-6.1.0-32.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-chardev-spice-6.1.0-32.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le"
},
"product_reference": "qemu-chardev-spice-6.1.0-32.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-chardev-spice-6.1.0-32.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x"
},
"product_reference": "qemu-chardev-spice-6.1.0-32.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-chardev-spice-6.1.0-32.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64"
},
"product_reference": "qemu-chardev-spice-6.1.0-32.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-extra-6.1.0-32.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64"
},
"product_reference": "qemu-extra-6.1.0-32.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-extra-6.1.0-32.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le"
},
"product_reference": "qemu-extra-6.1.0-32.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-extra-6.1.0-32.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x"
},
"product_reference": "qemu-extra-6.1.0-32.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-extra-6.1.0-32.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64"
},
"product_reference": "qemu-extra-6.1.0-32.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-6.1.0-32.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64"
},
"product_reference": "qemu-guest-agent-6.1.0-32.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-6.1.0-32.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le"
},
"product_reference": "qemu-guest-agent-6.1.0-32.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-6.1.0-32.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x"
},
"product_reference": "qemu-guest-agent-6.1.0-32.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-guest-agent-6.1.0-32.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64"
},
"product_reference": "qemu-guest-agent-6.1.0-32.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-hw-display-qxl-6.1.0-32.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64"
},
"product_reference": "qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-hw-display-qxl-6.1.0-32.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le"
},
"product_reference": "qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-hw-display-qxl-6.1.0-32.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x"
},
"product_reference": "qemu-hw-display-qxl-6.1.0-32.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-hw-display-qxl-6.1.0-32.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64"
},
"product_reference": "qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64"
},
"product_reference": "qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le"
},
"product_reference": "qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x"
},
"product_reference": "qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64"
},
"product_reference": "qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64"
},
"product_reference": "qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le"
},
"product_reference": "qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x"
},
"product_reference": "qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64"
},
"product_reference": "qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64"
},
"product_reference": "qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le"
},
"product_reference": "qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-hw-display-virtio-vga-6.1.0-32.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x"
},
"product_reference": "qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64"
},
"product_reference": "qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64"
},
"product_reference": "qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le"
},
"product_reference": "qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x"
},
"product_reference": "qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64"
},
"product_reference": "qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-hw-usb-host-6.1.0-32.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64"
},
"product_reference": "qemu-hw-usb-host-6.1.0-32.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-hw-usb-host-6.1.0-32.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le"
},
"product_reference": "qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-hw-usb-host-6.1.0-32.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x"
},
"product_reference": "qemu-hw-usb-host-6.1.0-32.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-hw-usb-host-6.1.0-32.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64"
},
"product_reference": "qemu-hw-usb-host-6.1.0-32.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-hw-usb-redirect-6.1.0-32.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64"
},
"product_reference": "qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-hw-usb-redirect-6.1.0-32.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le"
},
"product_reference": "qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-hw-usb-redirect-6.1.0-32.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x"
},
"product_reference": "qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-hw-usb-redirect-6.1.0-32.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64"
},
"product_reference": "qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-hw-usb-smartcard-6.1.0-32.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64"
},
"product_reference": "qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le"
},
"product_reference": "qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-hw-usb-smartcard-6.1.0-32.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x"
},
"product_reference": "qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-hw-usb-smartcard-6.1.0-32.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64"
},
"product_reference": "qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ipxe-1.0.0+-32.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64"
},
"product_reference": "qemu-ipxe-1.0.0+-32.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ipxe-1.0.0+-32.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le"
},
"product_reference": "qemu-ipxe-1.0.0+-32.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ipxe-1.0.0+-32.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x"
},
"product_reference": "qemu-ipxe-1.0.0+-32.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ipxe-1.0.0+-32.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64"
},
"product_reference": "qemu-ipxe-1.0.0+-32.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ivshmem-tools-6.1.0-32.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64"
},
"product_reference": "qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ivshmem-tools-6.1.0-32.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le"
},
"product_reference": "qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ivshmem-tools-6.1.0-32.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x"
},
"product_reference": "qemu-ivshmem-tools-6.1.0-32.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ivshmem-tools-6.1.0-32.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64"
},
"product_reference": "qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ksm-6.1.0-32.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64"
},
"product_reference": "qemu-ksm-6.1.0-32.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ksm-6.1.0-32.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le"
},
"product_reference": "qemu-ksm-6.1.0-32.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ksm-6.1.0-32.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x"
},
"product_reference": "qemu-ksm-6.1.0-32.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ksm-6.1.0-32.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64"
},
"product_reference": "qemu-ksm-6.1.0-32.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-6.1.0-32.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64"
},
"product_reference": "qemu-kvm-6.1.0-32.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-6.1.0-32.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le"
},
"product_reference": "qemu-kvm-6.1.0-32.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-6.1.0-32.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x"
},
"product_reference": "qemu-kvm-6.1.0-32.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-kvm-6.1.0-32.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64"
},
"product_reference": "qemu-kvm-6.1.0-32.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-6.1.0-32.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64"
},
"product_reference": "qemu-lang-6.1.0-32.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-6.1.0-32.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le"
},
"product_reference": "qemu-lang-6.1.0-32.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-6.1.0-32.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x"
},
"product_reference": "qemu-lang-6.1.0-32.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-lang-6.1.0-32.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64"
},
"product_reference": "qemu-lang-6.1.0-32.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-microvm-6.1.0-32.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64"
},
"product_reference": "qemu-microvm-6.1.0-32.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-microvm-6.1.0-32.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le"
},
"product_reference": "qemu-microvm-6.1.0-32.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-microvm-6.1.0-32.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x"
},
"product_reference": "qemu-microvm-6.1.0-32.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-microvm-6.1.0-32.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64"
},
"product_reference": "qemu-microvm-6.1.0-32.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ppc-6.1.0-32.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64"
},
"product_reference": "qemu-ppc-6.1.0-32.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ppc-6.1.0-32.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le"
},
"product_reference": "qemu-ppc-6.1.0-32.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ppc-6.1.0-32.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x"
},
"product_reference": "qemu-ppc-6.1.0-32.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ppc-6.1.0-32.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64"
},
"product_reference": "qemu-ppc-6.1.0-32.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-s390x-6.1.0-32.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64"
},
"product_reference": "qemu-s390x-6.1.0-32.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-s390x-6.1.0-32.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le"
},
"product_reference": "qemu-s390x-6.1.0-32.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-s390x-6.1.0-32.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x"
},
"product_reference": "qemu-s390x-6.1.0-32.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-s390x-6.1.0-32.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64"
},
"product_reference": "qemu-s390x-6.1.0-32.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-seabios-1.14.0_0_g155821a-32.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64"
},
"product_reference": "qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le"
},
"product_reference": "qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-seabios-1.14.0_0_g155821a-32.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x"
},
"product_reference": "qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-seabios-1.14.0_0_g155821a-32.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64"
},
"product_reference": "qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-sgabios-8-32.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64"
},
"product_reference": "qemu-sgabios-8-32.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-sgabios-8-32.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le"
},
"product_reference": "qemu-sgabios-8-32.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-sgabios-8-32.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x"
},
"product_reference": "qemu-sgabios-8-32.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-sgabios-8-32.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64"
},
"product_reference": "qemu-sgabios-8-32.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-skiboot-6.1.0-32.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64"
},
"product_reference": "qemu-skiboot-6.1.0-32.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-skiboot-6.1.0-32.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le"
},
"product_reference": "qemu-skiboot-6.1.0-32.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-skiboot-6.1.0-32.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x"
},
"product_reference": "qemu-skiboot-6.1.0-32.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-skiboot-6.1.0-32.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64"
},
"product_reference": "qemu-skiboot-6.1.0-32.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-6.1.0-32.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64"
},
"product_reference": "qemu-tools-6.1.0-32.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-6.1.0-32.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le"
},
"product_reference": "qemu-tools-6.1.0-32.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-6.1.0-32.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x"
},
"product_reference": "qemu-tools-6.1.0-32.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-tools-6.1.0-32.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64"
},
"product_reference": "qemu-tools-6.1.0-32.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ui-curses-6.1.0-32.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64"
},
"product_reference": "qemu-ui-curses-6.1.0-32.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ui-curses-6.1.0-32.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le"
},
"product_reference": "qemu-ui-curses-6.1.0-32.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ui-curses-6.1.0-32.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x"
},
"product_reference": "qemu-ui-curses-6.1.0-32.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ui-curses-6.1.0-32.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64"
},
"product_reference": "qemu-ui-curses-6.1.0-32.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ui-gtk-6.1.0-32.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64"
},
"product_reference": "qemu-ui-gtk-6.1.0-32.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ui-gtk-6.1.0-32.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le"
},
"product_reference": "qemu-ui-gtk-6.1.0-32.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ui-gtk-6.1.0-32.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x"
},
"product_reference": "qemu-ui-gtk-6.1.0-32.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ui-gtk-6.1.0-32.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64"
},
"product_reference": "qemu-ui-gtk-6.1.0-32.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ui-opengl-6.1.0-32.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64"
},
"product_reference": "qemu-ui-opengl-6.1.0-32.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ui-opengl-6.1.0-32.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le"
},
"product_reference": "qemu-ui-opengl-6.1.0-32.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ui-opengl-6.1.0-32.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x"
},
"product_reference": "qemu-ui-opengl-6.1.0-32.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ui-opengl-6.1.0-32.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64"
},
"product_reference": "qemu-ui-opengl-6.1.0-32.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ui-spice-app-6.1.0-32.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64"
},
"product_reference": "qemu-ui-spice-app-6.1.0-32.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ui-spice-app-6.1.0-32.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le"
},
"product_reference": "qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ui-spice-app-6.1.0-32.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x"
},
"product_reference": "qemu-ui-spice-app-6.1.0-32.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ui-spice-app-6.1.0-32.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64"
},
"product_reference": "qemu-ui-spice-app-6.1.0-32.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ui-spice-core-6.1.0-32.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64"
},
"product_reference": "qemu-ui-spice-core-6.1.0-32.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ui-spice-core-6.1.0-32.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le"
},
"product_reference": "qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ui-spice-core-6.1.0-32.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x"
},
"product_reference": "qemu-ui-spice-core-6.1.0-32.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-ui-spice-core-6.1.0-32.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64"
},
"product_reference": "qemu-ui-spice-core-6.1.0-32.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64"
},
"product_reference": "qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le"
},
"product_reference": "qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-vgabios-1.14.0_0_g155821a-32.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x"
},
"product_reference": "qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64"
},
"product_reference": "qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-vhost-user-gpu-6.1.0-32.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64"
},
"product_reference": "qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-vhost-user-gpu-6.1.0-32.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le"
},
"product_reference": "qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-vhost-user-gpu-6.1.0-32.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x"
},
"product_reference": "qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-vhost-user-gpu-6.1.0-32.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64"
},
"product_reference": "qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-x86-6.1.0-32.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64"
},
"product_reference": "qemu-x86-6.1.0-32.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-x86-6.1.0-32.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le"
},
"product_reference": "qemu-x86-6.1.0-32.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-x86-6.1.0-32.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x"
},
"product_reference": "qemu-x86-6.1.0-32.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qemu-x86-6.1.0-32.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
},
"product_reference": "qemu-x86-6.1.0-32.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2014-0222",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-0222"
}
],
"notes": [
{
"category": "general",
"text": "Integer overflow in the qcow_open function in block/qcow.c in QEMU before 1.7.2 allows remote attackers to cause a denial of service (crash) via a large L2 table in a QCOW version 1 image.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-0222",
"url": "https://www.suse.com/security/cve/CVE-2014-0222"
},
{
"category": "external",
"summary": "SUSE Bug 1072223 for CVE-2014-0222",
"url": "https://bugzilla.suse.com/1072223"
},
{
"category": "external",
"summary": "SUSE Bug 877642 for CVE-2014-0222",
"url": "https://bugzilla.suse.com/877642"
},
{
"category": "external",
"summary": "SUSE Bug 950367 for CVE-2014-0222",
"url": "https://bugzilla.suse.com/950367"
},
{
"category": "external",
"summary": "SUSE Bug 964925 for CVE-2014-0222",
"url": "https://bugzilla.suse.com/964925"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2014-0222"
},
{
"cve": "CVE-2014-8106",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-8106"
}
],
"notes": [
{
"category": "general",
"text": "Heap-based buffer overflow in the Cirrus VGA emulator (hw/display/cirrus_vga.c) in QEMU before 2.2.0 allows local guest users to execute arbitrary code via vectors related to blit regions. NOTE: this vulnerability exists because an incomplete fix for CVE-2007-1320.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-8106",
"url": "https://www.suse.com/security/cve/CVE-2014-8106"
},
{
"category": "external",
"summary": "SUSE Bug 1023004 for CVE-2014-8106",
"url": "https://bugzilla.suse.com/1023004"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2014-8106",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 907805 for CVE-2014-8106",
"url": "https://bugzilla.suse.com/907805"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2014-8106"
},
{
"cve": "CVE-2015-5225",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-5225"
}
],
"notes": [
{
"category": "general",
"text": "Buffer overflow in the vnc_refresh_server_surface function in the VNC display driver in QEMU before 2.4.0.1 allows guest users to cause a denial of service (heap memory corruption and process crash) or possibly execute arbitrary code on the host via unspecified vectors, related to refreshing the server display surface.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-5225",
"url": "https://www.suse.com/security/cve/CVE-2015-5225"
},
{
"category": "external",
"summary": "SUSE Bug 942845 for CVE-2015-5225",
"url": "https://bugzilla.suse.com/942845"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2015-5225"
},
{
"cve": "CVE-2015-6855",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-6855"
}
],
"notes": [
{
"category": "general",
"text": "hw/ide/core.c in QEMU does not properly restrict the commands accepted by an ATAPI device, which allows guest users to cause a denial of service or possibly have unspecified other impact via certain IDE commands, as demonstrated by a WIN_READ_NATIVE_MAX command to an empty drive, which triggers a divide-by-zero error and instance crash.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-6855",
"url": "https://www.suse.com/security/cve/CVE-2015-6855"
},
{
"category": "external",
"summary": "SUSE Bug 945404 for CVE-2015-6855",
"url": "https://bugzilla.suse.com/945404"
},
{
"category": "external",
"summary": "SUSE Bug 965156 for CVE-2015-6855",
"url": "https://bugzilla.suse.com/965156"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2015-6855"
},
{
"cve": "CVE-2015-8504",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-8504"
}
],
"notes": [
{
"category": "general",
"text": "Qemu, when built with VNC display driver support, allows remote attackers to cause a denial of service (arithmetic exception and application crash) via crafted SetPixelFormat messages from a client.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-8504",
"url": "https://www.suse.com/security/cve/CVE-2015-8504"
},
{
"category": "external",
"summary": "SUSE Bug 958491 for CVE-2015-8504",
"url": "https://bugzilla.suse.com/958491"
},
{
"category": "external",
"summary": "SUSE Bug 958493 for CVE-2015-8504",
"url": "https://bugzilla.suse.com/958493"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2015-8504"
},
{
"cve": "CVE-2015-8619",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-8619"
}
],
"notes": [
{
"category": "general",
"text": "The Human Monitor Interface support in QEMU allows remote attackers to cause a denial of service (out-of-bounds write and application crash).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-8619",
"url": "https://www.suse.com/security/cve/CVE-2015-8619"
},
{
"category": "external",
"summary": "SUSE Bug 960334 for CVE-2015-8619",
"url": "https://bugzilla.suse.com/960334"
},
{
"category": "external",
"summary": "SUSE Bug 965269 for CVE-2015-8619",
"url": "https://bugzilla.suse.com/965269"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2015-8619"
},
{
"cve": "CVE-2016-10028",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-10028"
}
],
"notes": [
{
"category": "general",
"text": "The virgl_cmd_get_capset function in hw/display/virtio-gpu-3d.c in QEMU (aka Quick Emulator) built with Virtio GPU Device emulator support allows local guest OS users to cause a denial of service (out-of-bounds read and process crash) via a VIRTIO_GPU_CMD_GET_CAPSET command with a maximum capabilities size with a value of 0.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-10028",
"url": "https://www.suse.com/security/cve/CVE-2016-10028"
},
{
"category": "external",
"summary": "SUSE Bug 1017084 for CVE-2016-10028",
"url": "https://bugzilla.suse.com/1017084"
},
{
"category": "external",
"summary": "SUSE Bug 1017085 for CVE-2016-10028",
"url": "https://bugzilla.suse.com/1017085"
},
{
"category": "external",
"summary": "SUSE Bug 1185981 for CVE-2016-10028",
"url": "https://bugzilla.suse.com/1185981"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-10028"
},
{
"cve": "CVE-2016-10155",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-10155"
}
],
"notes": [
{
"category": "general",
"text": "Memory leak in hw/watchdog/wdt_i6300esb.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (host memory consumption and QEMU process crash) via a large number of device unplug operations.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-10155",
"url": "https://www.suse.com/security/cve/CVE-2016-10155"
},
{
"category": "external",
"summary": "SUSE Bug 1021129 for CVE-2016-10155",
"url": "https://bugzilla.suse.com/1021129"
},
{
"category": "external",
"summary": "SUSE Bug 1024183 for CVE-2016-10155",
"url": "https://bugzilla.suse.com/1024183"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-10155"
},
{
"cve": "CVE-2016-1714",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-1714"
}
],
"notes": [
{
"category": "general",
"text": "The (1) fw_cfg_write and (2) fw_cfg_read functions in hw/nvram/fw_cfg.c in QEMU before 2.4, when built with the Firmware Configuration device emulation support, allow guest OS users with the CAP_SYS_RAWIO privilege to cause a denial of service (out-of-bounds read or write access and process crash) or possibly execute arbitrary code via an invalid current entry value in a firmware configuration.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-1714",
"url": "https://www.suse.com/security/cve/CVE-2016-1714"
},
{
"category": "external",
"summary": "SUSE Bug 961691 for CVE-2016-1714",
"url": "https://bugzilla.suse.com/961691"
},
{
"category": "external",
"summary": "SUSE Bug 961692 for CVE-2016-1714",
"url": "https://bugzilla.suse.com/961692"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-1714"
},
{
"cve": "CVE-2016-6490",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-6490"
}
],
"notes": [
{
"category": "general",
"text": "The virtqueue_map_desc function in hw/virtio/virtio.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via a zero length for the descriptor buffer.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-6490",
"url": "https://www.suse.com/security/cve/CVE-2016-6490"
},
{
"category": "external",
"summary": "SUSE Bug 991466 for CVE-2016-6490",
"url": "https://bugzilla.suse.com/991466"
},
{
"category": "external",
"summary": "SUSE Bug 993854 for CVE-2016-6490",
"url": "https://bugzilla.suse.com/993854"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2016-6490"
},
{
"cve": "CVE-2016-6836",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-6836"
}
],
"notes": [
{
"category": "general",
"text": "The vmxnet3_complete_packet function in hw/net/vmxnet3.c in QEMU (aka Quick Emulator) allows local guest OS administrators to obtain sensitive host memory information by leveraging failure to initialize the txcq_descr object.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-6836",
"url": "https://www.suse.com/security/cve/CVE-2016-6836"
},
{
"category": "external",
"summary": "SUSE Bug 994760 for CVE-2016-6836",
"url": "https://bugzilla.suse.com/994760"
},
{
"category": "external",
"summary": "SUSE Bug 994761 for CVE-2016-6836",
"url": "https://bugzilla.suse.com/994761"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2016-6836"
},
{
"cve": "CVE-2016-7156",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-7156"
}
],
"notes": [
{
"category": "general",
"text": "The pvscsi_convert_sglist function in hw/scsi/vmw_pvscsi.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) by leveraging an incorrect cast.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-7156",
"url": "https://www.suse.com/security/cve/CVE-2016-7156"
},
{
"category": "external",
"summary": "SUSE Bug 997859 for CVE-2016-7156",
"url": "https://bugzilla.suse.com/997859"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-7156"
},
{
"cve": "CVE-2016-7157",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-7157"
}
],
"notes": [
{
"category": "general",
"text": "The (1) mptsas_config_manufacturing_1 and (2) mptsas_config_ioc_0 functions in hw/scsi/mptconfig.c in QEMU (aka Quick Emulator) allow local guest OS administrators to cause a denial of service (QEMU process crash) via vectors involving MPTSAS_CONFIG_PACK.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-7157",
"url": "https://www.suse.com/security/cve/CVE-2016-7157"
},
{
"category": "external",
"summary": "SUSE Bug 997860 for CVE-2016-7157",
"url": "https://bugzilla.suse.com/997860"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-7157"
},
{
"cve": "CVE-2016-7161",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-7161"
}
],
"notes": [
{
"category": "general",
"text": "Heap-based buffer overflow in the .receive callback of xlnx.xps-ethernetlite in QEMU (aka Quick Emulator) allows attackers to execute arbitrary code on the QEMU host via a large ethlite packet.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-7161",
"url": "https://www.suse.com/security/cve/CVE-2016-7161"
},
{
"category": "external",
"summary": "SUSE Bug 1001151 for CVE-2016-7161",
"url": "https://bugzilla.suse.com/1001151"
},
{
"category": "external",
"summary": "SUSE Bug 1001152 for CVE-2016-7161",
"url": "https://bugzilla.suse.com/1001152"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-7161"
},
{
"cve": "CVE-2016-7170",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-7170"
}
],
"notes": [
{
"category": "general",
"text": "The vmsvga_fifo_run function in hw/display/vmware_vga.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via vectors related to cursor.mask[] and cursor.image[] array sizes when processing a DEFINE_CURSOR svga command.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-7170",
"url": "https://www.suse.com/security/cve/CVE-2016-7170"
},
{
"category": "external",
"summary": "SUSE Bug 998516 for CVE-2016-7170",
"url": "https://bugzilla.suse.com/998516"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-7170"
},
{
"cve": "CVE-2016-7421",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-7421"
}
],
"notes": [
{
"category": "general",
"text": "The pvscsi_ring_pop_req_descr function in hw/scsi/vmw_pvscsi.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) by leveraging failure to limit process IO loop to the ring size.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-7421",
"url": "https://www.suse.com/security/cve/CVE-2016-7421"
},
{
"category": "external",
"summary": "SUSE Bug 999661 for CVE-2016-7421",
"url": "https://bugzilla.suse.com/999661"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2016-7421"
},
{
"cve": "CVE-2016-7422",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-7422"
}
],
"notes": [
{
"category": "general",
"text": "The virtqueue_map_desc function in hw/virtio/virtio.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (NULL pointer dereference and QEMU process crash) via a large I/O descriptor buffer length value.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-7422",
"url": "https://www.suse.com/security/cve/CVE-2016-7422"
},
{
"category": "external",
"summary": "SUSE Bug 1000346 for CVE-2016-7422",
"url": "https://bugzilla.suse.com/1000346"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-7422"
},
{
"cve": "CVE-2016-7423",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-7423"
}
],
"notes": [
{
"category": "general",
"text": "The mptsas_process_scsi_io_request function in QEMU (aka Quick Emulator), when built with LSI SAS1068 Host Bus emulation support, allows local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via vectors involving MPTSASRequest objects.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-7423",
"url": "https://www.suse.com/security/cve/CVE-2016-7423"
},
{
"category": "external",
"summary": "SUSE Bug 1000397 for CVE-2016-7423",
"url": "https://bugzilla.suse.com/1000397"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-7423"
},
{
"cve": "CVE-2016-7466",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-7466"
}
],
"notes": [
{
"category": "general",
"text": "Memory leak in the usb_xhci_exit function in hw/usb/hcd-xhci.c in QEMU (aka Quick Emulator), when the xhci uses msix, allows local guest OS administrators to cause a denial of service (memory consumption and possibly QEMU process crash) by repeatedly unplugging a USB device.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-7466",
"url": "https://www.suse.com/security/cve/CVE-2016-7466"
},
{
"category": "external",
"summary": "SUSE Bug 1000345 for CVE-2016-7466",
"url": "https://bugzilla.suse.com/1000345"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-7466"
},
{
"cve": "CVE-2016-7907",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-7907"
}
],
"notes": [
{
"category": "general",
"text": "The imx_fec_do_tx function in hw/net/imx_fec.c in QEMU (aka Quick Emulator) does not properly limit the buffer descriptor count when transmitting packets, which allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via vectors involving a buffer descriptor with a length of 0 and crafted values in bd.flags.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-7907",
"url": "https://www.suse.com/security/cve/CVE-2016-7907"
},
{
"category": "external",
"summary": "SUSE Bug 1002549 for CVE-2016-7907",
"url": "https://bugzilla.suse.com/1002549"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-7907"
},
{
"cve": "CVE-2016-7908",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-7908"
}
],
"notes": [
{
"category": "general",
"text": "The mcf_fec_do_tx function in hw/net/mcf_fec.c in QEMU (aka Quick Emulator) does not properly limit the buffer descriptor count when transmitting packets, which allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via vectors involving a buffer descriptor with a length of 0 and crafted values in bd.flags.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-7908",
"url": "https://www.suse.com/security/cve/CVE-2016-7908"
},
{
"category": "external",
"summary": "SUSE Bug 1002550 for CVE-2016-7908",
"url": "https://bugzilla.suse.com/1002550"
},
{
"category": "external",
"summary": "SUSE Bug 1003030 for CVE-2016-7908",
"url": "https://bugzilla.suse.com/1003030"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-7908"
},
{
"cve": "CVE-2016-7909",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-7909"
}
],
"notes": [
{
"category": "general",
"text": "The pcnet_rdra_addr function in hw/net/pcnet.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) by setting the (1) receive or (2) transmit descriptor ring length to 0.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-7909",
"url": "https://www.suse.com/security/cve/CVE-2016-7909"
},
{
"category": "external",
"summary": "SUSE Bug 1002557 for CVE-2016-7909",
"url": "https://bugzilla.suse.com/1002557"
},
{
"category": "external",
"summary": "SUSE Bug 1003032 for CVE-2016-7909",
"url": "https://bugzilla.suse.com/1003032"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-7909"
},
{
"cve": "CVE-2016-7994",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-7994"
}
],
"notes": [
{
"category": "general",
"text": "Memory leak in the virtio_gpu_resource_create_2d function in hw/display/virtio-gpu.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (memory consumption) via a large number of VIRTIO_GPU_CMD_RESOURCE_CREATE_2D commands.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-7994",
"url": "https://www.suse.com/security/cve/CVE-2016-7994"
},
{
"category": "external",
"summary": "SUSE Bug 1003613 for CVE-2016-7994",
"url": "https://bugzilla.suse.com/1003613"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-7994"
},
{
"cve": "CVE-2016-7995",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-7995"
}
],
"notes": [
{
"category": "general",
"text": "Memory leak in the ehci_process_itd function in hw/usb/hcd-ehci.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (memory consumption) via a large number of crafted buffer page select (PG) indexes.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-7995",
"url": "https://www.suse.com/security/cve/CVE-2016-7995"
},
{
"category": "external",
"summary": "SUSE Bug 1003612 for CVE-2016-7995",
"url": "https://bugzilla.suse.com/1003612"
},
{
"category": "external",
"summary": "SUSE Bug 1003870 for CVE-2016-7995",
"url": "https://bugzilla.suse.com/1003870"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-7995"
},
{
"cve": "CVE-2016-8576",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-8576"
}
],
"notes": [
{
"category": "general",
"text": "The xhci_ring_fetch function in hw/usb/hcd-xhci.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) by leveraging failure to limit the number of link Transfer Request Blocks (TRB) to process.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-8576",
"url": "https://www.suse.com/security/cve/CVE-2016-8576"
},
{
"category": "external",
"summary": "SUSE Bug 1003878 for CVE-2016-8576",
"url": "https://bugzilla.suse.com/1003878"
},
{
"category": "external",
"summary": "SUSE Bug 1004016 for CVE-2016-8576",
"url": "https://bugzilla.suse.com/1004016"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-8576"
},
{
"cve": "CVE-2016-8577",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-8577"
}
],
"notes": [
{
"category": "general",
"text": "Memory leak in the v9fs_read function in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (memory consumption) via vectors related to an I/O read operation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-8577",
"url": "https://www.suse.com/security/cve/CVE-2016-8577"
},
{
"category": "external",
"summary": "SUSE Bug 1003893 for CVE-2016-8577",
"url": "https://bugzilla.suse.com/1003893"
},
{
"category": "external",
"summary": "SUSE Bug 1004021 for CVE-2016-8577",
"url": "https://bugzilla.suse.com/1004021"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-8577"
},
{
"cve": "CVE-2016-8578",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-8578"
}
],
"notes": [
{
"category": "general",
"text": "The v9fs_iov_vunmarshal function in fsdev/9p-iov-marshal.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (NULL pointer dereference and QEMU process crash) by sending an empty string parameter to a 9P operation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-8578",
"url": "https://www.suse.com/security/cve/CVE-2016-8578"
},
{
"category": "external",
"summary": "SUSE Bug 1003894 for CVE-2016-8578",
"url": "https://bugzilla.suse.com/1003894"
},
{
"category": "external",
"summary": "SUSE Bug 1004023 for CVE-2016-8578",
"url": "https://bugzilla.suse.com/1004023"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-8578"
},
{
"cve": "CVE-2016-8667",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-8667"
}
],
"notes": [
{
"category": "general",
"text": "The rc4030_write function in hw/dma/rc4030.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (divide-by-zero error and QEMU process crash) via a large interval timer reload value.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-8667",
"url": "https://www.suse.com/security/cve/CVE-2016-8667"
},
{
"category": "external",
"summary": "SUSE Bug 1004702 for CVE-2016-8667",
"url": "https://bugzilla.suse.com/1004702"
},
{
"category": "external",
"summary": "SUSE Bug 1005004 for CVE-2016-8667",
"url": "https://bugzilla.suse.com/1005004"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-8667"
},
{
"cve": "CVE-2016-8668",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-8668"
}
],
"notes": [
{
"category": "general",
"text": "The rocker_io_writel function in hw/net/rocker/rocker.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (out-of-bounds read and QEMU process crash) by leveraging failure to limit DMA buffer size.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-8668",
"url": "https://www.suse.com/security/cve/CVE-2016-8668"
},
{
"category": "external",
"summary": "SUSE Bug 1004706 for CVE-2016-8668",
"url": "https://bugzilla.suse.com/1004706"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-8668"
},
{
"cve": "CVE-2016-8669",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-8669"
}
],
"notes": [
{
"category": "general",
"text": "The serial_update_parameters function in hw/char/serial.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (divide-by-zero error and QEMU process crash) via vectors involving a value of divider greater than baud base.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-8669",
"url": "https://www.suse.com/security/cve/CVE-2016-8669"
},
{
"category": "external",
"summary": "SUSE Bug 1004707 for CVE-2016-8669",
"url": "https://bugzilla.suse.com/1004707"
},
{
"category": "external",
"summary": "SUSE Bug 1005005 for CVE-2016-8669",
"url": "https://bugzilla.suse.com/1005005"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-8669"
},
{
"cve": "CVE-2016-8909",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-8909"
}
],
"notes": [
{
"category": "general",
"text": "The intel_hda_xfer function in hw/audio/intel-hda.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop and CPU consumption) via an entry with the same value for buffer length and pointer position.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-8909",
"url": "https://www.suse.com/security/cve/CVE-2016-8909"
},
{
"category": "external",
"summary": "SUSE Bug 1006536 for CVE-2016-8909",
"url": "https://bugzilla.suse.com/1006536"
},
{
"category": "external",
"summary": "SUSE Bug 1007160 for CVE-2016-8909",
"url": "https://bugzilla.suse.com/1007160"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2016-8909"
},
{
"cve": "CVE-2016-8910",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-8910"
}
],
"notes": [
{
"category": "general",
"text": "The rtl8139_cplus_transmit function in hw/net/rtl8139.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop and CPU consumption) by leveraging failure to limit the ring descriptor count.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-8910",
"url": "https://www.suse.com/security/cve/CVE-2016-8910"
},
{
"category": "external",
"summary": "SUSE Bug 1006538 for CVE-2016-8910",
"url": "https://bugzilla.suse.com/1006538"
},
{
"category": "external",
"summary": "SUSE Bug 1007157 for CVE-2016-8910",
"url": "https://bugzilla.suse.com/1007157"
},
{
"category": "external",
"summary": "SUSE Bug 1024178 for CVE-2016-8910",
"url": "https://bugzilla.suse.com/1024178"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2016-8910"
},
{
"cve": "CVE-2016-9101",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-9101"
}
],
"notes": [
{
"category": "general",
"text": "Memory leak in hw/net/eepro100.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (memory consumption and QEMU process crash) by repeatedly unplugging an i8255x (PRO100) NIC device.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-9101",
"url": "https://www.suse.com/security/cve/CVE-2016-9101"
},
{
"category": "external",
"summary": "SUSE Bug 1007391 for CVE-2016-9101",
"url": "https://bugzilla.suse.com/1007391"
},
{
"category": "external",
"summary": "SUSE Bug 1013668 for CVE-2016-9101",
"url": "https://bugzilla.suse.com/1013668"
},
{
"category": "external",
"summary": "SUSE Bug 1024181 for CVE-2016-9101",
"url": "https://bugzilla.suse.com/1024181"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2016-9101"
},
{
"cve": "CVE-2016-9102",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-9102"
}
],
"notes": [
{
"category": "general",
"text": "Memory leak in the v9fs_xattrcreate function in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (memory consumption and QEMU process crash) via a large number of Txattrcreate messages with the same fid number.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-9102",
"url": "https://www.suse.com/security/cve/CVE-2016-9102"
},
{
"category": "external",
"summary": "SUSE Bug 1007450 for CVE-2016-9102",
"url": "https://bugzilla.suse.com/1007450"
},
{
"category": "external",
"summary": "SUSE Bug 1014256 for CVE-2016-9102",
"url": "https://bugzilla.suse.com/1014256"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-9102"
},
{
"cve": "CVE-2016-9103",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-9103"
}
],
"notes": [
{
"category": "general",
"text": "The v9fs_xattrcreate function in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local guest OS administrators to obtain sensitive host heap memory information by reading xattribute values before writing to them.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-9103",
"url": "https://www.suse.com/security/cve/CVE-2016-9103"
},
{
"category": "external",
"summary": "SUSE Bug 1007454 for CVE-2016-9103",
"url": "https://bugzilla.suse.com/1007454"
},
{
"category": "external",
"summary": "SUSE Bug 1014259 for CVE-2016-9103",
"url": "https://bugzilla.suse.com/1014259"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2016-9103"
},
{
"cve": "CVE-2016-9104",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-9104"
}
],
"notes": [
{
"category": "general",
"text": "Multiple integer overflows in the (1) v9fs_xattr_read and (2) v9fs_xattr_write functions in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allow local guest OS administrators to cause a denial of service (QEMU process crash) via a crafted offset, which triggers an out-of-bounds access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-9104",
"url": "https://www.suse.com/security/cve/CVE-2016-9104"
},
{
"category": "external",
"summary": "SUSE Bug 1007493 for CVE-2016-9104",
"url": "https://bugzilla.suse.com/1007493"
},
{
"category": "external",
"summary": "SUSE Bug 1014297 for CVE-2016-9104",
"url": "https://bugzilla.suse.com/1014297"
},
{
"category": "external",
"summary": "SUSE Bug 1034990 for CVE-2016-9104",
"url": "https://bugzilla.suse.com/1034990"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2016-9104"
},
{
"cve": "CVE-2016-9105",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-9105"
}
],
"notes": [
{
"category": "general",
"text": "Memory leak in the v9fs_link function in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (memory consumption) via vectors involving a reference to the source fid object.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-9105",
"url": "https://www.suse.com/security/cve/CVE-2016-9105"
},
{
"category": "external",
"summary": "SUSE Bug 1007494 for CVE-2016-9105",
"url": "https://bugzilla.suse.com/1007494"
},
{
"category": "external",
"summary": "SUSE Bug 1014279 for CVE-2016-9105",
"url": "https://bugzilla.suse.com/1014279"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2016-9105"
},
{
"cve": "CVE-2016-9106",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-9106"
}
],
"notes": [
{
"category": "general",
"text": "Memory leak in the v9fs_write function in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (memory consumption) by leveraging failure to free an IO vector.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-9106",
"url": "https://www.suse.com/security/cve/CVE-2016-9106"
},
{
"category": "external",
"summary": "SUSE Bug 1007495 for CVE-2016-9106",
"url": "https://bugzilla.suse.com/1007495"
},
{
"category": "external",
"summary": "SUSE Bug 1014299 for CVE-2016-9106",
"url": "https://bugzilla.suse.com/1014299"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2016-9106"
},
{
"cve": "CVE-2016-9602",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-9602"
}
],
"notes": [
{
"category": "general",
"text": "Qemu before version 2.9 is vulnerable to an improper link following when built with the VirtFS. A privileged user inside guest could use this flaw to access host file system beyond the shared folder and potentially escalating their privileges on a host.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-9602",
"url": "https://www.suse.com/security/cve/CVE-2016-9602"
},
{
"category": "external",
"summary": "SUSE Bug 1020427 for CVE-2016-9602",
"url": "https://bugzilla.suse.com/1020427"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-9602"
},
{
"cve": "CVE-2016-9907",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-9907"
}
],
"notes": [
{
"category": "general",
"text": "Quick Emulator (Qemu) built with the USB redirector usb-guest support is vulnerable to a memory leakage flaw. It could occur while destroying the USB redirector in \u0027usbredir_handle_destroy\u0027. A guest user/process could use this issue to leak host memory, resulting in DoS for a host.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-9907",
"url": "https://www.suse.com/security/cve/CVE-2016-9907"
},
{
"category": "external",
"summary": "SUSE Bug 1014109 for CVE-2016-9907",
"url": "https://bugzilla.suse.com/1014109"
},
{
"category": "external",
"summary": "SUSE Bug 1014490 for CVE-2016-9907",
"url": "https://bugzilla.suse.com/1014490"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2016-9907"
},
{
"cve": "CVE-2016-9921",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-9921"
}
],
"notes": [
{
"category": "general",
"text": "Quick emulator (Qemu) built with the Cirrus CLGD 54xx VGA Emulator support is vulnerable to a divide by zero issue. It could occur while copying VGA data when cirrus graphics mode was set to be VGA. A privileged user inside guest could use this flaw to crash the Qemu process instance on the host, resulting in DoS.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-9921",
"url": "https://www.suse.com/security/cve/CVE-2016-9921"
},
{
"category": "external",
"summary": "SUSE Bug 1014702 for CVE-2016-9921",
"url": "https://bugzilla.suse.com/1014702"
},
{
"category": "external",
"summary": "SUSE Bug 1015169 for CVE-2016-9921",
"url": "https://bugzilla.suse.com/1015169"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2016-9921",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-9921"
},
{
"cve": "CVE-2017-10664",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-10664"
}
],
"notes": [
{
"category": "general",
"text": "qemu-nbd in QEMU (aka Quick Emulator) does not ignore SIGPIPE, which allows remote attackers to cause a denial of service (daemon crash) by disconnecting during a server-to-client reply attempt.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-10664",
"url": "https://www.suse.com/security/cve/CVE-2017-10664"
},
{
"category": "external",
"summary": "SUSE Bug 1046636 for CVE-2017-10664",
"url": "https://bugzilla.suse.com/1046636"
},
{
"category": "external",
"summary": "SUSE Bug 1046637 for CVE-2017-10664",
"url": "https://bugzilla.suse.com/1046637"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-10664",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-10664"
},
{
"cve": "CVE-2017-10806",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-10806"
}
],
"notes": [
{
"category": "general",
"text": "Stack-based buffer overflow in hw/usb/redirect.c in QEMU (aka Quick Emulator) allows local guest OS users to cause a denial of service (QEMU process crash) via vectors related to logging debug messages.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-10806",
"url": "https://www.suse.com/security/cve/CVE-2017-10806"
},
{
"category": "external",
"summary": "SUSE Bug 1047674 for CVE-2017-10806",
"url": "https://bugzilla.suse.com/1047674"
},
{
"category": "external",
"summary": "SUSE Bug 1047675 for CVE-2017-10806",
"url": "https://bugzilla.suse.com/1047675"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-10806"
},
{
"cve": "CVE-2017-11334",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-11334"
}
],
"notes": [
{
"category": "general",
"text": "The address_space_write_continue function in exec.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (out-of-bounds access and guest instance crash) by leveraging use of qemu_map_ram_ptr to access guest ram block area.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-11334",
"url": "https://www.suse.com/security/cve/CVE-2017-11334"
},
{
"category": "external",
"summary": "SUSE Bug 1048902 for CVE-2017-11334",
"url": "https://bugzilla.suse.com/1048902"
},
{
"category": "external",
"summary": "SUSE Bug 1048920 for CVE-2017-11334",
"url": "https://bugzilla.suse.com/1048920"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-11334"
},
{
"cve": "CVE-2017-11434",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-11434"
}
],
"notes": [
{
"category": "general",
"text": "The dhcp_decode function in slirp/bootp.c in QEMU (aka Quick Emulator) allows local guest OS users to cause a denial of service (out-of-bounds read and QEMU process crash) via a crafted DHCP options string.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-11434",
"url": "https://www.suse.com/security/cve/CVE-2017-11434"
},
{
"category": "external",
"summary": "SUSE Bug 1049381 for CVE-2017-11434",
"url": "https://bugzilla.suse.com/1049381"
},
{
"category": "external",
"summary": "SUSE Bug 1049578 for CVE-2017-11434",
"url": "https://bugzilla.suse.com/1049578"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-11434",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.6,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-11434"
},
{
"cve": "CVE-2017-13673",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-13673"
}
],
"notes": [
{
"category": "general",
"text": "The vga display update in mis-calculated the region for the dirty bitmap snapshot in case split screen mode is used causing a denial of service (assertion failure) in the cpu_physical_memory_snapshot_get_dirty function.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-13673",
"url": "https://www.suse.com/security/cve/CVE-2017-13673"
},
{
"category": "external",
"summary": "SUSE Bug 1056386 for CVE-2017-13673",
"url": "https://bugzilla.suse.com/1056386"
},
{
"category": "external",
"summary": "SUSE Bug 1056387 for CVE-2017-13673",
"url": "https://bugzilla.suse.com/1056387"
},
{
"category": "external",
"summary": "SUSE Bug 1084604 for CVE-2017-13673",
"url": "https://bugzilla.suse.com/1084604"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2017-13673"
},
{
"cve": "CVE-2017-13711",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-13711"
}
],
"notes": [
{
"category": "general",
"text": "Use-after-free vulnerability in the sofree function in slirp/socket.c in QEMU (aka Quick Emulator) allows attackers to cause a denial of service (QEMU instance crash) by leveraging failure to properly clear ifq_so from pending packets.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-13711",
"url": "https://www.suse.com/security/cve/CVE-2017-13711"
},
{
"category": "external",
"summary": "SUSE Bug 1056291 for CVE-2017-13711",
"url": "https://bugzilla.suse.com/1056291"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2017-13711"
},
{
"cve": "CVE-2017-14167",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-14167"
}
],
"notes": [
{
"category": "general",
"text": "Integer overflow in the load_multiboot function in hw/i386/multiboot.c in QEMU (aka Quick Emulator) allows local guest OS users to execute arbitrary code on the host via crafted multiboot header address values, which trigger an out-of-bounds write.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-14167",
"url": "https://www.suse.com/security/cve/CVE-2017-14167"
},
{
"category": "external",
"summary": "SUSE Bug 1057585 for CVE-2017-14167",
"url": "https://bugzilla.suse.com/1057585"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2017-14167"
},
{
"cve": "CVE-2017-15038",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-15038"
}
],
"notes": [
{
"category": "general",
"text": "Race condition in the v9fs_xattrwalk function in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local guest OS users to obtain sensitive information from host heap memory via vectors related to reading extended attributes.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-15038",
"url": "https://www.suse.com/security/cve/CVE-2017-15038"
},
{
"category": "external",
"summary": "SUSE Bug 1062069 for CVE-2017-15038",
"url": "https://bugzilla.suse.com/1062069"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2017-15038"
},
{
"cve": "CVE-2017-15118",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-15118"
}
],
"notes": [
{
"category": "general",
"text": "A stack-based buffer overflow vulnerability was found in NBD server implementation in qemu before 2.11 allowing a client to request an export name of size up to 4096 bytes, which in fact should be limited to 256 bytes, causing an out-of-bounds stack write in the qemu process. If NBD server requires TLS, the attacker cannot trigger the buffer overflow without first successfully negotiating TLS.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-15118",
"url": "https://www.suse.com/security/cve/CVE-2017-15118"
},
{
"category": "external",
"summary": "SUSE Bug 1070147 for CVE-2017-15118",
"url": "https://bugzilla.suse.com/1070147"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2017-15118"
},
{
"cve": "CVE-2017-15268",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-15268"
}
],
"notes": [
{
"category": "general",
"text": "Qemu through 2.10.0 allows remote attackers to cause a memory leak by triggering slow data-channel read operations, related to io/channel-websock.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-15268",
"url": "https://www.suse.com/security/cve/CVE-2017-15268"
},
{
"category": "external",
"summary": "SUSE Bug 1062942 for CVE-2017-15268",
"url": "https://bugzilla.suse.com/1062942"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-15268"
},
{
"cve": "CVE-2017-15289",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-15289"
}
],
"notes": [
{
"category": "general",
"text": "The mode4and5 write functions in hw/display/cirrus_vga.c in Qemu allow local OS guest privileged users to cause a denial of service (out-of-bounds write access and Qemu process crash) via vectors related to dst calculation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-15289",
"url": "https://www.suse.com/security/cve/CVE-2017-15289"
},
{
"category": "external",
"summary": "SUSE Bug 1063122 for CVE-2017-15289",
"url": "https://bugzilla.suse.com/1063122"
},
{
"category": "external",
"summary": "SUSE Bug 1063123 for CVE-2017-15289",
"url": "https://bugzilla.suse.com/1063123"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-15289",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-15289"
},
{
"cve": "CVE-2017-2615",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-2615"
}
],
"notes": [
{
"category": "general",
"text": "Quick emulator (QEMU) built with the Cirrus CLGD 54xx VGA emulator support is vulnerable to an out-of-bounds access issue. It could occur while copying VGA data via bitblt copy in backward mode. A privileged user inside a guest could use this flaw to crash the QEMU process resulting in DoS or potentially execute arbitrary code on the host with privileges of QEMU process on the host.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-2615",
"url": "https://www.suse.com/security/cve/CVE-2017-2615"
},
{
"category": "external",
"summary": "SUSE Bug 1023004 for CVE-2017-2615",
"url": "https://bugzilla.suse.com/1023004"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-2615",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-2615"
},
{
"cve": "CVE-2017-2620",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-2620"
}
],
"notes": [
{
"category": "general",
"text": "Quick emulator (QEMU) before 2.8 built with the Cirrus CLGD 54xx VGA Emulator support is vulnerable to an out-of-bounds access issue. The issue could occur while copying VGA data in cirrus_bitblt_cputovideo. A privileged user inside guest could use this flaw to crash the QEMU process OR potentially execute arbitrary code on host with privileges of the QEMU process.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-2620",
"url": "https://www.suse.com/security/cve/CVE-2017-2620"
},
{
"category": "external",
"summary": "SUSE Bug 1024834 for CVE-2017-2620",
"url": "https://bugzilla.suse.com/1024834"
},
{
"category": "external",
"summary": "SUSE Bug 1024972 for CVE-2017-2620",
"url": "https://bugzilla.suse.com/1024972"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-2620",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.9,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-2620"
},
{
"cve": "CVE-2017-2630",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-2630"
}
],
"notes": [
{
"category": "general",
"text": "A stack buffer overflow flaw was found in the Quick Emulator (QEMU) before 2.9 built with the Network Block Device (NBD) client support. The flaw could occur while processing server\u0027s response to a \u0027NBD_OPT_LIST\u0027 request. A malicious NBD server could use this issue to crash a remote NBD client resulting in DoS or potentially execute arbitrary code on client host with privileges of the QEMU process.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-2630",
"url": "https://www.suse.com/security/cve/CVE-2017-2630"
},
{
"category": "external",
"summary": "SUSE Bug 1025396 for CVE-2017-2630",
"url": "https://bugzilla.suse.com/1025396"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-2630"
},
{
"cve": "CVE-2017-5525",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5525"
}
],
"notes": [
{
"category": "general",
"text": "Memory leak in hw/audio/ac97.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (host memory consumption and QEMU process crash) via a large number of device unplug operations.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5525",
"url": "https://www.suse.com/security/cve/CVE-2017-5525"
},
{
"category": "external",
"summary": "SUSE Bug 1020491 for CVE-2017-5525",
"url": "https://bugzilla.suse.com/1020491"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-5525"
},
{
"cve": "CVE-2017-5526",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5526"
}
],
"notes": [
{
"category": "general",
"text": "Memory leak in hw/audio/es1370.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (host memory consumption and QEMU process crash) via a large number of device unplug operations.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5526",
"url": "https://www.suse.com/security/cve/CVE-2017-5526"
},
{
"category": "external",
"summary": "SUSE Bug 1020589 for CVE-2017-5526",
"url": "https://bugzilla.suse.com/1020589"
},
{
"category": "external",
"summary": "SUSE Bug 1059777 for CVE-2017-5526",
"url": "https://bugzilla.suse.com/1059777"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5526",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-5526"
},
{
"cve": "CVE-2017-5552",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5552"
}
],
"notes": [
{
"category": "general",
"text": "Memory leak in the virgl_resource_attach_backing function in hw/display/virtio-gpu-3d.c in QEMU (aka Quick Emulator) allows local guest OS users to cause a denial of service (host memory consumption) via a large number of VIRTIO_GPU_CMD_RESOURCE_ATTACH_BACKING commands.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5552",
"url": "https://www.suse.com/security/cve/CVE-2017-5552"
},
{
"category": "external",
"summary": "SUSE Bug 1021195 for CVE-2017-5552",
"url": "https://bugzilla.suse.com/1021195"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-5552"
},
{
"cve": "CVE-2017-5578",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5578"
}
],
"notes": [
{
"category": "general",
"text": "Memory leak in the virtio_gpu_resource_attach_backing function in hw/display/virtio-gpu.c in QEMU (aka Quick Emulator) allows local guest OS users to cause a denial of service (host memory consumption) via a large number of VIRTIO_GPU_CMD_RESOURCE_ATTACH_BACKING commands.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5578",
"url": "https://www.suse.com/security/cve/CVE-2017-5578"
},
{
"category": "external",
"summary": "SUSE Bug 1021481 for CVE-2017-5578",
"url": "https://bugzilla.suse.com/1021481"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-5578"
},
{
"cve": "CVE-2017-5579",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5579"
}
],
"notes": [
{
"category": "general",
"text": "Memory leak in the serial_exit_core function in hw/char/serial.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (host memory consumption and QEMU process crash) via a large number of device unplug operations.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5579",
"url": "https://www.suse.com/security/cve/CVE-2017-5579"
},
{
"category": "external",
"summary": "SUSE Bug 1021741 for CVE-2017-5579",
"url": "https://bugzilla.suse.com/1021741"
},
{
"category": "external",
"summary": "SUSE Bug 1022627 for CVE-2017-5579",
"url": "https://bugzilla.suse.com/1022627"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2017-5579"
},
{
"cve": "CVE-2017-5667",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5667"
}
],
"notes": [
{
"category": "general",
"text": "The sdhci_sdma_transfer_multi_blocks function in hw/sd/sdhci.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (out-of-bounds heap access and crash) or execute arbitrary code on the QEMU host via vectors involving the data transfer length.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5667",
"url": "https://www.suse.com/security/cve/CVE-2017-5667"
},
{
"category": "external",
"summary": "SUSE Bug 1022541 for CVE-2017-5667",
"url": "https://bugzilla.suse.com/1022541"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-5667"
},
{
"cve": "CVE-2017-5715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5715"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5715",
"url": "https://www.suse.com/security/cve/CVE-2017-5715"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1074741 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074741"
},
{
"category": "external",
"summary": "SUSE Bug 1074919 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1074919"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075007 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075007"
},
{
"category": "external",
"summary": "SUSE Bug 1075262 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075262"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1076115 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076115"
},
{
"category": "external",
"summary": "SUSE Bug 1076372 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076372"
},
{
"category": "external",
"summary": "SUSE Bug 1076606 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1076606"
},
{
"category": "external",
"summary": "SUSE Bug 1078353 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1078353"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087887 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087887"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1088147 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1088147"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1091815 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1091815"
},
{
"category": "external",
"summary": "SUSE Bug 1095735 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1095735"
},
{
"category": "external",
"summary": "SUSE Bug 1102517 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1102517"
},
{
"category": "external",
"summary": "SUSE Bug 1105108 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1105108"
},
{
"category": "external",
"summary": "SUSE Bug 1126516 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1126516"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201457 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201457"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1203236 for CVE-2017-5715",
"url": "https://bugzilla.suse.com/1203236"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-5715"
},
{
"cve": "CVE-2017-5856",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5856"
}
],
"notes": [
{
"category": "general",
"text": "Memory leak in the megasas_handle_dcmd function in hw/scsi/megasas.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (host memory consumption) via MegaRAID Firmware Interface (MFI) commands with the sglist size set to a value over 2 Gb.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5856",
"url": "https://www.suse.com/security/cve/CVE-2017-5856"
},
{
"category": "external",
"summary": "SUSE Bug 1023053 for CVE-2017-5856",
"url": "https://bugzilla.suse.com/1023053"
},
{
"category": "external",
"summary": "SUSE Bug 1024186 for CVE-2017-5856",
"url": "https://bugzilla.suse.com/1024186"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-5856"
},
{
"cve": "CVE-2017-5857",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5857"
}
],
"notes": [
{
"category": "general",
"text": "Memory leak in the virgl_cmd_resource_unref function in hw/display/virtio-gpu-3d.c in QEMU (aka Quick Emulator) allows local guest OS users to cause a denial of service (host memory consumption) via a large number of VIRTIO_GPU_CMD_RESOURCE_UNREF commands sent without detaching the backing storage beforehand.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5857",
"url": "https://www.suse.com/security/cve/CVE-2017-5857"
},
{
"category": "external",
"summary": "SUSE Bug 1023073 for CVE-2017-5857",
"url": "https://bugzilla.suse.com/1023073"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2017-5857"
},
{
"cve": "CVE-2017-5898",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5898"
}
],
"notes": [
{
"category": "general",
"text": "Integer overflow in the emulated_apdu_from_guest function in usb/dev-smartcard-reader.c in Quick Emulator (Qemu), when built with the CCID Card device emulator support, allows local users to cause a denial of service (application crash) via a large Application Protocol Data Units (APDU) unit.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5898",
"url": "https://www.suse.com/security/cve/CVE-2017-5898"
},
{
"category": "external",
"summary": "SUSE Bug 1023907 for CVE-2017-5898",
"url": "https://bugzilla.suse.com/1023907"
},
{
"category": "external",
"summary": "SUSE Bug 1024307 for CVE-2017-5898",
"url": "https://bugzilla.suse.com/1024307"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-5898"
},
{
"cve": "CVE-2017-5973",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5973"
}
],
"notes": [
{
"category": "general",
"text": "The xhci_kick_epctx function in hw/usb/hcd-xhci.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (infinite loop and QEMU process crash) via vectors related to control transfer descriptor sequence.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5973",
"url": "https://www.suse.com/security/cve/CVE-2017-5973"
},
{
"category": "external",
"summary": "SUSE Bug 1025109 for CVE-2017-5973",
"url": "https://bugzilla.suse.com/1025109"
},
{
"category": "external",
"summary": "SUSE Bug 1025188 for CVE-2017-5973",
"url": "https://bugzilla.suse.com/1025188"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-5973"
},
{
"cve": "CVE-2017-6058",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-6058"
}
],
"notes": [
{
"category": "general",
"text": "Buffer overflow in NetRxPkt::ehdr_buf in hw/net/net_rx_pkt.c in QEMU (aka Quick Emulator), when the VLANSTRIP feature is enabled on the vmxnet3 device, allows remote attackers to cause a denial of service (out-of-bounds access and QEMU process crash) via vectors related to VLAN stripping.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-6058",
"url": "https://www.suse.com/security/cve/CVE-2017-6058"
},
{
"category": "external",
"summary": "SUSE Bug 1025837 for CVE-2017-6058",
"url": "https://bugzilla.suse.com/1025837"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-6058"
},
{
"cve": "CVE-2017-7471",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-7471"
}
],
"notes": [
{
"category": "general",
"text": "Quick Emulator (Qemu) built with the VirtFS, host directory sharing via Plan 9 File System (9pfs) support, is vulnerable to an improper access control issue. It could occur while accessing files on a shared host directory. A privileged user inside guest could use this flaw to access host file system beyond the shared folder and potentially escalating their privileges on a host.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-7471",
"url": "https://www.suse.com/security/cve/CVE-2017-7471"
},
{
"category": "external",
"summary": "SUSE Bug 1034866 for CVE-2017-7471",
"url": "https://bugzilla.suse.com/1034866"
},
{
"category": "external",
"summary": "SUSE Bug 1034990 for CVE-2017-7471",
"url": "https://bugzilla.suse.com/1034990"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-7471"
},
{
"cve": "CVE-2017-7493",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-7493"
}
],
"notes": [
{
"category": "general",
"text": "Quick Emulator (Qemu) built with the VirtFS, host directory sharing via Plan 9 File System(9pfs) support, is vulnerable to an improper access control issue. It could occur while accessing virtfs metadata files in mapped-file security mode. A guest user could use this flaw to escalate their privileges inside guest.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-7493",
"url": "https://www.suse.com/security/cve/CVE-2017-7493"
},
{
"category": "external",
"summary": "SUSE Bug 1039495 for CVE-2017-7493",
"url": "https://bugzilla.suse.com/1039495"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-7493"
},
{
"cve": "CVE-2017-8112",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-8112"
}
],
"notes": [
{
"category": "general",
"text": "hw/scsi/vmw_pvscsi.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (infinite loop and CPU consumption) via the message ring page count.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-8112",
"url": "https://www.suse.com/security/cve/CVE-2017-8112"
},
{
"category": "external",
"summary": "SUSE Bug 1036211 for CVE-2017-8112",
"url": "https://bugzilla.suse.com/1036211"
},
{
"category": "external",
"summary": "SUSE Bug 1036470 for CVE-2017-8112",
"url": "https://bugzilla.suse.com/1036470"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2017-8112"
},
{
"cve": "CVE-2017-8309",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-8309"
}
],
"notes": [
{
"category": "general",
"text": "Memory leak in the audio/audio.c in QEMU (aka Quick Emulator) allows remote attackers to cause a denial of service (memory consumption) by repeatedly starting and stopping audio capture.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-8309",
"url": "https://www.suse.com/security/cve/CVE-2017-8309"
},
{
"category": "external",
"summary": "SUSE Bug 1037242 for CVE-2017-8309",
"url": "https://bugzilla.suse.com/1037242"
},
{
"category": "external",
"summary": "SUSE Bug 1037243 for CVE-2017-8309",
"url": "https://bugzilla.suse.com/1037243"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-8309",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2017-8309"
},
{
"cve": "CVE-2017-8379",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-8379"
}
],
"notes": [
{
"category": "general",
"text": "Memory leak in the keyboard input event handlers support in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (host memory consumption) by rapidly generating large keyboard events.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-8379",
"url": "https://www.suse.com/security/cve/CVE-2017-8379"
},
{
"category": "external",
"summary": "SUSE Bug 1037334 for CVE-2017-8379",
"url": "https://bugzilla.suse.com/1037334"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2017-8379"
},
{
"cve": "CVE-2017-8380",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-8380"
}
],
"notes": [
{
"category": "general",
"text": "Buffer overflow in the \"megasas_mmio_write\" function in Qemu 2.9.0 allows remote attackers to have unspecified impact via unknown vectors.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-8380",
"url": "https://www.suse.com/security/cve/CVE-2017-8380"
},
{
"category": "external",
"summary": "SUSE Bug 1037336 for CVE-2017-8380",
"url": "https://bugzilla.suse.com/1037336"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2017-8380"
},
{
"cve": "CVE-2017-9503",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-9503"
}
],
"notes": [
{
"category": "general",
"text": "QEMU (aka Quick Emulator), when built with MegaRAID SAS 8708EM2 Host Bus Adapter emulation support, allows local guest OS privileged users to cause a denial of service (NULL pointer dereference and QEMU process crash) via vectors involving megasas command processing.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-9503",
"url": "https://www.suse.com/security/cve/CVE-2017-9503"
},
{
"category": "external",
"summary": "SUSE Bug 1043296 for CVE-2017-9503",
"url": "https://bugzilla.suse.com/1043296"
},
{
"category": "external",
"summary": "SUSE Bug 1043297 for CVE-2017-9503",
"url": "https://bugzilla.suse.com/1043297"
},
{
"category": "external",
"summary": "SUSE Bug 1043312 for CVE-2017-9503",
"url": "https://bugzilla.suse.com/1043312"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.8,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2017-9503"
},
{
"cve": "CVE-2017-9524",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-9524"
}
],
"notes": [
{
"category": "general",
"text": "The qemu-nbd server in QEMU (aka Quick Emulator), when built with the Network Block Device (NBD) Server support, allows remote attackers to cause a denial of service (segmentation fault and server crash) by leveraging failure to ensure that all initialization occurs before talking to a client in the nbd_negotiate function.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-9524",
"url": "https://www.suse.com/security/cve/CVE-2017-9524"
},
{
"category": "external",
"summary": "SUSE Bug 1043808 for CVE-2017-9524",
"url": "https://bugzilla.suse.com/1043808"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-9524"
},
{
"cve": "CVE-2018-10839",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-10839"
}
],
"notes": [
{
"category": "general",
"text": "Qemu emulator \u003c= 3.0.0 built with the NE2000 NIC emulation support is vulnerable to an integer overflow, which could lead to buffer overflow issue. It could occur when receiving packets over the network. A user inside guest could use this flaw to crash the Qemu process resulting in DoS.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-10839",
"url": "https://www.suse.com/security/cve/CVE-2018-10839"
},
{
"category": "external",
"summary": "SUSE Bug 1110910 for CVE-2018-10839",
"url": "https://bugzilla.suse.com/1110910"
},
{
"category": "external",
"summary": "SUSE Bug 1110924 for CVE-2018-10839",
"url": "https://bugzilla.suse.com/1110924"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-10839"
},
{
"cve": "CVE-2018-11806",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-11806"
}
],
"notes": [
{
"category": "general",
"text": "m_cat in slirp/mbuf.c in Qemu has a heap-based buffer overflow via incoming fragmented datagrams.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-11806",
"url": "https://www.suse.com/security/cve/CVE-2018-11806"
},
{
"category": "external",
"summary": "SUSE Bug 1096223 for CVE-2018-11806",
"url": "https://bugzilla.suse.com/1096223"
},
{
"category": "external",
"summary": "SUSE Bug 1096224 for CVE-2018-11806",
"url": "https://bugzilla.suse.com/1096224"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-11806",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-11806"
},
{
"cve": "CVE-2018-12126",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-12126"
}
],
"notes": [
{
"category": "general",
"text": "Microarchitectural Store Buffer Data Sampling (MSBDS): Store buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-12126",
"url": "https://www.suse.com/security/cve/CVE-2018-12126"
},
{
"category": "external",
"summary": "SUSE Bug 1103186 for CVE-2018-12126",
"url": "https://bugzilla.suse.com/1103186"
},
{
"category": "external",
"summary": "SUSE Bug 1111331 for CVE-2018-12126",
"url": "https://bugzilla.suse.com/1111331"
},
{
"category": "external",
"summary": "SUSE Bug 1132686 for CVE-2018-12126",
"url": "https://bugzilla.suse.com/1132686"
},
{
"category": "external",
"summary": "SUSE Bug 1135409 for CVE-2018-12126",
"url": "https://bugzilla.suse.com/1135409"
},
{
"category": "external",
"summary": "SUSE Bug 1135524 for CVE-2018-12126",
"url": "https://bugzilla.suse.com/1135524"
},
{
"category": "external",
"summary": "SUSE Bug 1137916 for CVE-2018-12126",
"url": "https://bugzilla.suse.com/1137916"
},
{
"category": "external",
"summary": "SUSE Bug 1138534 for CVE-2018-12126",
"url": "https://bugzilla.suse.com/1138534"
},
{
"category": "external",
"summary": "SUSE Bug 1141977 for CVE-2018-12126",
"url": "https://bugzilla.suse.com/1141977"
},
{
"category": "external",
"summary": "SUSE Bug 1149725 for CVE-2018-12126",
"url": "https://bugzilla.suse.com/1149725"
},
{
"category": "external",
"summary": "SUSE Bug 1149726 for CVE-2018-12126",
"url": "https://bugzilla.suse.com/1149726"
},
{
"category": "external",
"summary": "SUSE Bug 1149729 for CVE-2018-12126",
"url": "https://bugzilla.suse.com/1149729"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-12126",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2018-12126",
"url": "https://bugzilla.suse.com/1201877"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.8,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-12126"
},
{
"cve": "CVE-2018-12130",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-12130"
}
],
"notes": [
{
"category": "general",
"text": "Microarchitectural Fill Buffer Data Sampling (MFBDS): Fill buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-12130",
"url": "https://www.suse.com/security/cve/CVE-2018-12130"
},
{
"category": "external",
"summary": "SUSE Bug 1103186 for CVE-2018-12130",
"url": "https://bugzilla.suse.com/1103186"
},
{
"category": "external",
"summary": "SUSE Bug 1111331 for CVE-2018-12130",
"url": "https://bugzilla.suse.com/1111331"
},
{
"category": "external",
"summary": "SUSE Bug 1132686 for CVE-2018-12130",
"url": "https://bugzilla.suse.com/1132686"
},
{
"category": "external",
"summary": "SUSE Bug 1135409 for CVE-2018-12130",
"url": "https://bugzilla.suse.com/1135409"
},
{
"category": "external",
"summary": "SUSE Bug 1137916 for CVE-2018-12130",
"url": "https://bugzilla.suse.com/1137916"
},
{
"category": "external",
"summary": "SUSE Bug 1138534 for CVE-2018-12130",
"url": "https://bugzilla.suse.com/1138534"
},
{
"category": "external",
"summary": "SUSE Bug 1141977 for CVE-2018-12130",
"url": "https://bugzilla.suse.com/1141977"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-12130",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2018-12130",
"url": "https://bugzilla.suse.com/1201877"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-12130"
},
{
"cve": "CVE-2018-12207",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-12207"
}
],
"notes": [
{
"category": "general",
"text": "Improper invalidation for page table updates by a virtual guest operating system for multiple Intel(R) Processors may allow an authenticated user to potentially enable denial of service of the host system via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-12207",
"url": "https://www.suse.com/security/cve/CVE-2018-12207"
},
{
"category": "external",
"summary": "SUSE Bug 1117665 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1117665"
},
{
"category": "external",
"summary": "SUSE Bug 1139073 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1139073"
},
{
"category": "external",
"summary": "SUSE Bug 1152505 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1152505"
},
{
"category": "external",
"summary": "SUSE Bug 1155812 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1155812"
},
{
"category": "external",
"summary": "SUSE Bug 1155817 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1155817"
},
{
"category": "external",
"summary": "SUSE Bug 1155945 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1155945"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1201877"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-12207"
},
{
"cve": "CVE-2018-15746",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-15746"
}
],
"notes": [
{
"category": "general",
"text": "qemu-seccomp.c in QEMU might allow local OS guest users to cause a denial of service (guest crash) by leveraging mishandling of the seccomp policy for threads other than the main thread.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-15746",
"url": "https://www.suse.com/security/cve/CVE-2018-15746"
},
{
"category": "external",
"summary": "SUSE Bug 1106222 for CVE-2018-15746",
"url": "https://bugzilla.suse.com/1106222"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-15746"
},
{
"cve": "CVE-2018-16872",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-16872"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in qemu Media Transfer Protocol (MTP). The code opening files in usb_mtp_get_object and usb_mtp_get_partial_object and directories in usb_mtp_object_readdir doesn\u0027t consider that the underlying filesystem may have changed since the time lstat(2) was called in usb_mtp_object_alloc, a classical TOCTTOU problem. An attacker with write access to the host filesystem shared with a guest can use this property to navigate the host filesystem in the context of the QEMU process and read any file the QEMU process has access to. Access to the filesystem may be local or via a network share protocol such as CIFS.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-16872",
"url": "https://www.suse.com/security/cve/CVE-2018-16872"
},
{
"category": "external",
"summary": "SUSE Bug 1119493 for CVE-2018-16872",
"url": "https://bugzilla.suse.com/1119493"
},
{
"category": "external",
"summary": "SUSE Bug 1119494 for CVE-2018-16872",
"url": "https://bugzilla.suse.com/1119494"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-16872"
},
{
"cve": "CVE-2018-17963",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-17963"
}
],
"notes": [
{
"category": "general",
"text": "qemu_deliver_packet_iov in net/net.c in Qemu accepts packet sizes greater than INT_MAX, which allows attackers to cause a denial of service or possibly have unspecified other impact.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-17963",
"url": "https://www.suse.com/security/cve/CVE-2018-17963"
},
{
"category": "external",
"summary": "SUSE Bug 1111013 for CVE-2018-17963",
"url": "https://bugzilla.suse.com/1111013"
},
{
"category": "external",
"summary": "SUSE Bug 1111014 for CVE-2018-17963",
"url": "https://bugzilla.suse.com/1111014"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-17963",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-17963"
},
{
"cve": "CVE-2018-20123",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-20123"
}
],
"notes": [
{
"category": "general",
"text": "pvrdma_realize in hw/rdma/vmw/pvrdma_main.c in QEMU has a Memory leak after an initialisation error.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-20123",
"url": "https://www.suse.com/security/cve/CVE-2018-20123"
},
{
"category": "external",
"summary": "SUSE Bug 1119437 for CVE-2018-20123",
"url": "https://bugzilla.suse.com/1119437"
},
{
"category": "external",
"summary": "SUSE Bug 1119438 for CVE-2018-20123",
"url": "https://bugzilla.suse.com/1119438"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.2,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2018-20123"
},
{
"cve": "CVE-2018-20124",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-20124"
}
],
"notes": [
{
"category": "general",
"text": "hw/rdma/rdma_backend.c in QEMU allows guest OS users to trigger out-of-bounds access via a PvrdmaSqWqe ring element with a large num_sge value.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-20124",
"url": "https://www.suse.com/security/cve/CVE-2018-20124"
},
{
"category": "external",
"summary": "SUSE Bug 1119840 for CVE-2018-20124",
"url": "https://bugzilla.suse.com/1119840"
},
{
"category": "external",
"summary": "SUSE Bug 1119841 for CVE-2018-20124",
"url": "https://bugzilla.suse.com/1119841"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-20124"
},
{
"cve": "CVE-2018-20125",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-20125"
}
],
"notes": [
{
"category": "general",
"text": "hw/rdma/vmw/pvrdma_cmd.c in QEMU allows attackers to cause a denial of service (NULL pointer dereference or excessive memory allocation) in create_cq_ring or create_qp_rings.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-20125",
"url": "https://www.suse.com/security/cve/CVE-2018-20125"
},
{
"category": "external",
"summary": "SUSE Bug 1119989 for CVE-2018-20125",
"url": "https://bugzilla.suse.com/1119989"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2018-20125"
},
{
"cve": "CVE-2018-20126",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-20126"
}
],
"notes": [
{
"category": "general",
"text": "hw/rdma/vmw/pvrdma_cmd.c in QEMU allows create_cq and create_qp memory leaks because errors are mishandled.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-20126",
"url": "https://www.suse.com/security/cve/CVE-2018-20126"
},
{
"category": "external",
"summary": "SUSE Bug 1119991 for CVE-2018-20126",
"url": "https://bugzilla.suse.com/1119991"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.8,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2018-20126"
},
{
"cve": "CVE-2018-20191",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-20191"
}
],
"notes": [
{
"category": "general",
"text": "hw/rdma/vmw/pvrdma_main.c in QEMU does not implement a read operation (such as uar_read by analogy to uar_write), which allows attackers to cause a denial of service (NULL pointer dereference).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-20191",
"url": "https://www.suse.com/security/cve/CVE-2018-20191"
},
{
"category": "external",
"summary": "SUSE Bug 1119979 for CVE-2018-20191",
"url": "https://bugzilla.suse.com/1119979"
},
{
"category": "external",
"summary": "SUSE Bug 1119980 for CVE-2018-20191",
"url": "https://bugzilla.suse.com/1119980"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2018-20191"
},
{
"cve": "CVE-2018-20216",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-20216"
}
],
"notes": [
{
"category": "general",
"text": "QEMU can have an infinite loop in hw/rdma/vmw/pvrdma_dev_ring.c because return values are not checked (and -1 is mishandled).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-20216",
"url": "https://www.suse.com/security/cve/CVE-2018-20216"
},
{
"category": "external",
"summary": "SUSE Bug 1119984 for CVE-2018-20216",
"url": "https://bugzilla.suse.com/1119984"
},
{
"category": "external",
"summary": "SUSE Bug 1119985 for CVE-2018-20216",
"url": "https://bugzilla.suse.com/1119985"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2018-20216"
},
{
"cve": "CVE-2018-20815",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-20815"
}
],
"notes": [
{
"category": "general",
"text": "In QEMU 3.1.0, load_device_tree in device_tree.c calls the deprecated load_image function, which has a buffer overflow risk.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-20815",
"url": "https://www.suse.com/security/cve/CVE-2018-20815"
},
{
"category": "external",
"summary": "SUSE Bug 1118900 for CVE-2018-20815",
"url": "https://bugzilla.suse.com/1118900"
},
{
"category": "external",
"summary": "SUSE Bug 1130675 for CVE-2018-20815",
"url": "https://bugzilla.suse.com/1130675"
},
{
"category": "external",
"summary": "SUSE Bug 1130680 for CVE-2018-20815",
"url": "https://bugzilla.suse.com/1130680"
},
{
"category": "external",
"summary": "SUSE Bug 1138043 for CVE-2018-20815",
"url": "https://bugzilla.suse.com/1138043"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-20815",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-20815"
},
{
"cve": "CVE-2018-3639",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-3639"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-3639",
"url": "https://www.suse.com/security/cve/CVE-2018-3639"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1085235 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085235"
},
{
"category": "external",
"summary": "SUSE Bug 1085308 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1085308"
},
{
"category": "external",
"summary": "SUSE Bug 1087078 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087078"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1092631 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092631"
},
{
"category": "external",
"summary": "SUSE Bug 1092885 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1092885"
},
{
"category": "external",
"summary": "SUSE Bug 1094912 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1094912"
},
{
"category": "external",
"summary": "SUSE Bug 1098813 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1098813"
},
{
"category": "external",
"summary": "SUSE Bug 1100394 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1100394"
},
{
"category": "external",
"summary": "SUSE Bug 1102640 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1102640"
},
{
"category": "external",
"summary": "SUSE Bug 1105412 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1105412"
},
{
"category": "external",
"summary": "SUSE Bug 1111963 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1111963"
},
{
"category": "external",
"summary": "SUSE Bug 1172781 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172781"
},
{
"category": "external",
"summary": "SUSE Bug 1172782 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172782"
},
{
"category": "external",
"summary": "SUSE Bug 1172783 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1172783"
},
{
"category": "external",
"summary": "SUSE Bug 1173489 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1173489"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1215674 for CVE-2018-3639",
"url": "https://bugzilla.suse.com/1215674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-3639"
},
{
"cve": "CVE-2018-7858",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-7858"
}
],
"notes": [
{
"category": "general",
"text": "Quick Emulator (aka QEMU), when built with the Cirrus CLGD 54xx VGA Emulator support, allows local guest OS privileged users to cause a denial of service (out-of-bounds access and QEMU process crash) by leveraging incorrect region calculation when updating VGA display.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-7858",
"url": "https://www.suse.com/security/cve/CVE-2018-7858"
},
{
"category": "external",
"summary": "SUSE Bug 1084604 for CVE-2018-7858",
"url": "https://bugzilla.suse.com/1084604"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-7858"
},
{
"cve": "CVE-2019-03812",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-03812"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-03812",
"url": "https://www.suse.com/security/cve/CVE-2019-03812"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-03812"
},
{
"cve": "CVE-2019-11135",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11135"
}
],
"notes": [
{
"category": "general",
"text": "TSX Asynchronous Abort condition on some CPUs utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11135",
"url": "https://www.suse.com/security/cve/CVE-2019-11135"
},
{
"category": "external",
"summary": "SUSE Bug 1139073 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1139073"
},
{
"category": "external",
"summary": "SUSE Bug 1152497 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1152497"
},
{
"category": "external",
"summary": "SUSE Bug 1152505 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1152505"
},
{
"category": "external",
"summary": "SUSE Bug 1152506 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1152506"
},
{
"category": "external",
"summary": "SUSE Bug 1160120 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1160120"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1201877"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-11135"
},
{
"cve": "CVE-2019-12155",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-12155"
}
],
"notes": [
{
"category": "general",
"text": "interface_release_resource in hw/display/qxl.c in QEMU 3.1.x through 4.0.0 has a NULL pointer dereference.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-12155",
"url": "https://www.suse.com/security/cve/CVE-2019-12155"
},
{
"category": "external",
"summary": "SUSE Bug 1135902 for CVE-2019-12155",
"url": "https://bugzilla.suse.com/1135902"
},
{
"category": "external",
"summary": "SUSE Bug 1135905 for CVE-2019-12155",
"url": "https://bugzilla.suse.com/1135905"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.8,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2019-12155"
},
{
"cve": "CVE-2019-13164",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-13164"
}
],
"notes": [
{
"category": "general",
"text": "qemu-bridge-helper.c in QEMU 3.1 and 4.0.0 does not ensure that a network interface name (obtained from bridge.conf or a --br=bridge option) is limited to the IFNAMSIZ size, which can lead to an ACL bypass.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-13164",
"url": "https://www.suse.com/security/cve/CVE-2019-13164"
},
{
"category": "external",
"summary": "SUSE Bug 1140402 for CVE-2019-13164",
"url": "https://bugzilla.suse.com/1140402"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-13164"
},
{
"cve": "CVE-2019-14378",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-14378"
}
],
"notes": [
{
"category": "general",
"text": "ip_reass in ip_input.c in libslirp 4.0.0 has a heap-based buffer overflow via a large packet because it mishandles a case involving the first fragment.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-14378",
"url": "https://www.suse.com/security/cve/CVE-2019-14378"
},
{
"category": "external",
"summary": "SUSE Bug 1143794 for CVE-2019-14378",
"url": "https://bugzilla.suse.com/1143794"
},
{
"category": "external",
"summary": "SUSE Bug 1143797 for CVE-2019-14378",
"url": "https://bugzilla.suse.com/1143797"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2019-14378",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2019-14378"
},
{
"cve": "CVE-2019-15890",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-15890"
}
],
"notes": [
{
"category": "general",
"text": "libslirp 4.0.0, as used in QEMU 4.1.0, has a use-after-free in ip_reass in ip_input.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-15890",
"url": "https://www.suse.com/security/cve/CVE-2019-15890"
},
{
"category": "external",
"summary": "SUSE Bug 1149811 for CVE-2019-15890",
"url": "https://bugzilla.suse.com/1149811"
},
{
"category": "external",
"summary": "SUSE Bug 1149813 for CVE-2019-15890",
"url": "https://bugzilla.suse.com/1149813"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2019-15890",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-15890"
},
{
"cve": "CVE-2019-6778",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-6778"
}
],
"notes": [
{
"category": "general",
"text": "In QEMU 3.0.0, tcp_emu in slirp/tcp_subr.c has a heap-based buffer overflow.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-6778",
"url": "https://www.suse.com/security/cve/CVE-2019-6778"
},
{
"category": "external",
"summary": "SUSE Bug 1123156 for CVE-2019-6778",
"url": "https://bugzilla.suse.com/1123156"
},
{
"category": "external",
"summary": "SUSE Bug 1123157 for CVE-2019-6778",
"url": "https://bugzilla.suse.com/1123157"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2019-6778",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2019-6778"
},
{
"cve": "CVE-2019-8934",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-8934"
}
],
"notes": [
{
"category": "general",
"text": "hw/ppc/spapr.c in QEMU through 3.1.0 allows Information Exposure because the hypervisor shares the /proc/device-tree/system-id and /proc/device-tree/model system attributes with a guest.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-8934",
"url": "https://www.suse.com/security/cve/CVE-2019-8934"
},
{
"category": "external",
"summary": "SUSE Bug 1118900 for CVE-2019-8934",
"url": "https://bugzilla.suse.com/1118900"
},
{
"category": "external",
"summary": "SUSE Bug 1126455 for CVE-2019-8934",
"url": "https://bugzilla.suse.com/1126455"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2019-8934"
},
{
"cve": "CVE-2019-9824",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-9824"
}
],
"notes": [
{
"category": "general",
"text": "tcp_emu in slirp/tcp_subr.c (aka slirp/src/tcp_subr.c) in QEMU 3.0.0 uses uninitialized data in an snprintf call, leading to Information disclosure.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-9824",
"url": "https://www.suse.com/security/cve/CVE-2019-9824"
},
{
"category": "external",
"summary": "SUSE Bug 1118900 for CVE-2019-9824",
"url": "https://bugzilla.suse.com/1118900"
},
{
"category": "external",
"summary": "SUSE Bug 1129622 for CVE-2019-9824",
"url": "https://bugzilla.suse.com/1129622"
},
{
"category": "external",
"summary": "SUSE Bug 1129623 for CVE-2019-9824",
"url": "https://bugzilla.suse.com/1129623"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2019-9824",
"url": "https://bugzilla.suse.com/1178658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.8,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2019-9824"
},
{
"cve": "CVE-2020-10702",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-10702"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in QEMU in the implementation of the Pointer Authentication (PAuth) support for ARM introduced in version 4.0 and fixed in version 5.0.0. A general failure of the signature generation process caused every PAuth-enforced pointer to be signed with the same signature. A local attacker could obtain the signature of a protected pointer and abuse this flaw to bypass PAuth protection for all programs running on QEMU.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-10702",
"url": "https://www.suse.com/security/cve/CVE-2020-10702"
},
{
"category": "external",
"summary": "SUSE Bug 1168681 for CVE-2020-10702",
"url": "https://bugzilla.suse.com/1168681"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-10702"
},
{
"cve": "CVE-2020-10717",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-10717"
}
],
"notes": [
{
"category": "general",
"text": "A potential DoS flaw was found in the virtio-fs shared file system daemon (virtiofsd) implementation of the QEMU version \u003e= v5.0. Virtio-fs is meant to share a host file system directory with a guest via virtio-fs device. If the guest opens the maximum number of file descriptors under the shared directory, a denial of service may occur. This flaw allows a guest user/process to cause this denial of service on the host.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-10717",
"url": "https://www.suse.com/security/cve/CVE-2020-10717"
},
{
"category": "external",
"summary": "SUSE Bug 1171110 for CVE-2020-10717",
"url": "https://bugzilla.suse.com/1171110"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.8,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2020-10717"
},
{
"cve": "CVE-2020-10761",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-10761"
}
],
"notes": [
{
"category": "general",
"text": "An assertion failure issue was found in the Network Block Device(NBD) Server in all QEMU versions before QEMU 5.0.1. This flaw occurs when an nbd-client sends a spec-compliant request that is near the boundary of maximum permitted request length. A remote nbd-client could use this flaw to crash the qemu-nbd server resulting in a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-10761",
"url": "https://www.suse.com/security/cve/CVE-2020-10761"
},
{
"category": "external",
"summary": "SUSE Bug 1172710 for CVE-2020-10761",
"url": "https://bugzilla.suse.com/1172710"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2020-10761"
},
{
"cve": "CVE-2020-11102",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-11102"
}
],
"notes": [
{
"category": "general",
"text": "hw/net/tulip.c in QEMU 4.2.0 has a buffer overflow during the copying of tx/rx buffers because the frame size is not validated against the r/w data length.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-11102",
"url": "https://www.suse.com/security/cve/CVE-2020-11102"
},
{
"category": "external",
"summary": "SUSE Bug 1168713 for CVE-2020-11102",
"url": "https://bugzilla.suse.com/1168713"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2020-11102"
},
{
"cve": "CVE-2020-11869",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-11869"
}
],
"notes": [
{
"category": "general",
"text": "An integer overflow was found in QEMU 4.0.1 through 4.2.0 in the way it implemented ATI VGA emulation. This flaw occurs in the ati_2d_blt() routine in hw/display/ati-2d.c while handling MMIO write operations through the ati_mm_write() callback. A malicious guest could abuse this flaw to crash the QEMU process, resulting in a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-11869",
"url": "https://www.suse.com/security/cve/CVE-2020-11869"
},
{
"category": "external",
"summary": "SUSE Bug 1170537 for CVE-2020-11869",
"url": "https://bugzilla.suse.com/1170537"
},
{
"category": "external",
"summary": "SUSE Bug 1188609 for CVE-2020-11869",
"url": "https://bugzilla.suse.com/1188609"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-11869"
},
{
"cve": "CVE-2020-13361",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-13361"
}
],
"notes": [
{
"category": "general",
"text": "In QEMU 5.0.0 and earlier, es1370_transfer_audio in hw/audio/es1370.c does not properly validate the frame count, which allows guest OS users to trigger an out-of-bounds access during an es1370_write() operation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-13361",
"url": "https://www.suse.com/security/cve/CVE-2020-13361"
},
{
"category": "external",
"summary": "SUSE Bug 1172384 for CVE-2020-13361",
"url": "https://bugzilla.suse.com/1172384"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.9,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2020-13361"
},
{
"cve": "CVE-2020-13362",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-13362"
}
],
"notes": [
{
"category": "general",
"text": "In QEMU 5.0.0 and earlier, megasas_lookup_frame in hw/scsi/megasas.c has an out-of-bounds read via a crafted reply_queue_head field from a guest OS user.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-13362",
"url": "https://www.suse.com/security/cve/CVE-2020-13362"
},
{
"category": "external",
"summary": "SUSE Bug 1172383 for CVE-2020-13362",
"url": "https://bugzilla.suse.com/1172383"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.2,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2020-13362"
},
{
"cve": "CVE-2020-13659",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-13659"
}
],
"notes": [
{
"category": "general",
"text": "address_space_map in exec.c in QEMU 4.2.0 can trigger a NULL pointer dereference related to BounceBuffer.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-13659",
"url": "https://www.suse.com/security/cve/CVE-2020-13659"
},
{
"category": "external",
"summary": "SUSE Bug 1172386 for CVE-2020-13659",
"url": "https://bugzilla.suse.com/1172386"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-13659"
},
{
"cve": "CVE-2020-13800",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-13800"
}
],
"notes": [
{
"category": "general",
"text": "ati-vga in hw/display/ati.c in QEMU 4.2.0 allows guest OS users to trigger infinite recursion via a crafted mm_index value during an ati_mm_read or ati_mm_write call.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-13800",
"url": "https://www.suse.com/security/cve/CVE-2020-13800"
},
{
"category": "external",
"summary": "SUSE Bug 1172495 for CVE-2020-13800",
"url": "https://bugzilla.suse.com/1172495"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-13800"
},
{
"cve": "CVE-2020-14364",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-14364"
}
],
"notes": [
{
"category": "general",
"text": "An out-of-bounds read/write access flaw was found in the USB emulator of the QEMU in versions before 5.2.0. This issue occurs while processing USB packets from a guest when USBDevice \u0027setup_len\u0027 exceeds its \u0027data_buf[4096]\u0027 in the do_token_in, do_token_out routines. This flaw allows a guest user to crash the QEMU process, resulting in a denial of service, or the potential execution of arbitrary code with the privileges of the QEMU process on the host.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-14364",
"url": "https://www.suse.com/security/cve/CVE-2020-14364"
},
{
"category": "external",
"summary": "SUSE Bug 1175441 for CVE-2020-14364",
"url": "https://bugzilla.suse.com/1175441"
},
{
"category": "external",
"summary": "SUSE Bug 1175534 for CVE-2020-14364",
"url": "https://bugzilla.suse.com/1175534"
},
{
"category": "external",
"summary": "SUSE Bug 1176494 for CVE-2020-14364",
"url": "https://bugzilla.suse.com/1176494"
},
{
"category": "external",
"summary": "SUSE Bug 1177130 for CVE-2020-14364",
"url": "https://bugzilla.suse.com/1177130"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-14364"
},
{
"cve": "CVE-2020-16092",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-16092"
}
],
"notes": [
{
"category": "general",
"text": "In QEMU through 5.0.0, an assertion failure can occur in the network packet processing. This issue affects the e1000e and vmxnet3 network devices. A malicious guest user/process could use this flaw to abort the QEMU process on the host, resulting in a denial of service condition in net_tx_pkt_add_raw_fragment in hw/net/net_tx_pkt.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-16092",
"url": "https://www.suse.com/security/cve/CVE-2020-16092"
},
{
"category": "external",
"summary": "SUSE Bug 1174641 for CVE-2020-16092",
"url": "https://bugzilla.suse.com/1174641"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.8,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-16092"
},
{
"cve": "CVE-2020-1711",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-1711"
}
],
"notes": [
{
"category": "general",
"text": "An out-of-bounds heap buffer access flaw was found in the way the iSCSI Block driver in QEMU versions 2.12.0 before 4.2.1 handled a response coming from an iSCSI server while checking the status of a Logical Address Block (LBA) in an iscsi_co_block_status() routine. A remote user could use this flaw to crash the QEMU process, resulting in a denial of service or potential execution of arbitrary code with privileges of the QEMU process on the host.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-1711",
"url": "https://www.suse.com/security/cve/CVE-2020-1711"
},
{
"category": "external",
"summary": "SUSE Bug 1166240 for CVE-2020-1711",
"url": "https://bugzilla.suse.com/1166240"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.6,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2020-1711"
},
{
"cve": "CVE-2020-17380",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-17380"
}
],
"notes": [
{
"category": "general",
"text": "A heap-based buffer overflow was found in QEMU through 5.0.0 in the SDHCI device emulation support. It could occur while doing a multi block SDMA transfer via the sdhci_sdma_transfer_multi_blocks() routine in hw/sd/sdhci.c. A guest user or process could use this flaw to crash the QEMU process on the host, resulting in a denial of service condition, or potentially execute arbitrary code with privileges of the QEMU process on the host.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-17380",
"url": "https://www.suse.com/security/cve/CVE-2020-17380"
},
{
"category": "external",
"summary": "SUSE Bug 1175144 for CVE-2020-17380",
"url": "https://bugzilla.suse.com/1175144"
},
{
"category": "external",
"summary": "SUSE Bug 1182282 for CVE-2020-17380",
"url": "https://bugzilla.suse.com/1182282"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-17380"
},
{
"cve": "CVE-2020-1983",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-1983"
}
],
"notes": [
{
"category": "general",
"text": "A use after free vulnerability in ip_reass() in ip_input.c of libslirp 4.2.0 and prior releases allows crafted packets to cause a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-1983",
"url": "https://www.suse.com/security/cve/CVE-2020-1983"
},
{
"category": "external",
"summary": "SUSE Bug 1170940 for CVE-2020-1983",
"url": "https://bugzilla.suse.com/1170940"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2020-1983"
},
{
"cve": "CVE-2020-25085",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-25085"
}
],
"notes": [
{
"category": "general",
"text": "QEMU 5.0.0 has a heap-based Buffer Overflow in flatview_read_continue in exec.c because hw/sd/sdhci.c mishandles a write operation in the SDHC_BLKSIZE case.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-25085",
"url": "https://www.suse.com/security/cve/CVE-2020-25085"
},
{
"category": "external",
"summary": "SUSE Bug 1176681 for CVE-2020-25085",
"url": "https://bugzilla.suse.com/1176681"
},
{
"category": "external",
"summary": "SUSE Bug 1182282 for CVE-2020-25085",
"url": "https://bugzilla.suse.com/1182282"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-25085"
},
{
"cve": "CVE-2020-25723",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-25723"
}
],
"notes": [
{
"category": "general",
"text": "A reachable assertion issue was found in the USB EHCI emulation code of QEMU. It could occur while processing USB requests due to missing handling of DMA memory map failure. A malicious privileged user within the guest may abuse this flaw to send bogus USB requests and crash the QEMU process on the host, resulting in a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-25723",
"url": "https://www.suse.com/security/cve/CVE-2020-25723"
},
{
"category": "external",
"summary": "SUSE Bug 1178934 for CVE-2020-25723",
"url": "https://bugzilla.suse.com/1178934"
},
{
"category": "external",
"summary": "SUSE Bug 1178935 for CVE-2020-25723",
"url": "https://bugzilla.suse.com/1178935"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.2,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2020-25723"
},
{
"cve": "CVE-2020-27821",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-27821"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the memory management API of QEMU during the initialization of a memory region cache. This issue could lead to an out-of-bounds write access to the MSI-X table while performing MMIO operations. A guest user may abuse this flaw to crash the QEMU process on the host, resulting in a denial of service. This flaw affects QEMU versions prior to 5.2.0.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-27821",
"url": "https://www.suse.com/security/cve/CVE-2020-27821"
},
{
"category": "external",
"summary": "SUSE Bug 1179686 for CVE-2020-27821",
"url": "https://bugzilla.suse.com/1179686"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-27821"
},
{
"cve": "CVE-2020-29129",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-29129"
}
],
"notes": [
{
"category": "general",
"text": "ncsi.c in libslirp through 4.3.1 has a buffer over-read because it tries to read a certain amount of header data even if that exceeds the total packet length.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-29129",
"url": "https://www.suse.com/security/cve/CVE-2020-29129"
},
{
"category": "external",
"summary": "SUSE Bug 1179466 for CVE-2020-29129",
"url": "https://bugzilla.suse.com/1179466"
},
{
"category": "external",
"summary": "SUSE Bug 1179467 for CVE-2020-29129",
"url": "https://bugzilla.suse.com/1179467"
},
{
"category": "external",
"summary": "SUSE Bug 1179477 for CVE-2020-29129",
"url": "https://bugzilla.suse.com/1179477"
},
{
"category": "external",
"summary": "SUSE Bug 1179484 for CVE-2020-29129",
"url": "https://bugzilla.suse.com/1179484"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-29129"
},
{
"cve": "CVE-2020-7039",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-7039"
}
],
"notes": [
{
"category": "general",
"text": "tcp_emu in tcp_subr.c in libslirp 4.1.0, as used in QEMU 4.2.0, mismanages memory, as demonstrated by IRC DCC commands in EMU_IRC. This can cause a heap-based buffer overflow or other out-of-bounds access which can lead to a DoS or potential execute arbitrary code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-7039",
"url": "https://www.suse.com/security/cve/CVE-2020-7039"
},
{
"category": "external",
"summary": "SUSE Bug 1161066 for CVE-2020-7039",
"url": "https://bugzilla.suse.com/1161066"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2020-7039"
},
{
"cve": "CVE-2020-8608",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-8608"
}
],
"notes": [
{
"category": "general",
"text": "In libslirp 4.1.0, as used in QEMU 4.2.0, tcp_subr.c misuses snprintf return values, leading to a buffer overflow in later code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-8608",
"url": "https://www.suse.com/security/cve/CVE-2020-8608"
},
{
"category": "external",
"summary": "SUSE Bug 1163018 for CVE-2020-8608",
"url": "https://bugzilla.suse.com/1163018"
},
{
"category": "external",
"summary": "SUSE Bug 1163019 for CVE-2020-8608",
"url": "https://bugzilla.suse.com/1163019"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2020-8608"
},
{
"cve": "CVE-2021-20181",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-20181"
}
],
"notes": [
{
"category": "general",
"text": "A race condition flaw was found in the 9pfs server implementation of QEMU up to and including 5.2.0. This flaw allows a malicious 9p client to cause a use-after-free error, potentially escalating their privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity as well as system availability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-20181",
"url": "https://www.suse.com/security/cve/CVE-2021-20181"
},
{
"category": "external",
"summary": "SUSE Bug 1182137 for CVE-2021-20181",
"url": "https://bugzilla.suse.com/1182137"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2021-20181"
},
{
"cve": "CVE-2021-20203",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-20203"
}
],
"notes": [
{
"category": "general",
"text": "An integer overflow issue was found in the vmxnet3 NIC emulator of the QEMU for versions up to v5.2.0. It may occur if a guest was to supply invalid values for rx/tx queue size or other NIC parameters. A privileged guest user may use this flaw to crash the QEMU process on the host resulting in DoS scenario.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-20203",
"url": "https://www.suse.com/security/cve/CVE-2021-20203"
},
{
"category": "external",
"summary": "SUSE Bug 1181639 for CVE-2021-20203",
"url": "https://bugzilla.suse.com/1181639"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.2,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2021-20203"
},
{
"cve": "CVE-2021-20221",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-20221"
}
],
"notes": [
{
"category": "general",
"text": "An out-of-bounds heap buffer access issue was found in the ARM Generic Interrupt Controller emulator of QEMU up to and including qemu 4.2.0on aarch64 platform. The issue occurs because while writing an interrupt ID to the controller memory area, it is not masked to be 4 bits wide. It may lead to the said issue while updating controller state fields and their subsequent processing. A privileged guest user may use this flaw to crash the QEMU process on the host resulting in DoS scenario.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-20221",
"url": "https://www.suse.com/security/cve/CVE-2021-20221"
},
{
"category": "external",
"summary": "SUSE Bug 1181933 for CVE-2021-20221",
"url": "https://bugzilla.suse.com/1181933"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-20221"
},
{
"cve": "CVE-2021-20257",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-20257"
}
],
"notes": [
{
"category": "general",
"text": "An infinite loop flaw was found in the e1000 NIC emulator of the QEMU. This issue occurs while processing transmits (tx) descriptors in process_tx_desc if various descriptor fields are initialized with invalid values. This flaw allows a guest to consume CPU cycles on the host, resulting in a denial of service. The highest threat from this vulnerability is to system availability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-20257",
"url": "https://www.suse.com/security/cve/CVE-2021-20257"
},
{
"category": "external",
"summary": "SUSE Bug 1182577 for CVE-2021-20257",
"url": "https://bugzilla.suse.com/1182577"
},
{
"category": "external",
"summary": "SUSE Bug 1182846 for CVE-2021-20257",
"url": "https://bugzilla.suse.com/1182846"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.2,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2021-20257"
},
{
"cve": "CVE-2021-20263",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-20263"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the virtio-fs shared file system daemon (virtiofsd) of QEMU. The new \u0027xattrmap\u0027 option may cause the \u0027security.capability\u0027 xattr in the guest to not drop on file write, potentially leading to a modified, privileged executable in the guest. In rare circumstances, this flaw could be used by a malicious user to elevate their privileges within the guest.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-20263",
"url": "https://www.suse.com/security/cve/CVE-2021-20263"
},
{
"category": "external",
"summary": "SUSE Bug 1183373 for CVE-2021-20263",
"url": "https://bugzilla.suse.com/1183373"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2021-20263"
},
{
"cve": "CVE-2021-3416",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3416"
}
],
"notes": [
{
"category": "general",
"text": "A potential stack overflow via infinite loop issue was found in various NIC emulators of QEMU in versions up to and including 5.2.0. The issue occurs in loopback mode of a NIC wherein reentrant DMA checks get bypassed. A guest user/process may use this flaw to consume CPU cycles or crash the QEMU process on the host resulting in DoS scenario.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3416",
"url": "https://www.suse.com/security/cve/CVE-2021-3416"
},
{
"category": "external",
"summary": "SUSE Bug 1182968 for CVE-2021-3416",
"url": "https://bugzilla.suse.com/1182968"
},
{
"category": "external",
"summary": "SUSE Bug 1186473 for CVE-2021-3416",
"url": "https://bugzilla.suse.com/1186473"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.2,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2021-3416"
},
{
"cve": "CVE-2021-3527",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3527"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the USB redirector device (usb-redir) of QEMU. Small USB packets are combined into a single, large transfer request, to reduce the overhead and improve performance. The combined size of the bulk transfer is used to dynamically allocate a variable length array (VLA) on the stack without proper validation. Since the total size is not bounded, a malicious guest could use this flaw to influence the array length and cause the QEMU process to perform an excessive allocation on the stack, resulting in a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3527",
"url": "https://www.suse.com/security/cve/CVE-2021-3527"
},
{
"category": "external",
"summary": "SUSE Bug 1186012 for CVE-2021-3527",
"url": "https://bugzilla.suse.com/1186012"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.8,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2021-3527"
},
{
"cve": "CVE-2021-3544",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3544"
}
],
"notes": [
{
"category": "general",
"text": "Several memory leaks were found in the virtio vhost-user GPU device (vhost-user-gpu) of QEMU in versions up to and including 6.0. They exist in contrib/vhost-user-gpu/vhost-user-gpu.c and contrib/vhost-user-gpu/virgl.c due to improper release of memory (i.e., free) after effective lifetime.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3544",
"url": "https://www.suse.com/security/cve/CVE-2021-3544"
},
{
"category": "external",
"summary": "SUSE Bug 1186010 for CVE-2021-3544",
"url": "https://bugzilla.suse.com/1186010"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-3544"
},
{
"cve": "CVE-2021-3545",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3545"
}
],
"notes": [
{
"category": "general",
"text": "An information disclosure vulnerability was found in the virtio vhost-user GPU device (vhost-user-gpu) of QEMU in versions up to and including 6.0. The flaw exists in virgl_cmd_get_capset_info() in contrib/vhost-user-gpu/virgl.c and could occur due to the read of uninitialized memory. A malicious guest could exploit this issue to leak memory from the host.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3545",
"url": "https://www.suse.com/security/cve/CVE-2021-3545"
},
{
"category": "external",
"summary": "SUSE Bug 1185990 for CVE-2021-3545",
"url": "https://bugzilla.suse.com/1185990"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-3545"
},
{
"cve": "CVE-2021-3546",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3546"
}
],
"notes": [
{
"category": "general",
"text": "An out-of-bounds write vulnerability was found in the virtio vhost-user GPU device (vhost-user-gpu) of QEMU in versions up to and including 6.0. The flaw occurs while processing the \u0027VIRTIO_GPU_CMD_GET_CAPSET\u0027 command from the guest. It could allow a privileged guest user to crash the QEMU process on the host, resulting in a denial of service condition, or potential code execution with the privileges of the QEMU process.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3546",
"url": "https://www.suse.com/security/cve/CVE-2021-3546"
},
{
"category": "external",
"summary": "SUSE Bug 1185981 for CVE-2021-3546",
"url": "https://bugzilla.suse.com/1185981"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-3546"
},
{
"cve": "CVE-2021-3582",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3582"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the QEMU implementation of VMWare\u0027s paravirtual RDMA device. The issue occurs while handling a \"PVRDMA_CMD_CREATE_MR\" command due to improper memory remapping (mremap). This flaw allows a malicious guest to crash the QEMU process on the host. The highest threat from this vulnerability is to system availability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3582",
"url": "https://www.suse.com/security/cve/CVE-2021-3582"
},
{
"category": "external",
"summary": "SUSE Bug 1187499 for CVE-2021-3582",
"url": "https://bugzilla.suse.com/1187499"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.2,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2021-3582"
},
{
"cve": "CVE-2021-3607",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3607"
}
],
"notes": [
{
"category": "general",
"text": "An integer overflow was found in the QEMU implementation of VMWare\u0027s paravirtual RDMA device in versions prior to 6.1.0. The issue occurs while handling a \"PVRDMA_REG_DSRHIGH\" write from the guest due to improper input validation. This flaw allows a privileged guest user to make QEMU allocate a large amount of memory, resulting in a denial of service. The highest threat from this vulnerability is to system availability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3607",
"url": "https://www.suse.com/security/cve/CVE-2021-3607"
},
{
"category": "external",
"summary": "SUSE Bug 1187539 for CVE-2021-3607",
"url": "https://bugzilla.suse.com/1187539"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.2,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2021-3607"
},
{
"cve": "CVE-2021-3608",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3608"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the QEMU implementation of VMWare\u0027s paravirtual RDMA device in versions prior to 6.1.0. The issue occurs while handling a \"PVRDMA_REG_DSRHIGH\" write from the guest and may result in a crash of QEMU or cause undefined behavior due to the access of an uninitialized pointer. The highest threat from this vulnerability is to system availability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3608",
"url": "https://www.suse.com/security/cve/CVE-2021-3608"
},
{
"category": "external",
"summary": "SUSE Bug 1187538 for CVE-2021-3608",
"url": "https://bugzilla.suse.com/1187538"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.2,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2021-3608"
},
{
"cve": "CVE-2021-3682",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3682"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the USB redirector device emulation of QEMU in versions prior to 6.1.0-rc2. It occurs when dropping packets during a bulk transfer from a SPICE client due to the packet queue being full. A malicious SPICE client could use this flaw to make QEMU call free() with faked heap chunk metadata, resulting in a crash of QEMU or potential code execution with the privileges of the QEMU process on the host.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3682",
"url": "https://www.suse.com/security/cve/CVE-2021-3682"
},
{
"category": "external",
"summary": "SUSE Bug 1189145 for CVE-2021-3682",
"url": "https://bugzilla.suse.com/1189145"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:qemu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-qtest-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-accel-tcg-x86-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-arm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-alsa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-jack-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-pa-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-audio-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-curl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-dmg-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-gluster-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-iscsi-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-nfs-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-rbd-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-block-ssh-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-baum-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-chardev-spice-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-extra-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-guest-agent-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-qxl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-gpu-pci-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-display-virtio-vga-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-s390x-virtio-gpu-ccw-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-host-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-redirect-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-hw-usb-smartcard-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.s390x",
"openSUSE Tumbleweed:qemu-ipxe-1.0.0+-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ivshmem-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ksm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-kvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-lang-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-microvm-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ppc-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-s390x-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-seabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.aarch64",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.s390x",
"openSUSE Tumbleweed:qemu-sgabios-8-32.1.x86_64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-skiboot-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-tools-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-curses-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-gtk-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-opengl-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-app-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-ui-spice-core-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.s390x",
"openSUSE Tumbleweed:qemu-vgabios-1.14.0_0_g155821a-32.1.x86_64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-vhost-user-gpu-6.1.0-32.1.x86_64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.aarch64",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.ppc64le",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.s390x",
"openSUSE Tumbleweed:qemu-x86-6.1.0-32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-3682"
}
]
}
opensuse-su-2019:2507-1
Vulnerability from csaf_opensuse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\n\nThe openSUSE Leap 15.1 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2019-0154: An unprotected read access to i915 registers has been fixed that could have been abused to facilitate a local denial-of-service attack. (bsc#1135966)\n- CVE-2019-0155: A privilege escalation vulnerability has been fixed in the i915 module that allowed batch buffers from user mode to gain super user privileges. (bsc#1135967)\n- CVE-2019-16231: drivers/net/fjes/fjes_main.c did not check the alloc_workqueue return value, leading to a NULL pointer dereference (bnc#1150466).\n- CVE-2019-18805: There was a net/ipv4/tcp_input.c signed integer overflow in tcp_ack_update_rtt() when userspace writes a very large integer to /proc/sys/net/ipv4/tcp_min_rtt_wlen, leading to a denial of service or possibly unspecified other impact, aka CID-19fad20d15a6 (bnc#1156187).\n- CVE-2019-17055: base_sock_create in drivers/isdn/mISDN/socket.c in the AF_ISDN network module did not enforce CAP_NET_RAW, which means that unprivileged users can create a raw socket, aka CID-b91ee4aa2a21 (bnc#1152782).\n- CVE-2019-11135: Aborting an asynchronous TSX operation on Intel CPUs with Transactional Memory support could be used to facilitate sidechannel information leaks out of microarchitectural buffers, similar to the previously described \u0027Microarchitectural Data Sampling\u0027 attack.\n\n The Linux kernel was supplemented with the option to disable TSX operation altogether (requiring CPU Microcode updates on older systems) and better flushing of microarchitectural buffers (VERW).\n\n The set of options available is described in our TID at https://www.suse.com/support/kb/doc/?id=7024251\n- CVE-2018-12207: Untrusted virtual machines on Intel CPUs could exploit a race condition in the Instruction Fetch Unit of the Intel CPU to cause a Machine Exception during Page Size Change, causing the CPU core to be non-functional.\n\n The Linux Kernel kvm hypervisor was adjusted to avoid page size changes in executable pages by splitting / merging huge pages into small pages as needed.\n\n More information can be found on https://www.suse.com/support/kb/doc/?id=7023735\n- CVE-2019-10220: Added sanity checks on the pathnames passed to the user space. (bsc#1144903).\n\nThe following non-security bugs were fixed:\n\n- ALSA: bebob: Fix prototype of helper function to return negative value (bsc#1051510).\n- ALSA: bebob: fix to detect configured source of sampling clock for Focusrite Saffire Pro i/o series (git-fixes).\n- ALSA: firewire-motu: add support for MOTU 4pre (bsc#1111666).\n- ALSA: hda/ca0132 - Fix possible workqueue stall (bsc#1155836).\n- ALSA: hda/realtek - Add support for ALC623 (bsc#1051510).\n- ALSA: hda/realtek - Fix 2 front mics of codec 0x623 (bsc#1051510).\n- ALSA: timer: Fix incorrectly assigned timer instance (git-fixes).\n- ALSA: timer: Fix mutex deadlock at releasing card (bsc#1051510).\n- ALSA: usb-audio: Add DSD support for Gustard U16/X26 USB Interface (bsc#1051510).\n- ALSA: usb-audio: Disable quirks for BOSS Katana amplifiers (bsc#1111666).\n- ALSA: usb-audio: Fix copy\u0026paste error in the validator (bsc#1111666).\n- arm64: Add decoding macros for CP15_32 and CP15_64 traps (jsc#ECO-561).\n- arm64: Add part number for Neoverse N1 (jsc#ECO-561).\n- arm64: Add silicon-errata.txt entry for ARM erratum 1188873 (jsc#ECO-561).\n- arm64: Add support for new control bits CTR_EL0.DIC and CTR_EL0.IDC (jsc#ECO-561,jsc#SLE-10671).\n- arm64: Apply ARM64_ERRATUM_1188873 to Neoverse-N1 (jsc#ECO-561).\n- arm64: arch_timer: Add workaround for ARM erratum 1188873 (jsc#ECO-561).\n- arm64: arch_timer: avoid unused function warning (jsc#ECO-561).\n- arm64: compat: Add CNTFRQ trap handler (jsc#ECO-561).\n- arm64: compat: Add CNTVCT trap handler (jsc#ECO-561).\n- arm64: compat: Add condition code checks and IT advance (jsc#ECO-561).\n- arm64: compat: Add cp15_32 and cp15_64 handler arrays (jsc#ECO-561).\n- arm64: compat: Add separate CP15 trapping hook (jsc#ECO-561).\n- arm64: compat: Workaround Neoverse-N1 #1542419 for compat user-space (jsc#ECO-561,jsc#SLE-10671).\n- arm64: cpu_errata: Remove ARM64_MISMATCHED_CACHE_LINE_SIZE (jsc#ECO-561,jsc#SLE-10671).\n- arm64/cpufeature: Convert hook_lock to raw_spin_lock_t in cpu_enable_ssbs() (jsc#ECO-561).\n- arm64: cpufeature: ctr: Fix cpu capability check for late CPUs (jsc#ECO-561,jsc#SLE-10671).\n- arm64: cpufeature: Detect SSBS and advertise to userspace (jsc#ECO-561).\n- arm64: cpufeature: Fix handling of CTR_EL0.IDC field (jsc#ECO-561,jsc#SLE-10671).\n- arm64: cpufeature: Trap CTR_EL0 access only where it is necessary (jsc#ECO-561,jsc#SLE-10671).\n- arm64: cpu: Move errata and feature enable callbacks closer to callers (jsc#ECO-561).\n- arm64: entry: Allow handling of undefined instructions from EL1 (jsc#ECO-561).\n- arm64: errata: Hide CTR_EL0.DIC on systems affected by Neoverse-N1 #1542419 (jsc#ECO-561,jsc#SLE-10671).\n- arm64: Fake the IminLine size on systems affected by Neoverse-N1 #1542419 (jsc#ECO-561,jsc#SLE-10671).\n- arm64: Fix mismatched cache line size detection (jsc#ECO-561,jsc#SLE-10671).\n- arm64: Fix silly typo in comment (jsc#ECO-561).\n- arm64: fix SSBS sanitization (jsc#ECO-561).\n- arm64: force_signal_inject: WARN if called from kernel context (jsc#ECO-561).\n- arm64: Force SSBS on context switch (jsc#ECO-561).\n- arm64: Handle erratum 1418040 as a superset of erratum 1188873 (jsc#ECO-561).\n- arm64: Introduce sysreg_clear_set() (jsc#ECO-561).\n- arm64: kill change_cpacr() (jsc#ECO-561).\n- arm64: kill config_sctlr_el1() (jsc#ECO-561).\n- arm64: KVM: Add invalidate_icache_range helper (jsc#ECO-561,jsc#SLE-10671).\n- arm64: KVM: PTE/PMD S2 XN bit definition (jsc#ECO-561,jsc#SLE-10671).\n- arm64: Make ARM64_ERRATUM_1188873 depend on COMPAT (jsc#ECO-561).\n- arm64: move SCTLR_EL{1,2} assertions to \u0026lt;asm/sysreg.h\u003e (jsc#ECO-561).\n- arm64: Restrict ARM64_ERRATUM_1188873 mitigation to AArch32 (jsc#ECO-561).\n- arm64: ssbd: Add support for PSTATE.SSBS rather than trapping to EL3 (jsc#ECO-561).\n- arm64: ssbd: Drop #ifdefs for PR_SPEC_STORE_BYPASS (jsc#ECO-561).\n- arm: KVM: Add optimized PIPT icache flushing (jsc#ECO-561,jsc#SLE-10671).\n- ath10k: assign \u0027n_cipher_suites = 11\u0027 for WCN3990 to enable WPA3 (bsc#1111666).\n- brcmfmac: sdio: Disable auto-tuning around commands expected to fail (bsc#1111666).\n- brcmfmac: sdio: Do not tune while the card is off (bsc#1111666).\n- can: dev: call netif_carrier_off() in register_candev() (bsc#1051510).\n- config: arm64: enable erratum 1418040 and 1542419\n- dmaengine: bcm2835: Print error in case setting DMA mask fails (bsc#1051510).\n- dmaengine: imx-sdma: fix size check for sdma script_number (bsc#1051510).\n- drm/amd/display: fix odm combine pipe reset (bsc#1111666).\n- drm/amdgpu: fix memory leak (bsc#1111666).\n- drm/amdgpu/powerplay/vega10: allow undervolting in p7 (bsc#1111666).\n- drm/i915: Add gen9 BCS cmdparsing (bsc#1135967)\n- drm/i915: Add gen9 BCS cmdparsing (bsc#1135967)\n- drm/i915: Add support for mandatory cmdparsing (bsc#1135967)\n- drm/i915: Add support for mandatory cmdparsing (bsc#1135967)\n- drm/i915: Allow parsing of unsized batches (bsc#1135967)\n- drm/i915: Allow parsing of unsized batches (bsc#1135967)\n- drm/i915/cmdparser: Add support for backward jumps (bsc#1135967)\n- drm/i915/cmdparser: Add support for backward jumps (bsc#1135967)\n- drm/i915/cmdparser: Ignore Length operands during (bsc#1135967)\n- drm/i915/cmdparser: Ignore Length operands during command matching (bsc#1135967)\n- drm/i915/cmdparser: Use explicit goto for error paths (bsc#1135967)\n- drm/i915/cmdparser: Use explicit goto for error paths (bsc#1135967)\n- drm/i915/cml: Add second PCH ID for CMP (bsc#1111666).\n- drm/i915: Disable Secure Batches for gen6+\n- drm/i915: Disable Secure Batches for gen6+ (bsc#1135967)\n- drm/i915/gen8+: Add RC6 CTX corruption WA (bsc#1135967)\n- drm/i915/gen8+: Add RC6 CTX corruption WA (bsc#1135967)\n- drm/i915/gtt: Add read only pages to gen8_pte_encode (bsc#1135967)\n- drm/i915/gtt: Disable read-only support under GVT (bsc#1135967)\n- drm/i915/gtt: Read-only pages for insert_entries on bdw (bsc#1135967)\n- drm/i915/ilk: Fix warning when reading emon_status with no output (bsc#1111666).\n- drm/i915: Lower RM timeout to avoid DSI hard hangs (bsc#1135967)\n- drm/i915: Lower RM timeout to avoid DSI hard hangs (bsc#1135967)\n- drm/i915: Prevent writing into a read-only object via a GGTT mmap (bsc#1135967)\n- drm/i915: Remove Master tables from cmdparser\n- drm/i915: Remove Master tables from cmdparser (bsc#1135967)\n- drm/i915: Rename gen7 cmdparser tables (bsc#1135967)\n- drm/i915: Rename gen7 cmdparser tables (bsc#1135967)\n- drm/i915: Support ro ppgtt mapped cmdparser shadow (bsc#1135967)\n- drm/i915: Support ro ppgtt mapped cmdparser shadow buffers (bsc#1135967)\n- drm/msm/dpu: handle failures while initializing displays (bsc#1111666).\n- hyperv: set nvme msi interrupts to unmanaged (jsc#SLE-8953, jsc#SLE-9221, jsc#SLE-4941, bsc#1119461, bsc#1119465, bsc#1138190, bsc#1154905).\n- IB/core: Add mitigation for Spectre V1 (bsc#1155671)\n- integrity: prevent deadlock during digsig verification (bsc#1090631).\n- irqchip/gic-v3-its: Fix command queue pointer comparison bug (jsc#ECO-561).\n- irqchip/gic-v3-its: Fix LPI release for Multi-MSI devices (jsc#ECO-561).\n- irqchip/gic-v3-its: Fix misuse of GENMASK macro (jsc#ECO-561).\n- iwlwifi: do not panic in error path on non-msix systems (bsc#1155692).\n- iwlwifi: exclude GEO SAR support for 3168 (bsc#1111666).\n- iwlwifi: exclude GEO SAR support for 3168 (git-fixes).\n- iwlwifi: fw: do not send GEO_TX_POWER_LIMIT command to FW version 36 (bsc#1111666).\n- kabi protect enum RDMA_DRIVER_EFA (jsc#SLE-4805)\n- kABI workaround for drm_vma_offset_node readonly field addition (bsc#1135967)\n- kABI workaround for mmc_host retune_crc_disable flag addition (bsc#1111666).\n- KVM: arm64: Set SCTLR_EL2.DSSBS if SSBD is forcefully disabled and !vhe (jsc#ECO-561).\n- KVM: arm/arm64: Clean dcache to PoC when changing PTE due to CoW (jsc#ECO-561,jsc#SLE-10671).\n- KVM: arm/arm64: Detangle kvm_mmu.h from kvm_hyp.h (jsc#ECO-561,jsc#SLE-10671).\n- KVM: arm/arm64: Drop vcpu parameter from guest cache maintenance operartions (jsc#ECO-561,jsc#SLE-10671).\n- KVM: arm/arm64: Limit icache invalidation to prefetch aborts (jsc#ECO-561,jsc#SLE-10671).\n- KVM: arm/arm64: Only clean the dcache on translation fault (jsc#ECO-561,jsc#SLE-10671).\n- KVM: arm/arm64: Preserve Exec permission across R/W permission faults (jsc#ECO-561,jsc#SLE-10671).\n- KVM: arm/arm64: Split dcache/icache flushing (jsc#ECO-561,jsc#SLE-10671).\n- KVM: vmx, svm: always run with EFER.NXE=1 when shadow paging is active (bsc#1117665).\n- md/raid0: avoid RAID0 data corruption due to layout confusion (bsc#1140090).\n- md/raid0: fix warning message for parameter default_layout (bsc#1140090).\n- mmc: core: Add sdio_retune_hold_now() and sdio_retune_release() (bsc#1111666).\n- mmc: core: API to temporarily disable retuning for SDIO CRC errors (bsc#1111666).\n- Move upstreamed CA0132 fix into sorted section\n- net: openvswitch: free vport unless register_netdevice() succeeds (git-fixes).\n- phylink: fix kernel-doc warnings (bsc#1111666).\n- power: supply: max14656: fix potential use-after-free (bsc#1051510).\n- RDMA/efa: Add Amazon EFA driver (jsc#SLE-4805)\n- RDMA/hns: Add reset process for function-clear (bsc#1155061).\n- RDMA/hns: Remove the some magic number (bsc#1155061).\n- RDMA/restrack: Track driver QP types in resource tracker (jsc#SLE-4805)\n- Revert \u0027ALSA: hda: Flush interrupts on disabling\u0027 (bsc#1051510).\n- Revert synaptics-rmi4 patch due to regression (bsc#1155982) Also blacklisting it\n- rpm/kernel-subpackage-spec: Mention debuginfo in the subpackage description (bsc#1149119).\n- s390: add support for IBM z15 machines (bsc#1152696 LTC#181731).\n- s390/cpumsf: Check for CPU Measurement sampling (bsc#1153681 LTC#181855).\n- s390: fix setting of mio addressing control (bsc#1152665 LTC#181729).\n- s390/pci: add mio_enabled attribute (bsc#1152665 LTC#181729).\n- s390/pci: correctly handle MIO opt-out (bsc#1152665 LTC#181729).\n- s390/pci: deal with devices that have no support for MIO instructions (bsc#1152665 LTC#181729).\n- s390/pci: fix MSI message data (bsc#1152697 LTC#181730).\n- sc16is7xx: Fix for \u0027Unexpected interrupt: 8\u0027 (bsc#1051510).\n- sched/fair: Avoid divide by zero when rebalancing domains (bsc#1096254).\n- scsi: lpfc: Limit xri count for kdump environment (bsc#1154124).\n- scsi: qla2xxx: Add error handling for PLOGI ELS passthrough (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Capture FW dump on MPI heartbeat stop event (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Check for MB timeout while capturing ISP27/28xx FW dump (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Do command completion on abort timeout (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: qla2xxx: do not use zero for FC4_PRIORITY_NVME (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: qla2xxx: Dual FCP-NVMe target port support (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Fix a dma_pool_free() call (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: qla2xxx: Fix device connect issues in P2P configuration (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: qla2xxx: Fix double scsi_done for abort path (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: qla2xxx: Fix driver unload hang (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: qla2xxx: Fix memory leak when sending I/O fails (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: qla2xxx: Fix N2N link reset (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Fix N2N link up fail (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Fix partial flash write of MBI (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Fix SRB leak on switch command timeout (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: qla2xxx: Fix stale mem access on driver unload (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Fix unbound sleep in fcport delete path (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: fixup incorrect usage of host_byte (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Improve logging for scan thread (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Initialized mailbox to prevent driver load failure (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: initialize fc4_type_priority (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: qla2xxx: Optimize NPIV tear down process (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Remove an include directive (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: qla2xxx: remove redundant assignment to pointer host (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Retry PLOGI on FC-NVMe PRLI failure (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: qla2xxx: Set remove flag for all VP (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Silence fwdump template message (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: stop timer in shutdown path (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Update driver version to 10.01.00.20-k (bsc#1143706 bsc#1082635 bsc#1123034).\n- scsi: qla2xxx: Update driver version to 10.01.00.21-k (bsc#1143706 bsc#1082635 bsc#1154526 bsc#1048942).\n- scsi: sd: Ignore a failure to sync cache due to lack of authorization (git-fixes).\n- scsi: storvsc: Add ability to change scsi queue depth (bsc#1155021).\n- scsi: zfcp: fix reaction on bit error threshold notification (bsc#1154956 LTC#182054).\n- serial: fix kernel-doc warning in comments (bsc#1051510).\n- serial: mctrl_gpio: Check for NULL pointer (bsc#1051510).\n- serial: uartlite: fix exit path null pointer (bsc#1051510).\n- staging: rtl8188eu: fix null dereference when kzalloc fails (bsc#1051510).\n- supporte.conf: add efivarfs to kernel-default-base (bsc#1154858).\n- tracing: Get trace_array reference for available_tracers files (bsc#1156429).\n- usb: gadget: Reject endpoints with 0 maxpacket value (bsc#1051510).\n- usb: gadget: udc: atmel: Fix interrupt storm in FIFO mode (bsc#1051510).\n- usb: handle warm-reset port requests on hub resume (bsc#1051510).\n- usb: ldusb: fix control-message timeout (bsc#1051510).\n- usb: ldusb: fix ring-buffer locking (bsc#1051510).\n- usb: serial: whiteheat: fix line-speed endianness (bsc#1051510).\n- usb: serial: whiteheat: fix potential slab corruption (bsc#1051510).\n- usb-storage: Revert commit 747668dbc061 (\u0027usb-storage: Set virt_boundary_mask to avoid SG overflows\u0027) (bsc#1051510).\n- wil6210: fix freeing of rx buffers in EDMA mode (bsc#1111666).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-2019-2507",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2019_2507-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2019:2507-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/45LLGKHM3X6KQJN67OZHE3KEGCRBVGEJ/#45LLGKHM3X6KQJN67OZHE3KEGCRBVGEJ"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2019:2507-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/45LLGKHM3X6KQJN67OZHE3KEGCRBVGEJ/#45LLGKHM3X6KQJN67OZHE3KEGCRBVGEJ"
},
{
"category": "self",
"summary": "SUSE Bug 1048942",
"url": "https://bugzilla.suse.com/1048942"
},
{
"category": "self",
"summary": "SUSE Bug 1051510",
"url": "https://bugzilla.suse.com/1051510"
},
{
"category": "self",
"summary": "SUSE Bug 1082635",
"url": "https://bugzilla.suse.com/1082635"
},
{
"category": "self",
"summary": "SUSE Bug 1090631",
"url": "https://bugzilla.suse.com/1090631"
},
{
"category": "self",
"summary": "SUSE Bug 1096254",
"url": "https://bugzilla.suse.com/1096254"
},
{
"category": "self",
"summary": "SUSE Bug 1111666",
"url": "https://bugzilla.suse.com/1111666"
},
{
"category": "self",
"summary": "SUSE Bug 1117665",
"url": "https://bugzilla.suse.com/1117665"
},
{
"category": "self",
"summary": "SUSE Bug 1119461",
"url": "https://bugzilla.suse.com/1119461"
},
{
"category": "self",
"summary": "SUSE Bug 1119465",
"url": "https://bugzilla.suse.com/1119465"
},
{
"category": "self",
"summary": "SUSE Bug 1123034",
"url": "https://bugzilla.suse.com/1123034"
},
{
"category": "self",
"summary": "SUSE Bug 1135966",
"url": "https://bugzilla.suse.com/1135966"
},
{
"category": "self",
"summary": "SUSE Bug 1135967",
"url": "https://bugzilla.suse.com/1135967"
},
{
"category": "self",
"summary": "SUSE Bug 1138190",
"url": "https://bugzilla.suse.com/1138190"
},
{
"category": "self",
"summary": "SUSE Bug 1139073",
"url": "https://bugzilla.suse.com/1139073"
},
{
"category": "self",
"summary": "SUSE Bug 1140090",
"url": "https://bugzilla.suse.com/1140090"
},
{
"category": "self",
"summary": "SUSE Bug 1143706",
"url": "https://bugzilla.suse.com/1143706"
},
{
"category": "self",
"summary": "SUSE Bug 1144903",
"url": "https://bugzilla.suse.com/1144903"
},
{
"category": "self",
"summary": "SUSE Bug 1149119",
"url": "https://bugzilla.suse.com/1149119"
},
{
"category": "self",
"summary": "SUSE Bug 1150466",
"url": "https://bugzilla.suse.com/1150466"
},
{
"category": "self",
"summary": "SUSE Bug 1152665",
"url": "https://bugzilla.suse.com/1152665"
},
{
"category": "self",
"summary": "SUSE Bug 1152696",
"url": "https://bugzilla.suse.com/1152696"
},
{
"category": "self",
"summary": "SUSE Bug 1152697",
"url": "https://bugzilla.suse.com/1152697"
},
{
"category": "self",
"summary": "SUSE Bug 1152782",
"url": "https://bugzilla.suse.com/1152782"
},
{
"category": "self",
"summary": "SUSE Bug 1153681",
"url": "https://bugzilla.suse.com/1153681"
},
{
"category": "self",
"summary": "SUSE Bug 1154124",
"url": "https://bugzilla.suse.com/1154124"
},
{
"category": "self",
"summary": "SUSE Bug 1154526",
"url": "https://bugzilla.suse.com/1154526"
},
{
"category": "self",
"summary": "SUSE Bug 1154858",
"url": "https://bugzilla.suse.com/1154858"
},
{
"category": "self",
"summary": "SUSE Bug 1154905",
"url": "https://bugzilla.suse.com/1154905"
},
{
"category": "self",
"summary": "SUSE Bug 1154956",
"url": "https://bugzilla.suse.com/1154956"
},
{
"category": "self",
"summary": "SUSE Bug 1155021",
"url": "https://bugzilla.suse.com/1155021"
},
{
"category": "self",
"summary": "SUSE Bug 1155061",
"url": "https://bugzilla.suse.com/1155061"
},
{
"category": "self",
"summary": "SUSE Bug 1155671",
"url": "https://bugzilla.suse.com/1155671"
},
{
"category": "self",
"summary": "SUSE Bug 1155692",
"url": "https://bugzilla.suse.com/1155692"
},
{
"category": "self",
"summary": "SUSE Bug 1155836",
"url": "https://bugzilla.suse.com/1155836"
},
{
"category": "self",
"summary": "SUSE Bug 1155982",
"url": "https://bugzilla.suse.com/1155982"
},
{
"category": "self",
"summary": "SUSE Bug 1156187",
"url": "https://bugzilla.suse.com/1156187"
},
{
"category": "self",
"summary": "SUSE Bug 1156429",
"url": "https://bugzilla.suse.com/1156429"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-12207 page",
"url": "https://www.suse.com/security/cve/CVE-2018-12207/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-0154 page",
"url": "https://www.suse.com/security/cve/CVE-2019-0154/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-0155 page",
"url": "https://www.suse.com/security/cve/CVE-2019-0155/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-10220 page",
"url": "https://www.suse.com/security/cve/CVE-2019-10220/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11135 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11135/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-16231 page",
"url": "https://www.suse.com/security/cve/CVE-2019-16231/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-17055 page",
"url": "https://www.suse.com/security/cve/CVE-2019-17055/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-18805 page",
"url": "https://www.suse.com/security/cve/CVE-2019-18805/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2019-11-14T05:59:09Z",
"generator": {
"date": "2019-11-14T05:59:09Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2019:2507-1",
"initial_release_date": "2019-11-14T05:59:09Z",
"revision_history": [
{
"date": "2019-11-14T05:59:09Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-4.12.14-lp151.28.32.1.noarch",
"product": {
"name": "kernel-devel-4.12.14-lp151.28.32.1.noarch",
"product_id": "kernel-devel-4.12.14-lp151.28.32.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-4.12.14-lp151.28.32.1.noarch",
"product": {
"name": "kernel-docs-4.12.14-lp151.28.32.1.noarch",
"product_id": "kernel-docs-4.12.14-lp151.28.32.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-html-4.12.14-lp151.28.32.1.noarch",
"product": {
"name": "kernel-docs-html-4.12.14-lp151.28.32.1.noarch",
"product_id": "kernel-docs-html-4.12.14-lp151.28.32.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-4.12.14-lp151.28.32.1.noarch",
"product": {
"name": "kernel-macros-4.12.14-lp151.28.32.1.noarch",
"product_id": "kernel-macros-4.12.14-lp151.28.32.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-4.12.14-lp151.28.32.1.noarch",
"product": {
"name": "kernel-source-4.12.14-lp151.28.32.1.noarch",
"product_id": "kernel-source-4.12.14-lp151.28.32.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-4.12.14-lp151.28.32.1.noarch",
"product": {
"name": "kernel-source-vanilla-4.12.14-lp151.28.32.1.noarch",
"product_id": "kernel-source-vanilla-4.12.14-lp151.28.32.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-4.12.14-lp151.28.32.1.x86_64",
"product": {
"name": "kernel-debug-4.12.14-lp151.28.32.1.x86_64",
"product_id": "kernel-debug-4.12.14-lp151.28.32.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-4.12.14-lp151.28.32.1.x86_64",
"product": {
"name": "kernel-debug-base-4.12.14-lp151.28.32.1.x86_64",
"product_id": "kernel-debug-base-4.12.14-lp151.28.32.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-4.12.14-lp151.28.32.1.x86_64",
"product": {
"name": "kernel-debug-devel-4.12.14-lp151.28.32.1.x86_64",
"product_id": "kernel-debug-devel-4.12.14-lp151.28.32.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-lp151.28.32.1.x86_64",
"product": {
"name": "kernel-default-4.12.14-lp151.28.32.1.x86_64",
"product_id": "kernel-default-4.12.14-lp151.28.32.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-lp151.28.32.1.x86_64",
"product": {
"name": "kernel-default-base-4.12.14-lp151.28.32.1.x86_64",
"product_id": "kernel-default-base-4.12.14-lp151.28.32.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-lp151.28.32.1.x86_64",
"product": {
"name": "kernel-default-devel-4.12.14-lp151.28.32.1.x86_64",
"product_id": "kernel-default-devel-4.12.14-lp151.28.32.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-4.12.14-lp151.28.32.1.x86_64",
"product": {
"name": "kernel-kvmsmall-4.12.14-lp151.28.32.1.x86_64",
"product_id": "kernel-kvmsmall-4.12.14-lp151.28.32.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-base-4.12.14-lp151.28.32.1.x86_64",
"product": {
"name": "kernel-kvmsmall-base-4.12.14-lp151.28.32.1.x86_64",
"product_id": "kernel-kvmsmall-base-4.12.14-lp151.28.32.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-4.12.14-lp151.28.32.1.x86_64",
"product": {
"name": "kernel-kvmsmall-devel-4.12.14-lp151.28.32.1.x86_64",
"product_id": "kernel-kvmsmall-devel-4.12.14-lp151.28.32.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-lp151.28.32.1.x86_64",
"product": {
"name": "kernel-obs-build-4.12.14-lp151.28.32.1.x86_64",
"product_id": "kernel-obs-build-4.12.14-lp151.28.32.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-lp151.28.32.1.x86_64",
"product": {
"name": "kernel-obs-qa-4.12.14-lp151.28.32.1.x86_64",
"product_id": "kernel-obs-qa-4.12.14-lp151.28.32.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-lp151.28.32.1.x86_64",
"product": {
"name": "kernel-syms-4.12.14-lp151.28.32.1.x86_64",
"product_id": "kernel-syms-4.12.14-lp151.28.32.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-lp151.28.32.1.x86_64",
"product": {
"name": "kernel-vanilla-4.12.14-lp151.28.32.1.x86_64",
"product_id": "kernel-vanilla-4.12.14-lp151.28.32.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-lp151.28.32.1.x86_64",
"product": {
"name": "kernel-vanilla-base-4.12.14-lp151.28.32.1.x86_64",
"product_id": "kernel-vanilla-base-4.12.14-lp151.28.32.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-lp151.28.32.1.x86_64",
"product": {
"name": "kernel-vanilla-devel-4.12.14-lp151.28.32.1.x86_64",
"product_id": "kernel-vanilla-devel-4.12.14-lp151.28.32.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 15.1",
"product": {
"name": "openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.1"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-4.12.14-lp151.28.32.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.32.1.x86_64"
},
"product_reference": "kernel-debug-4.12.14-lp151.28.32.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-base-4.12.14-lp151.28.32.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.32.1.x86_64"
},
"product_reference": "kernel-debug-base-4.12.14-lp151.28.32.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-4.12.14-lp151.28.32.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.32.1.x86_64"
},
"product_reference": "kernel-debug-devel-4.12.14-lp151.28.32.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-lp151.28.32.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.32.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-lp151.28.32.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-lp151.28.32.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.32.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-lp151.28.32.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-lp151.28.32.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.32.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-lp151.28.32.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-lp151.28.32.1.noarch as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.32.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-lp151.28.32.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.12.14-lp151.28.32.1.noarch as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.32.1.noarch"
},
"product_reference": "kernel-docs-4.12.14-lp151.28.32.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-html-4.12.14-lp151.28.32.1.noarch as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.32.1.noarch"
},
"product_reference": "kernel-docs-html-4.12.14-lp151.28.32.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-4.12.14-lp151.28.32.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.32.1.x86_64"
},
"product_reference": "kernel-kvmsmall-4.12.14-lp151.28.32.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-base-4.12.14-lp151.28.32.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.32.1.x86_64"
},
"product_reference": "kernel-kvmsmall-base-4.12.14-lp151.28.32.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-devel-4.12.14-lp151.28.32.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.32.1.x86_64"
},
"product_reference": "kernel-kvmsmall-devel-4.12.14-lp151.28.32.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-lp151.28.32.1.noarch as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.32.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-lp151.28.32.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-lp151.28.32.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.32.1.x86_64"
},
"product_reference": "kernel-obs-build-4.12.14-lp151.28.32.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-qa-4.12.14-lp151.28.32.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.32.1.x86_64"
},
"product_reference": "kernel-obs-qa-4.12.14-lp151.28.32.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-lp151.28.32.1.noarch as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.32.1.noarch"
},
"product_reference": "kernel-source-4.12.14-lp151.28.32.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-vanilla-4.12.14-lp151.28.32.1.noarch as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.32.1.noarch"
},
"product_reference": "kernel-source-vanilla-4.12.14-lp151.28.32.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-lp151.28.32.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.32.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-lp151.28.32.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-4.12.14-lp151.28.32.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.32.1.x86_64"
},
"product_reference": "kernel-vanilla-4.12.14-lp151.28.32.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-lp151.28.32.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.32.1.x86_64"
},
"product_reference": "kernel-vanilla-base-4.12.14-lp151.28.32.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-devel-4.12.14-lp151.28.32.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.32.1.x86_64"
},
"product_reference": "kernel-vanilla-devel-4.12.14-lp151.28.32.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-12207",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-12207"
}
],
"notes": [
{
"category": "general",
"text": "Improper invalidation for page table updates by a virtual guest operating system for multiple Intel(R) Processors may allow an authenticated user to potentially enable denial of service of the host system via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.32.1.noarch",
"openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.32.1.noarch",
"openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.32.1.noarch",
"openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.32.1.noarch",
"openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.32.1.noarch",
"openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.32.1.noarch",
"openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-12207",
"url": "https://www.suse.com/security/cve/CVE-2018-12207"
},
{
"category": "external",
"summary": "SUSE Bug 1117665 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1117665"
},
{
"category": "external",
"summary": "SUSE Bug 1139073 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1139073"
},
{
"category": "external",
"summary": "SUSE Bug 1152505 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1152505"
},
{
"category": "external",
"summary": "SUSE Bug 1155812 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1155812"
},
{
"category": "external",
"summary": "SUSE Bug 1155817 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1155817"
},
{
"category": "external",
"summary": "SUSE Bug 1155945 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1155945"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2018-12207",
"url": "https://bugzilla.suse.com/1201877"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.32.1.noarch",
"openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.32.1.noarch",
"openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.32.1.noarch",
"openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.32.1.noarch",
"openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.32.1.noarch",
"openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.32.1.noarch",
"openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.32.1.noarch",
"openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.32.1.noarch",
"openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.32.1.noarch",
"openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.32.1.noarch",
"openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.32.1.noarch",
"openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.32.1.noarch",
"openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-14T05:59:09Z",
"details": "moderate"
}
],
"title": "CVE-2018-12207"
},
{
"cve": "CVE-2019-0154",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-0154"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient access control in subsystem for Intel (R) processor graphics in 6th, 7th, 8th and 9th Generation Intel(R) Core(TM) Processor Families; Intel(R) Pentium(R) Processor J, N, Silver and Gold Series; Intel(R) Celeron(R) Processor J, N, G3900 and G4900 Series; Intel(R) Atom(R) Processor A and E3900 Series; Intel(R) Xeon(R) Processor E3-1500 v5 and v6 and E-2100 Processor Families may allow an authenticated user to potentially enable denial of service via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.32.1.noarch",
"openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.32.1.noarch",
"openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.32.1.noarch",
"openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.32.1.noarch",
"openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.32.1.noarch",
"openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.32.1.noarch",
"openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-0154",
"url": "https://www.suse.com/security/cve/CVE-2019-0154"
},
{
"category": "external",
"summary": "SUSE Bug 1135966 for CVE-2019-0154",
"url": "https://bugzilla.suse.com/1135966"
},
{
"category": "external",
"summary": "SUSE Bug 1181720 for CVE-2019-0154",
"url": "https://bugzilla.suse.com/1181720"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.32.1.noarch",
"openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.32.1.noarch",
"openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.32.1.noarch",
"openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.32.1.noarch",
"openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.32.1.noarch",
"openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.32.1.noarch",
"openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.32.1.noarch",
"openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.32.1.noarch",
"openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.32.1.noarch",
"openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.32.1.noarch",
"openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.32.1.noarch",
"openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.32.1.noarch",
"openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-14T05:59:09Z",
"details": "important"
}
],
"title": "CVE-2019-0154"
},
{
"cve": "CVE-2019-0155",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-0155"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient access control in a subsystem for Intel (R) processor graphics in 6th, 7th, 8th and 9th Generation Intel(R) Core(TM) Processor Families; Intel(R) Pentium(R) Processor J, N, Silver and Gold Series; Intel(R) Celeron(R) Processor J, N, G3900 and G4900 Series; Intel(R) Atom(R) Processor A and E3900 Series; Intel(R) Xeon(R) Processor E3-1500 v5 and v6, E-2100 and E-2200 Processor Families; Intel(R) Graphics Driver for Windows before 26.20.100.6813 (DCH) or 26.20.100.6812 and before 21.20.x.5077 (aka15.45.5077), i915 Linux Driver for Intel(R) Processor Graphics before versions 5.4-rc7, 5.3.11, 4.19.84, 4.14.154, 4.9.201, 4.4.201 may allow an authenticated user to potentially enable escalation of privilege via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.32.1.noarch",
"openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.32.1.noarch",
"openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.32.1.noarch",
"openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.32.1.noarch",
"openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.32.1.noarch",
"openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.32.1.noarch",
"openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-0155",
"url": "https://www.suse.com/security/cve/CVE-2019-0155"
},
{
"category": "external",
"summary": "SUSE Bug 1135966 for CVE-2019-0155",
"url": "https://bugzilla.suse.com/1135966"
},
{
"category": "external",
"summary": "SUSE Bug 1135967 for CVE-2019-0155",
"url": "https://bugzilla.suse.com/1135967"
},
{
"category": "external",
"summary": "SUSE Bug 1173663 for CVE-2019-0155",
"url": "https://bugzilla.suse.com/1173663"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.32.1.noarch",
"openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.32.1.noarch",
"openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.32.1.noarch",
"openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.32.1.noarch",
"openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.32.1.noarch",
"openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.32.1.noarch",
"openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.32.1.noarch",
"openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.32.1.noarch",
"openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.32.1.noarch",
"openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.32.1.noarch",
"openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.32.1.noarch",
"openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.32.1.noarch",
"openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-14T05:59:09Z",
"details": "important"
}
],
"title": "CVE-2019-0155"
},
{
"cve": "CVE-2019-10220",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-10220"
}
],
"notes": [
{
"category": "general",
"text": "Linux kernel CIFS implementation, version 4.9.0 is vulnerable to a relative paths injection in directory entry lists.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.32.1.noarch",
"openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.32.1.noarch",
"openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.32.1.noarch",
"openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.32.1.noarch",
"openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.32.1.noarch",
"openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.32.1.noarch",
"openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-10220",
"url": "https://www.suse.com/security/cve/CVE-2019-10220"
},
{
"category": "external",
"summary": "SUSE Bug 1144903 for CVE-2019-10220",
"url": "https://bugzilla.suse.com/1144903"
},
{
"category": "external",
"summary": "SUSE Bug 1153108 for CVE-2019-10220",
"url": "https://bugzilla.suse.com/1153108"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.32.1.noarch",
"openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.32.1.noarch",
"openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.32.1.noarch",
"openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.32.1.noarch",
"openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.32.1.noarch",
"openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.32.1.noarch",
"openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.32.1.noarch",
"openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.32.1.noarch",
"openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.32.1.noarch",
"openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.32.1.noarch",
"openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.32.1.noarch",
"openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.32.1.noarch",
"openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-14T05:59:09Z",
"details": "moderate"
}
],
"title": "CVE-2019-10220"
},
{
"cve": "CVE-2019-11135",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11135"
}
],
"notes": [
{
"category": "general",
"text": "TSX Asynchronous Abort condition on some CPUs utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.32.1.noarch",
"openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.32.1.noarch",
"openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.32.1.noarch",
"openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.32.1.noarch",
"openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.32.1.noarch",
"openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.32.1.noarch",
"openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11135",
"url": "https://www.suse.com/security/cve/CVE-2019-11135"
},
{
"category": "external",
"summary": "SUSE Bug 1139073 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1139073"
},
{
"category": "external",
"summary": "SUSE Bug 1152497 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1152497"
},
{
"category": "external",
"summary": "SUSE Bug 1152505 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1152505"
},
{
"category": "external",
"summary": "SUSE Bug 1152506 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1152506"
},
{
"category": "external",
"summary": "SUSE Bug 1160120 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1160120"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2019-11135",
"url": "https://bugzilla.suse.com/1201877"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.32.1.noarch",
"openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.32.1.noarch",
"openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.32.1.noarch",
"openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.32.1.noarch",
"openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.32.1.noarch",
"openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.32.1.noarch",
"openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.32.1.noarch",
"openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.32.1.noarch",
"openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.32.1.noarch",
"openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.32.1.noarch",
"openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.32.1.noarch",
"openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.32.1.noarch",
"openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-14T05:59:09Z",
"details": "moderate"
}
],
"title": "CVE-2019-11135"
},
{
"cve": "CVE-2019-16231",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-16231"
}
],
"notes": [
{
"category": "general",
"text": "drivers/net/fjes/fjes_main.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.32.1.noarch",
"openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.32.1.noarch",
"openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.32.1.noarch",
"openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.32.1.noarch",
"openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.32.1.noarch",
"openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.32.1.noarch",
"openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-16231",
"url": "https://www.suse.com/security/cve/CVE-2019-16231"
},
{
"category": "external",
"summary": "SUSE Bug 1150466 for CVE-2019-16231",
"url": "https://bugzilla.suse.com/1150466"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.32.1.noarch",
"openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.32.1.noarch",
"openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.32.1.noarch",
"openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.32.1.noarch",
"openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.32.1.noarch",
"openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.32.1.noarch",
"openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.32.1.noarch",
"openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.32.1.noarch",
"openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.32.1.noarch",
"openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.32.1.noarch",
"openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.32.1.noarch",
"openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.32.1.noarch",
"openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-14T05:59:09Z",
"details": "moderate"
}
],
"title": "CVE-2019-16231"
},
{
"cve": "CVE-2019-17055",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-17055"
}
],
"notes": [
{
"category": "general",
"text": "base_sock_create in drivers/isdn/mISDN/socket.c in the AF_ISDN network module in the Linux kernel through 5.3.2 does not enforce CAP_NET_RAW, which means that unprivileged users can create a raw socket, aka CID-b91ee4aa2a21.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.32.1.noarch",
"openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.32.1.noarch",
"openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.32.1.noarch",
"openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.32.1.noarch",
"openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.32.1.noarch",
"openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.32.1.noarch",
"openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-17055",
"url": "https://www.suse.com/security/cve/CVE-2019-17055"
},
{
"category": "external",
"summary": "SUSE Bug 1152782 for CVE-2019-17055",
"url": "https://bugzilla.suse.com/1152782"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.32.1.noarch",
"openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.32.1.noarch",
"openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.32.1.noarch",
"openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.32.1.noarch",
"openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.32.1.noarch",
"openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.32.1.noarch",
"openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.32.1.noarch",
"openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.32.1.noarch",
"openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.32.1.noarch",
"openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.32.1.noarch",
"openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.32.1.noarch",
"openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.32.1.noarch",
"openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-14T05:59:09Z",
"details": "moderate"
}
],
"title": "CVE-2019-17055"
},
{
"cve": "CVE-2019-18805",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-18805"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in net/ipv4/sysctl_net_ipv4.c in the Linux kernel before 5.0.11. There is a net/ipv4/tcp_input.c signed integer overflow in tcp_ack_update_rtt() when userspace writes a very large integer to /proc/sys/net/ipv4/tcp_min_rtt_wlen, leading to a denial of service or possibly unspecified other impact, aka CID-19fad20d15a6.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.32.1.noarch",
"openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.32.1.noarch",
"openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.32.1.noarch",
"openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.32.1.noarch",
"openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.32.1.noarch",
"openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.32.1.noarch",
"openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-18805",
"url": "https://www.suse.com/security/cve/CVE-2019-18805"
},
{
"category": "external",
"summary": "SUSE Bug 1156187 for CVE-2019-18805",
"url": "https://bugzilla.suse.com/1156187"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.32.1.noarch",
"openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.32.1.noarch",
"openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.32.1.noarch",
"openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.32.1.noarch",
"openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.32.1.noarch",
"openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.32.1.noarch",
"openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.32.1.noarch",
"openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.32.1.noarch",
"openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.32.1.noarch",
"openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.32.1.noarch",
"openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.32.1.noarch",
"openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.32.1.noarch",
"openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.32.1.x86_64",
"openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-11-14T05:59:09Z",
"details": "low"
}
],
"title": "CVE-2019-18805"
}
]
}
WID-SEC-W-2023-0884
Vulnerability from csaf_certbund
Notes
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Windows ist ein Betriebssystem von Microsoft.\r\nMicrosoft Windows RT ist eine Version des Windows-Betriebssystems von Microsoft f\u00fcr Ger\u00e4te basierend auf der ARM-Architektur, wie beispielsweise Tablet-Computer.\r\nDie Windows Azure-Plattform ist eine Cloud Computing-Plattform von Microsoft.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, authentisierter oder anonymer Angreifer kann mehrere Schwachstellen in verschiedenen Microsoft Windows Betriebssystemen und Microsoft Windows Azure Stack ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren, Code mit erweiterten Privilegien zur Ausf\u00fchrung zu bringen, Sicherheitsmechanismen zu umgehen, Spoofing Angriffe durchzuf\u00fchren, vertrauliche Daten einzusehen oder seine Privilegien zu erweitern.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2023-0884 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2019/wid-sec-w-2023-0884.json"
},
{
"category": "self",
"summary": "WID-SEC-2023-0884 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-0884"
},
{
"category": "external",
"summary": "CISA Known Exploited Vulnerabilities Catalog vom 2023-04-10",
"url": "https://www.cisa.gov/news-events/alerts/2023/04/07/cisa-adds-five-known-exploited-vulnerabilities-catalog"
},
{
"category": "external",
"summary": "Microsoft Leitfaden f\u00fcr Sicherheitsupdates vom 2019-11-12",
"url": "https://portal.msrc.microsoft.com/de-de/security-guidance"
},
{
"category": "external",
"summary": "Hitachi Vulnerability Information HITACHI-SEC-2019-311 vom 2019-12-05",
"url": "http://www.hitachi.co.jp/products/it/storage-solutions/global/sec_info/2019/11.html"
}
],
"source_lang": "en-US",
"title": "Microsoft Windows: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2023-04-10T22:00:00.000+00:00",
"generator": {
"date": "2024-08-15T17:48:17.777+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.5"
}
},
"id": "WID-SEC-W-2023-0884",
"initial_release_date": "2019-11-12T23:00:00.000+00:00",
"revision_history": [
{
"date": "2019-11-12T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2019-12-04T23:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von HITACHI aufgenommen"
},
{
"date": "2023-04-10T22:00:00.000+00:00",
"number": "3",
"summary": "Exploit aufgenommen"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Microsoft Windows 10",
"product": {
"name": "Microsoft Windows 10",
"product_id": "T005617",
"product_identification_helper": {
"cpe": "cpe:/o:microsoft:windows_10:-"
}
}
},
{
"category": "product_name",
"name": "Microsoft Windows 7",
"product": {
"name": "Microsoft Windows 7",
"product_id": "100461",
"product_identification_helper": {
"cpe": "cpe:/o:microsoft:windows_7:-"
}
}
},
{
"category": "product_name",
"name": "Microsoft Windows 8.1",
"product": {
"name": "Microsoft Windows 8.1",
"product_id": "T005302",
"product_identification_helper": {
"cpe": "cpe:/o:microsoft:windows_8.1:-"
}
}
},
{
"category": "product_name",
"name": "Microsoft Windows Azure Stack",
"product": {
"name": "Microsoft Windows Azure Stack",
"product_id": "T010156",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:windows_azure:-"
}
}
},
{
"category": "product_name",
"name": "Microsoft Windows RT 8.1",
"product": {
"name": "Microsoft Windows RT 8.1",
"product_id": "T002137",
"product_identification_helper": {
"cpe": "cpe:/o:microsoft:windows_rt_8.1:-"
}
}
},
{
"category": "product_name",
"name": "Microsoft Windows Server",
"product": {
"name": "Microsoft Windows Server",
"product_id": "T012776",
"product_identification_helper": {
"cpe": "cpe:/o:microsoft:windows_server:-"
}
}
},
{
"category": "product_name",
"name": "Microsoft Windows Server 2008 R2 SP1",
"product": {
"name": "Microsoft Windows Server 2008 R2 SP1",
"product_id": "T013769",
"product_identification_helper": {
"cpe": "cpe:/o:microsoft:windows_server_2008_r2:sp_1"
}
}
},
{
"category": "product_name",
"name": "Microsoft Windows Server 2008 SP2",
"product": {
"name": "Microsoft Windows Server 2008 SP2",
"product_id": "160428",
"product_identification_helper": {
"cpe": "cpe:/o:microsoft:windows_server_2008::sp2"
}
}
},
{
"category": "product_name",
"name": "Microsoft Windows Server 2012",
"product": {
"name": "Microsoft Windows Server 2012",
"product_id": "T005923",
"product_identification_helper": {
"cpe": "cpe:/o:microsoft:windows_server_2012:-"
}
}
},
{
"category": "product_name",
"name": "Microsoft Windows Server 2012 R2",
"product": {
"name": "Microsoft Windows Server 2012 R2",
"product_id": "T014786",
"product_identification_helper": {
"cpe": "cpe:/o:microsoft:windows_server_2012_r2:-"
}
}
},
{
"category": "product_name",
"name": "Microsoft Windows Server 2016",
"product": {
"name": "Microsoft Windows Server 2016",
"product_id": "T008880",
"product_identification_helper": {
"cpe": "cpe:/o:microsoft:windows_server_2016:-"
}
}
},
{
"category": "product_name",
"name": "Microsoft Windows Server 2019",
"product": {
"name": "Microsoft Windows Server 2019",
"product_id": "T012979",
"product_identification_helper": {
"cpe": "cpe:/o:microsoft:windows_server_2019:-"
}
}
}
],
"category": "vendor",
"name": "Microsoft"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-12207",
"notes": [
{
"category": "description",
"text": "In verschiedenen Microsoft Windows Betriebssystemen existieren mehrere Schwachstellen. Sie beruhen auf Fehlern bei der Verarbeitung von Objekten im Speicher oder Fehlern bei der Verarbeitung von Benutzereingaben durch den Microsoft Hyper-V auf einem Hostserver oder den Microsoft Hyper-V-Netzwerkswitch auf einem Hostserver. Ein authentisierter Angreifer kann dieses zu einem Denial of Service Angriff nutzen."
}
],
"product_status": {
"known_affected": [
"T012979",
"160428",
"T013769",
"T005302",
"100461",
"T012776",
"T002137",
"T005923",
"T014786",
"T005617",
"T010156",
"T008880"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2018-12207"
},
{
"cve": "CVE-2019-0712",
"notes": [
{
"category": "description",
"text": "In verschiedenen Microsoft Windows Betriebssystemen existieren mehrere Schwachstellen. Sie beruhen auf Fehlern bei der Verarbeitung von Objekten im Speicher oder Fehlern bei der Verarbeitung von Benutzereingaben durch den Microsoft Hyper-V auf einem Hostserver oder den Microsoft Hyper-V-Netzwerkswitch auf einem Hostserver. Ein authentisierter Angreifer kann dieses zu einem Denial of Service Angriff nutzen."
}
],
"product_status": {
"known_affected": [
"T012979",
"160428",
"T013769",
"T005302",
"100461",
"T012776",
"T002137",
"T005923",
"T014786",
"T005617",
"T010156",
"T008880"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-0712"
},
{
"cve": "CVE-2019-1309",
"notes": [
{
"category": "description",
"text": "In verschiedenen Microsoft Windows Betriebssystemen existieren mehrere Schwachstellen. Sie beruhen auf Fehlern bei der Verarbeitung von Objekten im Speicher oder Fehlern bei der Verarbeitung von Benutzereingaben durch den Microsoft Hyper-V auf einem Hostserver oder den Microsoft Hyper-V-Netzwerkswitch auf einem Hostserver. Ein authentisierter Angreifer kann dieses zu einem Denial of Service Angriff nutzen."
}
],
"product_status": {
"known_affected": [
"T012979",
"160428",
"T013769",
"T005302",
"100461",
"T012776",
"T002137",
"T005923",
"T014786",
"T005617",
"T010156",
"T008880"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-1309"
},
{
"cve": "CVE-2019-1310",
"notes": [
{
"category": "description",
"text": "In verschiedenen Microsoft Windows Betriebssystemen existieren mehrere Schwachstellen. Sie beruhen auf Fehlern bei der Verarbeitung von Objekten im Speicher oder Fehlern bei der Verarbeitung von Benutzereingaben durch den Microsoft Hyper-V auf einem Hostserver oder den Microsoft Hyper-V-Netzwerkswitch auf einem Hostserver. Ein authentisierter Angreifer kann dieses zu einem Denial of Service Angriff nutzen."
}
],
"product_status": {
"known_affected": [
"T012979",
"160428",
"T013769",
"T005302",
"100461",
"T012776",
"T002137",
"T005923",
"T014786",
"T005617",
"T010156",
"T008880"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-1310"
},
{
"cve": "CVE-2019-1391",
"notes": [
{
"category": "description",
"text": "In verschiedenen Microsoft Windows Betriebssystemen existieren mehrere Schwachstellen. Sie beruhen auf Fehlern bei der Verarbeitung von Objekten im Speicher oder Fehlern bei der Verarbeitung von Benutzereingaben durch den Microsoft Hyper-V auf einem Hostserver oder den Microsoft Hyper-V-Netzwerkswitch auf einem Hostserver. Ein authentisierter Angreifer kann dieses zu einem Denial of Service Angriff nutzen."
}
],
"product_status": {
"known_affected": [
"T012979",
"160428",
"T013769",
"T005302",
"100461",
"T012776",
"T002137",
"T005923",
"T014786",
"T005617",
"T010156",
"T008880"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-1391"
},
{
"cve": "CVE-2019-1399",
"notes": [
{
"category": "description",
"text": "In verschiedenen Microsoft Windows Betriebssystemen existieren mehrere Schwachstellen. Sie beruhen auf Fehlern bei der Verarbeitung von Objekten im Speicher oder Fehlern bei der Verarbeitung von Benutzereingaben durch den Microsoft Hyper-V auf einem Hostserver oder den Microsoft Hyper-V-Netzwerkswitch auf einem Hostserver. Ein authentisierter Angreifer kann dieses zu einem Denial of Service Angriff nutzen."
}
],
"product_status": {
"known_affected": [
"T012979",
"160428",
"T013769",
"T005302",
"100461",
"T012776",
"T002137",
"T005923",
"T014786",
"T005617",
"T010156",
"T008880"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-1399"
},
{
"cve": "CVE-2019-1454",
"notes": [
{
"category": "description",
"text": "In verschiedenen Microsoft Windows Betriebssystemen existieren mehrere Schwachstellen. Sie befinden sich im Windows-Benutzerprofildienst (ProfSvc), der Windows-Grafikkomponente, im Windows-Kernelmodustreiber, der StartTileData.dllm, der iphlpsvc.dll, der dssvc.dll, im Windows-Datenfreigabedienst, im Windows-Subsystem f\u00fcr Linux, im Windows Installer, der Win32k-Komponente, im Windows-UPnP-Dienst (Universal Plug and Play), im Windows Kernel, im Windows-Zertifikatdialogfeld, den Windows AppX-Bereitstellungserweiterungen, im ActiveX-Installationsdienst und in splwow64.exe und beruhen u. a. auf Fehlern bei der Verarbeitung von Objekten im Speicher, bei der Verarbeitung von Dateivorg\u00e4ngen oder bei der Verwaltung von Zugriffsprivilegien. Ein authentisierter Angreifer kann dieses nutzen und seine Privilegien erweitern."
}
],
"product_status": {
"known_affected": [
"T012979",
"160428",
"T013769",
"T005302",
"100461",
"T012776",
"T002137",
"T005923",
"T014786",
"T005617",
"T010156",
"T008880"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-1454"
},
{
"cve": "CVE-2019-1438",
"notes": [
{
"category": "description",
"text": "In verschiedenen Microsoft Windows Betriebssystemen existieren mehrere Schwachstellen. Sie befinden sich im Windows-Benutzerprofildienst (ProfSvc), der Windows-Grafikkomponente, im Windows-Kernelmodustreiber, der StartTileData.dllm, der iphlpsvc.dll, der dssvc.dll, im Windows-Datenfreigabedienst, im Windows-Subsystem f\u00fcr Linux, im Windows Installer, der Win32k-Komponente, im Windows-UPnP-Dienst (Universal Plug and Play), im Windows Kernel, im Windows-Zertifikatdialogfeld, den Windows AppX-Bereitstellungserweiterungen, im ActiveX-Installationsdienst und in splwow64.exe und beruhen u. a. auf Fehlern bei der Verarbeitung von Objekten im Speicher, bei der Verarbeitung von Dateivorg\u00e4ngen oder bei der Verwaltung von Zugriffsprivilegien. Ein authentisierter Angreifer kann dieses nutzen und seine Privilegien erweitern."
}
],
"product_status": {
"known_affected": [
"T012979",
"160428",
"T013769",
"T005302",
"100461",
"T012776",
"T002137",
"T005923",
"T014786",
"T005617",
"T010156",
"T008880"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-1438"
},
{
"cve": "CVE-2019-1437",
"notes": [
{
"category": "description",
"text": "In verschiedenen Microsoft Windows Betriebssystemen existieren mehrere Schwachstellen. Sie befinden sich im Windows-Benutzerprofildienst (ProfSvc), der Windows-Grafikkomponente, im Windows-Kernelmodustreiber, der StartTileData.dllm, der iphlpsvc.dll, der dssvc.dll, im Windows-Datenfreigabedienst, im Windows-Subsystem f\u00fcr Linux, im Windows Installer, der Win32k-Komponente, im Windows-UPnP-Dienst (Universal Plug and Play), im Windows Kernel, im Windows-Zertifikatdialogfeld, den Windows AppX-Bereitstellungserweiterungen, im ActiveX-Installationsdienst und in splwow64.exe und beruhen u. a. auf Fehlern bei der Verarbeitung von Objekten im Speicher, bei der Verarbeitung von Dateivorg\u00e4ngen oder bei der Verwaltung von Zugriffsprivilegien. Ein authentisierter Angreifer kann dieses nutzen und seine Privilegien erweitern."
}
],
"product_status": {
"known_affected": [
"T012979",
"160428",
"T013769",
"T005302",
"100461",
"T012776",
"T002137",
"T005923",
"T014786",
"T005617",
"T010156",
"T008880"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-1437"
},
{
"cve": "CVE-2019-1435",
"notes": [
{
"category": "description",
"text": "In verschiedenen Microsoft Windows Betriebssystemen existieren mehrere Schwachstellen. Sie befinden sich im Windows-Benutzerprofildienst (ProfSvc), der Windows-Grafikkomponente, im Windows-Kernelmodustreiber, der StartTileData.dllm, der iphlpsvc.dll, der dssvc.dll, im Windows-Datenfreigabedienst, im Windows-Subsystem f\u00fcr Linux, im Windows Installer, der Win32k-Komponente, im Windows-UPnP-Dienst (Universal Plug and Play), im Windows Kernel, im Windows-Zertifikatdialogfeld, den Windows AppX-Bereitstellungserweiterungen, im ActiveX-Installationsdienst und in splwow64.exe und beruhen u. a. auf Fehlern bei der Verarbeitung von Objekten im Speicher, bei der Verarbeitung von Dateivorg\u00e4ngen oder bei der Verwaltung von Zugriffsprivilegien. Ein authentisierter Angreifer kann dieses nutzen und seine Privilegien erweitern."
}
],
"product_status": {
"known_affected": [
"T012979",
"160428",
"T013769",
"T005302",
"100461",
"T012776",
"T002137",
"T005923",
"T014786",
"T005617",
"T010156",
"T008880"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-1435"
},
{
"cve": "CVE-2019-1434",
"notes": [
{
"category": "description",
"text": "In verschiedenen Microsoft Windows Betriebssystemen existieren mehrere Schwachstellen. Sie befinden sich im Windows-Benutzerprofildienst (ProfSvc), der Windows-Grafikkomponente, im Windows-Kernelmodustreiber, der StartTileData.dllm, der iphlpsvc.dll, der dssvc.dll, im Windows-Datenfreigabedienst, im Windows-Subsystem f\u00fcr Linux, im Windows Installer, der Win32k-Komponente, im Windows-UPnP-Dienst (Universal Plug and Play), im Windows Kernel, im Windows-Zertifikatdialogfeld, den Windows AppX-Bereitstellungserweiterungen, im ActiveX-Installationsdienst und in splwow64.exe und beruhen u. a. auf Fehlern bei der Verarbeitung von Objekten im Speicher, bei der Verarbeitung von Dateivorg\u00e4ngen oder bei der Verwaltung von Zugriffsprivilegien. Ein authentisierter Angreifer kann dieses nutzen und seine Privilegien erweitern."
}
],
"product_status": {
"known_affected": [
"T012979",
"160428",
"T013769",
"T005302",
"100461",
"T012776",
"T002137",
"T005923",
"T014786",
"T005617",
"T010156",
"T008880"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-1434"
},
{
"cve": "CVE-2019-1433",
"notes": [
{
"category": "description",
"text": "In verschiedenen Microsoft Windows Betriebssystemen existieren mehrere Schwachstellen. Sie befinden sich im Windows-Benutzerprofildienst (ProfSvc), der Windows-Grafikkomponente, im Windows-Kernelmodustreiber, der StartTileData.dllm, der iphlpsvc.dll, der dssvc.dll, im Windows-Datenfreigabedienst, im Windows-Subsystem f\u00fcr Linux, im Windows Installer, der Win32k-Komponente, im Windows-UPnP-Dienst (Universal Plug and Play), im Windows Kernel, im Windows-Zertifikatdialogfeld, den Windows AppX-Bereitstellungserweiterungen, im ActiveX-Installationsdienst und in splwow64.exe und beruhen u. a. auf Fehlern bei der Verarbeitung von Objekten im Speicher, bei der Verarbeitung von Dateivorg\u00e4ngen oder bei der Verwaltung von Zugriffsprivilegien. Ein authentisierter Angreifer kann dieses nutzen und seine Privilegien erweitern."
}
],
"product_status": {
"known_affected": [
"T012979",
"160428",
"T013769",
"T005302",
"100461",
"T012776",
"T002137",
"T005923",
"T014786",
"T005617",
"T010156",
"T008880"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-1433"
},
{
"cve": "CVE-2019-1423",
"notes": [
{
"category": "description",
"text": "In verschiedenen Microsoft Windows Betriebssystemen existieren mehrere Schwachstellen. Sie befinden sich im Windows-Benutzerprofildienst (ProfSvc), der Windows-Grafikkomponente, im Windows-Kernelmodustreiber, der StartTileData.dllm, der iphlpsvc.dll, der dssvc.dll, im Windows-Datenfreigabedienst, im Windows-Subsystem f\u00fcr Linux, im Windows Installer, der Win32k-Komponente, im Windows-UPnP-Dienst (Universal Plug and Play), im Windows Kernel, im Windows-Zertifikatdialogfeld, den Windows AppX-Bereitstellungserweiterungen, im ActiveX-Installationsdienst und in splwow64.exe und beruhen u. a. auf Fehlern bei der Verarbeitung von Objekten im Speicher, bei der Verarbeitung von Dateivorg\u00e4ngen oder bei der Verwaltung von Zugriffsprivilegien. Ein authentisierter Angreifer kann dieses nutzen und seine Privilegien erweitern."
}
],
"product_status": {
"known_affected": [
"T012979",
"160428",
"T013769",
"T005302",
"100461",
"T012776",
"T002137",
"T005923",
"T014786",
"T005617",
"T010156",
"T008880"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-1423"
},
{
"cve": "CVE-2019-1422",
"notes": [
{
"category": "description",
"text": "In verschiedenen Microsoft Windows Betriebssystemen existieren mehrere Schwachstellen. Sie befinden sich im Windows-Benutzerprofildienst (ProfSvc), der Windows-Grafikkomponente, im Windows-Kernelmodustreiber, der StartTileData.dllm, der iphlpsvc.dll, der dssvc.dll, im Windows-Datenfreigabedienst, im Windows-Subsystem f\u00fcr Linux, im Windows Installer, der Win32k-Komponente, im Windows-UPnP-Dienst (Universal Plug and Play), im Windows Kernel, im Windows-Zertifikatdialogfeld, den Windows AppX-Bereitstellungserweiterungen, im ActiveX-Installationsdienst und in splwow64.exe und beruhen u. a. auf Fehlern bei der Verarbeitung von Objekten im Speicher, bei der Verarbeitung von Dateivorg\u00e4ngen oder bei der Verwaltung von Zugriffsprivilegien. Ein authentisierter Angreifer kann dieses nutzen und seine Privilegien erweitern."
}
],
"product_status": {
"known_affected": [
"T012979",
"160428",
"T013769",
"T005302",
"100461",
"T012776",
"T002137",
"T005923",
"T014786",
"T005617",
"T010156",
"T008880"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-1422"
},
{
"cve": "CVE-2019-1420",
"notes": [
{
"category": "description",
"text": "In verschiedenen Microsoft Windows Betriebssystemen existieren mehrere Schwachstellen. Sie befinden sich im Windows-Benutzerprofildienst (ProfSvc), der Windows-Grafikkomponente, im Windows-Kernelmodustreiber, der StartTileData.dllm, der iphlpsvc.dll, der dssvc.dll, im Windows-Datenfreigabedienst, im Windows-Subsystem f\u00fcr Linux, im Windows Installer, der Win32k-Komponente, im Windows-UPnP-Dienst (Universal Plug and Play), im Windows Kernel, im Windows-Zertifikatdialogfeld, den Windows AppX-Bereitstellungserweiterungen, im ActiveX-Installationsdienst und in splwow64.exe und beruhen u. a. auf Fehlern bei der Verarbeitung von Objekten im Speicher, bei der Verarbeitung von Dateivorg\u00e4ngen oder bei der Verwaltung von Zugriffsprivilegien. Ein authentisierter Angreifer kann dieses nutzen und seine Privilegien erweitern."
}
],
"product_status": {
"known_affected": [
"T012979",
"160428",
"T013769",
"T005302",
"100461",
"T012776",
"T002137",
"T005923",
"T014786",
"T005617",
"T010156",
"T008880"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-1420"
},
{
"cve": "CVE-2019-1417",
"notes": [
{
"category": "description",
"text": "In verschiedenen Microsoft Windows Betriebssystemen existieren mehrere Schwachstellen. Sie befinden sich im Windows-Benutzerprofildienst (ProfSvc), der Windows-Grafikkomponente, im Windows-Kernelmodustreiber, der StartTileData.dllm, der iphlpsvc.dll, der dssvc.dll, im Windows-Datenfreigabedienst, im Windows-Subsystem f\u00fcr Linux, im Windows Installer, der Win32k-Komponente, im Windows-UPnP-Dienst (Universal Plug and Play), im Windows Kernel, im Windows-Zertifikatdialogfeld, den Windows AppX-Bereitstellungserweiterungen, im ActiveX-Installationsdienst und in splwow64.exe und beruhen u. a. auf Fehlern bei der Verarbeitung von Objekten im Speicher, bei der Verarbeitung von Dateivorg\u00e4ngen oder bei der Verwaltung von Zugriffsprivilegien. Ein authentisierter Angreifer kann dieses nutzen und seine Privilegien erweitern."
}
],
"product_status": {
"known_affected": [
"T012979",
"160428",
"T013769",
"T005302",
"100461",
"T012776",
"T002137",
"T005923",
"T014786",
"T005617",
"T010156",
"T008880"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-1417"
},
{
"cve": "CVE-2019-1416",
"notes": [
{
"category": "description",
"text": "In verschiedenen Microsoft Windows Betriebssystemen existieren mehrere Schwachstellen. Sie befinden sich im Windows-Benutzerprofildienst (ProfSvc), der Windows-Grafikkomponente, im Windows-Kernelmodustreiber, der StartTileData.dllm, der iphlpsvc.dll, der dssvc.dll, im Windows-Datenfreigabedienst, im Windows-Subsystem f\u00fcr Linux, im Windows Installer, der Win32k-Komponente, im Windows-UPnP-Dienst (Universal Plug and Play), im Windows Kernel, im Windows-Zertifikatdialogfeld, den Windows AppX-Bereitstellungserweiterungen, im ActiveX-Installationsdienst und in splwow64.exe und beruhen u. a. auf Fehlern bei der Verarbeitung von Objekten im Speicher, bei der Verarbeitung von Dateivorg\u00e4ngen oder bei der Verwaltung von Zugriffsprivilegien. Ein authentisierter Angreifer kann dieses nutzen und seine Privilegien erweitern."
}
],
"product_status": {
"known_affected": [
"T012979",
"160428",
"T013769",
"T005302",
"100461",
"T012776",
"T002137",
"T005923",
"T014786",
"T005617",
"T010156",
"T008880"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-1416"
},
{
"cve": "CVE-2019-1415",
"notes": [
{
"category": "description",
"text": "In verschiedenen Microsoft Windows Betriebssystemen existieren mehrere Schwachstellen. Sie befinden sich im Windows-Benutzerprofildienst (ProfSvc), der Windows-Grafikkomponente, im Windows-Kernelmodustreiber, der StartTileData.dllm, der iphlpsvc.dll, der dssvc.dll, im Windows-Datenfreigabedienst, im Windows-Subsystem f\u00fcr Linux, im Windows Installer, der Win32k-Komponente, im Windows-UPnP-Dienst (Universal Plug and Play), im Windows Kernel, im Windows-Zertifikatdialogfeld, den Windows AppX-Bereitstellungserweiterungen, im ActiveX-Installationsdienst und in splwow64.exe und beruhen u. a. auf Fehlern bei der Verarbeitung von Objekten im Speicher, bei der Verarbeitung von Dateivorg\u00e4ngen oder bei der Verwaltung von Zugriffsprivilegien. Ein authentisierter Angreifer kann dieses nutzen und seine Privilegien erweitern."
}
],
"product_status": {
"known_affected": [
"T012979",
"160428",
"T013769",
"T005302",
"100461",
"T012776",
"T002137",
"T005923",
"T014786",
"T005617",
"T010156",
"T008880"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-1415"
},
{
"cve": "CVE-2019-1408",
"notes": [
{
"category": "description",
"text": "In verschiedenen Microsoft Windows Betriebssystemen existieren mehrere Schwachstellen. Sie befinden sich im Windows-Benutzerprofildienst (ProfSvc), der Windows-Grafikkomponente, im Windows-Kernelmodustreiber, der StartTileData.dllm, der iphlpsvc.dll, der dssvc.dll, im Windows-Datenfreigabedienst, im Windows-Subsystem f\u00fcr Linux, im Windows Installer, der Win32k-Komponente, im Windows-UPnP-Dienst (Universal Plug and Play), im Windows Kernel, im Windows-Zertifikatdialogfeld, den Windows AppX-Bereitstellungserweiterungen, im ActiveX-Installationsdienst und in splwow64.exe und beruhen u. a. auf Fehlern bei der Verarbeitung von Objekten im Speicher, bei der Verarbeitung von Dateivorg\u00e4ngen oder bei der Verwaltung von Zugriffsprivilegien. Ein authentisierter Angreifer kann dieses nutzen und seine Privilegien erweitern."
}
],
"product_status": {
"known_affected": [
"T012979",
"160428",
"T013769",
"T005302",
"100461",
"T012776",
"T002137",
"T005923",
"T014786",
"T005617",
"T010156",
"T008880"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-1408"
},
{
"cve": "CVE-2019-1407",
"notes": [
{
"category": "description",
"text": "In verschiedenen Microsoft Windows Betriebssystemen existieren mehrere Schwachstellen. Sie befinden sich im Windows-Benutzerprofildienst (ProfSvc), der Windows-Grafikkomponente, im Windows-Kernelmodustreiber, der StartTileData.dllm, der iphlpsvc.dll, der dssvc.dll, im Windows-Datenfreigabedienst, im Windows-Subsystem f\u00fcr Linux, im Windows Installer, der Win32k-Komponente, im Windows-UPnP-Dienst (Universal Plug and Play), im Windows Kernel, im Windows-Zertifikatdialogfeld, den Windows AppX-Bereitstellungserweiterungen, im ActiveX-Installationsdienst und in splwow64.exe und beruhen u. a. auf Fehlern bei der Verarbeitung von Objekten im Speicher, bei der Verarbeitung von Dateivorg\u00e4ngen oder bei der Verwaltung von Zugriffsprivilegien. Ein authentisierter Angreifer kann dieses nutzen und seine Privilegien erweitern."
}
],
"product_status": {
"known_affected": [
"T012979",
"160428",
"T013769",
"T005302",
"100461",
"T012776",
"T002137",
"T005923",
"T014786",
"T005617",
"T010156",
"T008880"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-1407"
},
{
"cve": "CVE-2019-1405",
"notes": [
{
"category": "description",
"text": "In verschiedenen Microsoft Windows Betriebssystemen existieren mehrere Schwachstellen. Sie befinden sich im Windows-Benutzerprofildienst (ProfSvc), der Windows-Grafikkomponente, im Windows-Kernelmodustreiber, der StartTileData.dllm, der iphlpsvc.dll, der dssvc.dll, im Windows-Datenfreigabedienst, im Windows-Subsystem f\u00fcr Linux, im Windows Installer, der Win32k-Komponente, im Windows-UPnP-Dienst (Universal Plug and Play), im Windows Kernel, im Windows-Zertifikatdialogfeld, den Windows AppX-Bereitstellungserweiterungen, im ActiveX-Installationsdienst und in splwow64.exe und beruhen u. a. auf Fehlern bei der Verarbeitung von Objekten im Speicher, bei der Verarbeitung von Dateivorg\u00e4ngen oder bei der Verwaltung von Zugriffsprivilegien. Ein authentisierter Angreifer kann dieses nutzen und seine Privilegien erweitern."
}
],
"product_status": {
"known_affected": [
"T012979",
"160428",
"T013769",
"T005302",
"100461",
"T012776",
"T002137",
"T005923",
"T014786",
"T005617",
"T010156",
"T008880"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-1405"
},
{
"cve": "CVE-2019-1396",
"notes": [
{
"category": "description",
"text": "In verschiedenen Microsoft Windows Betriebssystemen existieren mehrere Schwachstellen. Sie befinden sich im Windows-Benutzerprofildienst (ProfSvc), der Windows-Grafikkomponente, im Windows-Kernelmodustreiber, der StartTileData.dllm, der iphlpsvc.dll, der dssvc.dll, im Windows-Datenfreigabedienst, im Windows-Subsystem f\u00fcr Linux, im Windows Installer, der Win32k-Komponente, im Windows-UPnP-Dienst (Universal Plug and Play), im Windows Kernel, im Windows-Zertifikatdialogfeld, den Windows AppX-Bereitstellungserweiterungen, im ActiveX-Installationsdienst und in splwow64.exe und beruhen u. a. auf Fehlern bei der Verarbeitung von Objekten im Speicher, bei der Verarbeitung von Dateivorg\u00e4ngen oder bei der Verwaltung von Zugriffsprivilegien. Ein authentisierter Angreifer kann dieses nutzen und seine Privilegien erweitern."
}
],
"product_status": {
"known_affected": [
"T012979",
"160428",
"T013769",
"T005302",
"100461",
"T012776",
"T002137",
"T005923",
"T014786",
"T005617",
"T010156",
"T008880"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-1396"
},
{
"cve": "CVE-2019-1395",
"notes": [
{
"category": "description",
"text": "In verschiedenen Microsoft Windows Betriebssystemen existieren mehrere Schwachstellen. Sie befinden sich im Windows-Benutzerprofildienst (ProfSvc), der Windows-Grafikkomponente, im Windows-Kernelmodustreiber, der StartTileData.dllm, der iphlpsvc.dll, der dssvc.dll, im Windows-Datenfreigabedienst, im Windows-Subsystem f\u00fcr Linux, im Windows Installer, der Win32k-Komponente, im Windows-UPnP-Dienst (Universal Plug and Play), im Windows Kernel, im Windows-Zertifikatdialogfeld, den Windows AppX-Bereitstellungserweiterungen, im ActiveX-Installationsdienst und in splwow64.exe und beruhen u. a. auf Fehlern bei der Verarbeitung von Objekten im Speicher, bei der Verarbeitung von Dateivorg\u00e4ngen oder bei der Verwaltung von Zugriffsprivilegien. Ein authentisierter Angreifer kann dieses nutzen und seine Privilegien erweitern."
}
],
"product_status": {
"known_affected": [
"T012979",
"160428",
"T013769",
"T005302",
"100461",
"T012776",
"T002137",
"T005923",
"T014786",
"T005617",
"T010156",
"T008880"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-1395"
},
{
"cve": "CVE-2019-1394",
"notes": [
{
"category": "description",
"text": "In verschiedenen Microsoft Windows Betriebssystemen existieren mehrere Schwachstellen. Sie befinden sich im Windows-Benutzerprofildienst (ProfSvc), der Windows-Grafikkomponente, im Windows-Kernelmodustreiber, der StartTileData.dllm, der iphlpsvc.dll, der dssvc.dll, im Windows-Datenfreigabedienst, im Windows-Subsystem f\u00fcr Linux, im Windows Installer, der Win32k-Komponente, im Windows-UPnP-Dienst (Universal Plug and Play), im Windows Kernel, im Windows-Zertifikatdialogfeld, den Windows AppX-Bereitstellungserweiterungen, im ActiveX-Installationsdienst und in splwow64.exe und beruhen u. a. auf Fehlern bei der Verarbeitung von Objekten im Speicher, bei der Verarbeitung von Dateivorg\u00e4ngen oder bei der Verwaltung von Zugriffsprivilegien. Ein authentisierter Angreifer kann dieses nutzen und seine Privilegien erweitern."
}
],
"product_status": {
"known_affected": [
"T012979",
"160428",
"T013769",
"T005302",
"100461",
"T012776",
"T002137",
"T005923",
"T014786",
"T005617",
"T010156",
"T008880"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-1394"
},
{
"cve": "CVE-2019-1393",
"notes": [
{
"category": "description",
"text": "In verschiedenen Microsoft Windows Betriebssystemen existieren mehrere Schwachstellen. Sie befinden sich im Windows-Benutzerprofildienst (ProfSvc), der Windows-Grafikkomponente, im Windows-Kernelmodustreiber, der StartTileData.dllm, der iphlpsvc.dll, der dssvc.dll, im Windows-Datenfreigabedienst, im Windows-Subsystem f\u00fcr Linux, im Windows Installer, der Win32k-Komponente, im Windows-UPnP-Dienst (Universal Plug and Play), im Windows Kernel, im Windows-Zertifikatdialogfeld, den Windows AppX-Bereitstellungserweiterungen, im ActiveX-Installationsdienst und in splwow64.exe und beruhen u. a. auf Fehlern bei der Verarbeitung von Objekten im Speicher, bei der Verarbeitung von Dateivorg\u00e4ngen oder bei der Verwaltung von Zugriffsprivilegien. Ein authentisierter Angreifer kann dieses nutzen und seine Privilegien erweitern."
}
],
"product_status": {
"known_affected": [
"T012979",
"160428",
"T013769",
"T005302",
"100461",
"T012776",
"T002137",
"T005923",
"T014786",
"T005617",
"T010156",
"T008880"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-1393"
},
{
"cve": "CVE-2019-1392",
"notes": [
{
"category": "description",
"text": "In verschiedenen Microsoft Windows Betriebssystemen existieren mehrere Schwachstellen. Sie befinden sich im Windows-Benutzerprofildienst (ProfSvc), der Windows-Grafikkomponente, im Windows-Kernelmodustreiber, der StartTileData.dllm, der iphlpsvc.dll, der dssvc.dll, im Windows-Datenfreigabedienst, im Windows-Subsystem f\u00fcr Linux, im Windows Installer, der Win32k-Komponente, im Windows-UPnP-Dienst (Universal Plug and Play), im Windows Kernel, im Windows-Zertifikatdialogfeld, den Windows AppX-Bereitstellungserweiterungen, im ActiveX-Installationsdienst und in splwow64.exe und beruhen u. a. auf Fehlern bei der Verarbeitung von Objekten im Speicher, bei der Verarbeitung von Dateivorg\u00e4ngen oder bei der Verwaltung von Zugriffsprivilegien. Ein authentisierter Angreifer kann dieses nutzen und seine Privilegien erweitern."
}
],
"product_status": {
"known_affected": [
"T012979",
"160428",
"T013769",
"T005302",
"100461",
"T012776",
"T002137",
"T005923",
"T014786",
"T005617",
"T010156",
"T008880"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-1392"
},
{
"cve": "CVE-2019-1388",
"notes": [
{
"category": "description",
"text": "In verschiedenen Microsoft Windows Betriebssystemen existieren mehrere Schwachstellen. Sie befinden sich im Windows-Benutzerprofildienst (ProfSvc), der Windows-Grafikkomponente, im Windows-Kernelmodustreiber, der StartTileData.dllm, der iphlpsvc.dll, der dssvc.dll, im Windows-Datenfreigabedienst, im Windows-Subsystem f\u00fcr Linux, im Windows Installer, der Win32k-Komponente, im Windows-UPnP-Dienst (Universal Plug and Play), im Windows Kernel, im Windows-Zertifikatdialogfeld, den Windows AppX-Bereitstellungserweiterungen, im ActiveX-Installationsdienst und in splwow64.exe und beruhen u. a. auf Fehlern bei der Verarbeitung von Objekten im Speicher, bei der Verarbeitung von Dateivorg\u00e4ngen oder bei der Verwaltung von Zugriffsprivilegien. Ein authentisierter Angreifer kann dieses nutzen und seine Privilegien erweitern."
}
],
"product_status": {
"known_affected": [
"T012979",
"160428",
"T013769",
"T005302",
"100461",
"T012776",
"T002137",
"T005923",
"T014786",
"T005617",
"T010156",
"T008880"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-1388"
},
{
"cve": "CVE-2019-1385",
"notes": [
{
"category": "description",
"text": "In verschiedenen Microsoft Windows Betriebssystemen existieren mehrere Schwachstellen. Sie befinden sich im Windows-Benutzerprofildienst (ProfSvc), der Windows-Grafikkomponente, im Windows-Kernelmodustreiber, der StartTileData.dllm, der iphlpsvc.dll, der dssvc.dll, im Windows-Datenfreigabedienst, im Windows-Subsystem f\u00fcr Linux, im Windows Installer, der Win32k-Komponente, im Windows-UPnP-Dienst (Universal Plug and Play), im Windows Kernel, im Windows-Zertifikatdialogfeld, den Windows AppX-Bereitstellungserweiterungen, im ActiveX-Installationsdienst und in splwow64.exe und beruhen u. a. auf Fehlern bei der Verarbeitung von Objekten im Speicher, bei der Verarbeitung von Dateivorg\u00e4ngen oder bei der Verwaltung von Zugriffsprivilegien. Ein authentisierter Angreifer kann dieses nutzen und seine Privilegien erweitern."
}
],
"product_status": {
"known_affected": [
"T012979",
"160428",
"T013769",
"T005302",
"100461",
"T012776",
"T002137",
"T005923",
"T014786",
"T005617",
"T010156",
"T008880"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-1385"
},
{
"cve": "CVE-2019-1383",
"notes": [
{
"category": "description",
"text": "In verschiedenen Microsoft Windows Betriebssystemen existieren mehrere Schwachstellen. Sie befinden sich im Windows-Benutzerprofildienst (ProfSvc), der Windows-Grafikkomponente, im Windows-Kernelmodustreiber, der StartTileData.dllm, der iphlpsvc.dll, der dssvc.dll, im Windows-Datenfreigabedienst, im Windows-Subsystem f\u00fcr Linux, im Windows Installer, der Win32k-Komponente, im Windows-UPnP-Dienst (Universal Plug and Play), im Windows Kernel, im Windows-Zertifikatdialogfeld, den Windows AppX-Bereitstellungserweiterungen, im ActiveX-Installationsdienst und in splwow64.exe und beruhen u. a. auf Fehlern bei der Verarbeitung von Objekten im Speicher, bei der Verarbeitung von Dateivorg\u00e4ngen oder bei der Verwaltung von Zugriffsprivilegien. Ein authentisierter Angreifer kann dieses nutzen und seine Privilegien erweitern."
}
],
"product_status": {
"known_affected": [
"T012979",
"160428",
"T013769",
"T005302",
"100461",
"T012776",
"T002137",
"T005923",
"T014786",
"T005617",
"T010156",
"T008880"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-1383"
},
{
"cve": "CVE-2019-1382",
"notes": [
{
"category": "description",
"text": "In verschiedenen Microsoft Windows Betriebssystemen existieren mehrere Schwachstellen. Sie befinden sich im Windows-Benutzerprofildienst (ProfSvc), der Windows-Grafikkomponente, im Windows-Kernelmodustreiber, der StartTileData.dllm, der iphlpsvc.dll, der dssvc.dll, im Windows-Datenfreigabedienst, im Windows-Subsystem f\u00fcr Linux, im Windows Installer, der Win32k-Komponente, im Windows-UPnP-Dienst (Universal Plug and Play), im Windows Kernel, im Windows-Zertifikatdialogfeld, den Windows AppX-Bereitstellungserweiterungen, im ActiveX-Installationsdienst und in splwow64.exe und beruhen u. a. auf Fehlern bei der Verarbeitung von Objekten im Speicher, bei der Verarbeitung von Dateivorg\u00e4ngen oder bei der Verwaltung von Zugriffsprivilegien. Ein authentisierter Angreifer kann dieses nutzen und seine Privilegien erweitern."
}
],
"product_status": {
"known_affected": [
"T012979",
"160428",
"T013769",
"T005302",
"100461",
"T012776",
"T002137",
"T005923",
"T014786",
"T005617",
"T010156",
"T008880"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-1382"
},
{
"cve": "CVE-2019-1380",
"notes": [
{
"category": "description",
"text": "In verschiedenen Microsoft Windows Betriebssystemen existieren mehrere Schwachstellen. Sie befinden sich im Windows-Benutzerprofildienst (ProfSvc), der Windows-Grafikkomponente, im Windows-Kernelmodustreiber, der StartTileData.dllm, der iphlpsvc.dll, der dssvc.dll, im Windows-Datenfreigabedienst, im Windows-Subsystem f\u00fcr Linux, im Windows Installer, der Win32k-Komponente, im Windows-UPnP-Dienst (Universal Plug and Play), im Windows Kernel, im Windows-Zertifikatdialogfeld, den Windows AppX-Bereitstellungserweiterungen, im ActiveX-Installationsdienst und in splwow64.exe und beruhen u. a. auf Fehlern bei der Verarbeitung von Objekten im Speicher, bei der Verarbeitung von Dateivorg\u00e4ngen oder bei der Verwaltung von Zugriffsprivilegien. Ein authentisierter Angreifer kann dieses nutzen und seine Privilegien erweitern."
}
],
"product_status": {
"known_affected": [
"T012979",
"160428",
"T013769",
"T005302",
"100461",
"T012776",
"T002137",
"T005923",
"T014786",
"T005617",
"T010156",
"T008880"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-1380"
},
{
"cve": "CVE-2019-1379",
"notes": [
{
"category": "description",
"text": "In verschiedenen Microsoft Windows Betriebssystemen existieren mehrere Schwachstellen. Sie befinden sich im Windows-Benutzerprofildienst (ProfSvc), der Windows-Grafikkomponente, im Windows-Kernelmodustreiber, der StartTileData.dllm, der iphlpsvc.dll, der dssvc.dll, im Windows-Datenfreigabedienst, im Windows-Subsystem f\u00fcr Linux, im Windows Installer, der Win32k-Komponente, im Windows-UPnP-Dienst (Universal Plug and Play), im Windows Kernel, im Windows-Zertifikatdialogfeld, den Windows AppX-Bereitstellungserweiterungen, im ActiveX-Installationsdienst und in splwow64.exe und beruhen u. a. auf Fehlern bei der Verarbeitung von Objekten im Speicher, bei der Verarbeitung von Dateivorg\u00e4ngen oder bei der Verwaltung von Zugriffsprivilegien. Ein authentisierter Angreifer kann dieses nutzen und seine Privilegien erweitern."
}
],
"product_status": {
"known_affected": [
"T012979",
"160428",
"T013769",
"T005302",
"100461",
"T012776",
"T002137",
"T005923",
"T014786",
"T005617",
"T010156",
"T008880"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-1379"
},
{
"cve": "CVE-2019-1324",
"notes": [
{
"category": "description",
"text": "In verschiedenen Microsoft Windows Betriebssystemen existiert eine Schwachstelle. Sie beruht auf einem Fehler bei der Verarbeitung von IPv6-Flowlabel durch den Windows-TCP/IP-Stapel. Ein anonymer Angreifer kann dieses nutzen und vertrauliche Daten einsehen."
}
],
"product_status": {
"known_affected": [
"T012979",
"160428",
"T013769",
"T005302",
"100461",
"T012776",
"T002137",
"T005923",
"T014786",
"T005617",
"T010156",
"T008880"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-1324"
},
{
"cve": "CVE-2019-11135",
"notes": [
{
"category": "description",
"text": "In verschiedenen Microsoft Windows Betriebssystemen existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Windows Kernel, Windows-Fehlerberichterstattung (Windows Error Reporting, WER), Windows Servicing Stack, Windows Remoteprozeduraufruf, Adobe Type Manager-Schriftartentreiber (ATMFD.dll) f\u00fcr Windows, Windows Modules Installer-Dienst und Win32k und beruhen auf Fehlern bei der Initialisierung und Verarbeitung von Objekten im Speicher und bei der Verwaltung von Zugriffsprivilegien. Ein authentisierter Angreifer kann dieses nutzen und vertrauliche Daten einsehen."
}
],
"product_status": {
"known_affected": [
"T012979",
"160428",
"T013769",
"T005302",
"100461",
"T012776",
"T002137",
"T005923",
"T014786",
"T005617",
"T010156",
"T008880"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11135"
},
{
"cve": "CVE-2019-1374",
"notes": [
{
"category": "description",
"text": "In verschiedenen Microsoft Windows Betriebssystemen existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Windows Kernel, Windows-Fehlerberichterstattung (Windows Error Reporting, WER), Windows Servicing Stack, Windows Remoteprozeduraufruf, Adobe Type Manager-Schriftartentreiber (ATMFD.dll) f\u00fcr Windows, Windows Modules Installer-Dienst und Win32k und beruhen auf Fehlern bei der Initialisierung und Verarbeitung von Objekten im Speicher und bei der Verwaltung von Zugriffsprivilegien. Ein authentisierter Angreifer kann dieses nutzen und vertrauliche Daten einsehen."
}
],
"product_status": {
"known_affected": [
"T012979",
"160428",
"T013769",
"T005302",
"100461",
"T012776",
"T002137",
"T005923",
"T014786",
"T005617",
"T010156",
"T008880"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-1374"
},
{
"cve": "CVE-2019-1381",
"notes": [
{
"category": "description",
"text": "In verschiedenen Microsoft Windows Betriebssystemen existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Windows Kernel, Windows-Fehlerberichterstattung (Windows Error Reporting, WER), Windows Servicing Stack, Windows Remoteprozeduraufruf, Adobe Type Manager-Schriftartentreiber (ATMFD.dll) f\u00fcr Windows, Windows Modules Installer-Dienst und Win32k und beruhen auf Fehlern bei der Initialisierung und Verarbeitung von Objekten im Speicher und bei der Verwaltung von Zugriffsprivilegien. Ein authentisierter Angreifer kann dieses nutzen und vertrauliche Daten einsehen."
}
],
"product_status": {
"known_affected": [
"T012979",
"160428",
"T013769",
"T005302",
"100461",
"T012776",
"T002137",
"T005923",
"T014786",
"T005617",
"T010156",
"T008880"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-1381"
},
{
"cve": "CVE-2019-1409",
"notes": [
{
"category": "description",
"text": "In verschiedenen Microsoft Windows Betriebssystemen existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Windows Kernel, Windows-Fehlerberichterstattung (Windows Error Reporting, WER), Windows Servicing Stack, Windows Remoteprozeduraufruf, Adobe Type Manager-Schriftartentreiber (ATMFD.dll) f\u00fcr Windows, Windows Modules Installer-Dienst und Win32k und beruhen auf Fehlern bei der Initialisierung und Verarbeitung von Objekten im Speicher und bei der Verwaltung von Zugriffsprivilegien. Ein authentisierter Angreifer kann dieses nutzen und vertrauliche Daten einsehen."
}
],
"product_status": {
"known_affected": [
"T012979",
"160428",
"T013769",
"T005302",
"100461",
"T012776",
"T002137",
"T005923",
"T014786",
"T005617",
"T010156",
"T008880"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-1409"
},
{
"cve": "CVE-2019-1412",
"notes": [
{
"category": "description",
"text": "In verschiedenen Microsoft Windows Betriebssystemen existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Windows Kernel, Windows-Fehlerberichterstattung (Windows Error Reporting, WER), Windows Servicing Stack, Windows Remoteprozeduraufruf, Adobe Type Manager-Schriftartentreiber (ATMFD.dll) f\u00fcr Windows, Windows Modules Installer-Dienst und Win32k und beruhen auf Fehlern bei der Initialisierung und Verarbeitung von Objekten im Speicher und bei der Verwaltung von Zugriffsprivilegien. Ein authentisierter Angreifer kann dieses nutzen und vertrauliche Daten einsehen."
}
],
"product_status": {
"known_affected": [
"T012979",
"160428",
"T013769",
"T005302",
"100461",
"T012776",
"T002137",
"T005923",
"T014786",
"T005617",
"T010156",
"T008880"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-1412"
},
{
"cve": "CVE-2019-1418",
"notes": [
{
"category": "description",
"text": "In verschiedenen Microsoft Windows Betriebssystemen existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Windows Kernel, Windows-Fehlerberichterstattung (Windows Error Reporting, WER), Windows Servicing Stack, Windows Remoteprozeduraufruf, Adobe Type Manager-Schriftartentreiber (ATMFD.dll) f\u00fcr Windows, Windows Modules Installer-Dienst und Win32k und beruhen auf Fehlern bei der Initialisierung und Verarbeitung von Objekten im Speicher und bei der Verwaltung von Zugriffsprivilegien. Ein authentisierter Angreifer kann dieses nutzen und vertrauliche Daten einsehen."
}
],
"product_status": {
"known_affected": [
"T012979",
"160428",
"T013769",
"T005302",
"100461",
"T012776",
"T002137",
"T005923",
"T014786",
"T005617",
"T010156",
"T008880"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-1418"
},
{
"cve": "CVE-2019-1436",
"notes": [
{
"category": "description",
"text": "In verschiedenen Microsoft Windows Betriebssystemen existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Windows Kernel, Windows-Fehlerberichterstattung (Windows Error Reporting, WER), Windows Servicing Stack, Windows Remoteprozeduraufruf, Adobe Type Manager-Schriftartentreiber (ATMFD.dll) f\u00fcr Windows, Windows Modules Installer-Dienst und Win32k und beruhen auf Fehlern bei der Initialisierung und Verarbeitung von Objekten im Speicher und bei der Verwaltung von Zugriffsprivilegien. Ein authentisierter Angreifer kann dieses nutzen und vertrauliche Daten einsehen."
}
],
"product_status": {
"known_affected": [
"T012979",
"160428",
"T013769",
"T005302",
"100461",
"T012776",
"T002137",
"T005923",
"T014786",
"T005617",
"T010156",
"T008880"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-1436"
},
{
"cve": "CVE-2019-1440",
"notes": [
{
"category": "description",
"text": "In verschiedenen Microsoft Windows Betriebssystemen existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Windows Kernel, Windows-Fehlerberichterstattung (Windows Error Reporting, WER), Windows Servicing Stack, Windows Remoteprozeduraufruf, Adobe Type Manager-Schriftartentreiber (ATMFD.dll) f\u00fcr Windows, Windows Modules Installer-Dienst und Win32k und beruhen auf Fehlern bei der Initialisierung und Verarbeitung von Objekten im Speicher und bei der Verwaltung von Zugriffsprivilegien. Ein authentisierter Angreifer kann dieses nutzen und vertrauliche Daten einsehen."
}
],
"product_status": {
"known_affected": [
"T012979",
"160428",
"T013769",
"T005302",
"100461",
"T012776",
"T002137",
"T005923",
"T014786",
"T005617",
"T010156",
"T008880"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-1440"
},
{
"cve": "CVE-2019-1411",
"notes": [
{
"category": "description",
"text": "In verschiedenen Microsoft Windows Betriebssystemen existieren mehrere Schwachstellen. Sie befinden sich in DirectWrite und der Windows-GDI-Komponente und beruhen auf Fehlern bei der Verarbeitung von Objekten im Speicher. Ein entfernter anonymer Angreifer kann dieses nutzen und vertrauliche Daten einsehen. Zur erfolgreichen Ausnutzung dieser Schwachstellen muss der Angreifer den Benutzer dazu bringen, eine modifizierte Datei zu \u00f6ffnen oder eine pr\u00e4parierte Web Seite aufzurufen."
}
],
"product_status": {
"known_affected": [
"T012979",
"160428",
"T013769",
"T005302",
"100461",
"T012776",
"T002137",
"T005923",
"T014786",
"T005617",
"T010156",
"T008880"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-1411"
},
{
"cve": "CVE-2019-1432",
"notes": [
{
"category": "description",
"text": "In verschiedenen Microsoft Windows Betriebssystemen existieren mehrere Schwachstellen. Sie befinden sich in DirectWrite und der Windows-GDI-Komponente und beruhen auf Fehlern bei der Verarbeitung von Objekten im Speicher. Ein entfernter anonymer Angreifer kann dieses nutzen und vertrauliche Daten einsehen. Zur erfolgreichen Ausnutzung dieser Schwachstellen muss der Angreifer den Benutzer dazu bringen, eine modifizierte Datei zu \u00f6ffnen oder eine pr\u00e4parierte Web Seite aufzurufen."
}
],
"product_status": {
"known_affected": [
"T012979",
"160428",
"T013769",
"T005302",
"100461",
"T012776",
"T002137",
"T005923",
"T014786",
"T005617",
"T010156",
"T008880"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-1432"
},
{
"cve": "CVE-2019-1439",
"notes": [
{
"category": "description",
"text": "In verschiedenen Microsoft Windows Betriebssystemen existieren mehrere Schwachstellen. Sie befinden sich in DirectWrite und der Windows-GDI-Komponente und beruhen auf Fehlern bei der Verarbeitung von Objekten im Speicher. Ein entfernter anonymer Angreifer kann dieses nutzen und vertrauliche Daten einsehen. Zur erfolgreichen Ausnutzung dieser Schwachstellen muss der Angreifer den Benutzer dazu bringen, eine modifizierte Datei zu \u00f6ffnen oder eine pr\u00e4parierte Web Seite aufzurufen."
}
],
"product_status": {
"known_affected": [
"T012979",
"160428",
"T013769",
"T005302",
"100461",
"T012776",
"T002137",
"T005923",
"T014786",
"T005617",
"T010156",
"T008880"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-1439"
},
{
"cve": "CVE-2019-0721",
"notes": [
{
"category": "description",
"text": "In verschiedenen Microsoft Windows Betriebssystemen existieren mehrere Schwachstellen. Sie befinden sich im Windows Hyper-V und Windows Hyper-V-Netzwerkswitch und beruhen auf Fehlern bei der Verarbeitung von Eingaben von einem auf einem Gastbetriebssystem authentifizierten Benutzer. Ein authentisierter Angreifer kann dieses nutzen und Code mit den Privilegien des Hyper-V zur Ausf\u00fchrung bringen."
}
],
"product_status": {
"known_affected": [
"T012979",
"160428",
"T013769",
"T005302",
"100461",
"T012776",
"T002137",
"T005923",
"T014786",
"T005617",
"T010156",
"T008880"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-0721"
},
{
"cve": "CVE-2019-1389",
"notes": [
{
"category": "description",
"text": "In verschiedenen Microsoft Windows Betriebssystemen existieren mehrere Schwachstellen. Sie befinden sich im Windows Hyper-V und Windows Hyper-V-Netzwerkswitch und beruhen auf Fehlern bei der Verarbeitung von Eingaben von einem auf einem Gastbetriebssystem authentifizierten Benutzer. Ein authentisierter Angreifer kann dieses nutzen und Code mit den Privilegien des Hyper-V zur Ausf\u00fchrung bringen."
}
],
"product_status": {
"known_affected": [
"T012979",
"160428",
"T013769",
"T005302",
"100461",
"T012776",
"T002137",
"T005923",
"T014786",
"T005617",
"T010156",
"T008880"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-1389"
},
{
"cve": "CVE-2019-1397",
"notes": [
{
"category": "description",
"text": "In verschiedenen Microsoft Windows Betriebssystemen existieren mehrere Schwachstellen. Sie befinden sich im Windows Hyper-V und Windows Hyper-V-Netzwerkswitch und beruhen auf Fehlern bei der Verarbeitung von Eingaben von einem auf einem Gastbetriebssystem authentifizierten Benutzer. Ein authentisierter Angreifer kann dieses nutzen und Code mit den Privilegien des Hyper-V zur Ausf\u00fchrung bringen."
}
],
"product_status": {
"known_affected": [
"T012979",
"160428",
"T013769",
"T005302",
"100461",
"T012776",
"T002137",
"T005923",
"T014786",
"T005617",
"T010156",
"T008880"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-1397"
},
{
"cve": "CVE-2019-1398",
"notes": [
{
"category": "description",
"text": "In verschiedenen Microsoft Windows Betriebssystemen existieren mehrere Schwachstellen. Sie befinden sich im Windows Hyper-V und Windows Hyper-V-Netzwerkswitch und beruhen auf Fehlern bei der Verarbeitung von Eingaben von einem auf einem Gastbetriebssystem authentifizierten Benutzer. Ein authentisierter Angreifer kann dieses nutzen und Code mit den Privilegien des Hyper-V zur Ausf\u00fchrung bringen."
}
],
"product_status": {
"known_affected": [
"T012979",
"160428",
"T013769",
"T005302",
"100461",
"T012776",
"T002137",
"T005923",
"T014786",
"T005617",
"T010156",
"T008880"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-1398"
},
{
"cve": "CVE-2019-1406",
"notes": [
{
"category": "description",
"text": "In verschiedenen Microsoft Windows Betriebssystemen existieren mehrere Schwachstellen. Sie befinden sich in der Windows Jet-Datenbank-Engine, Windows Adobe Type Manager-Bibliothek und Windows Media Foundation und beruhen auf Fehlern bei der Verarbeitung von OpenType-Schriftarten oder Objekten im Speicher und Fehlern bei der Analyse von QuickTime-Mediendateien. Ein entfernter anonymer Angreifer kann dieses nutzen und Code mit den Privilegien des angegriffenen Dienstes zur Ausf\u00fchrung bringen. Zur erfolgreichen Ausnutzung dieser Schwachstellen ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T012979",
"160428",
"T013769",
"T005302",
"100461",
"T012776",
"T002137",
"T005923",
"T014786",
"T005617",
"T010156",
"T008880"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-1406"
},
{
"cve": "CVE-2019-1419",
"notes": [
{
"category": "description",
"text": "In verschiedenen Microsoft Windows Betriebssystemen existieren mehrere Schwachstellen. Sie befinden sich in der Windows Jet-Datenbank-Engine, Windows Adobe Type Manager-Bibliothek und Windows Media Foundation und beruhen auf Fehlern bei der Verarbeitung von OpenType-Schriftarten oder Objekten im Speicher und Fehlern bei der Analyse von QuickTime-Mediendateien. Ein entfernter anonymer Angreifer kann dieses nutzen und Code mit den Privilegien des angegriffenen Dienstes zur Ausf\u00fchrung bringen. Zur erfolgreichen Ausnutzung dieser Schwachstellen ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T012979",
"160428",
"T013769",
"T005302",
"100461",
"T012776",
"T002137",
"T005923",
"T014786",
"T005617",
"T010156",
"T008880"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-1419"
},
{
"cve": "CVE-2019-1430",
"notes": [
{
"category": "description",
"text": "In verschiedenen Microsoft Windows Betriebssystemen existieren mehrere Schwachstellen. Sie befinden sich in der Windows Jet-Datenbank-Engine, Windows Adobe Type Manager-Bibliothek und Windows Media Foundation und beruhen auf Fehlern bei der Verarbeitung von OpenType-Schriftarten oder Objekten im Speicher und Fehlern bei der Analyse von QuickTime-Mediendateien. Ein entfernter anonymer Angreifer kann dieses nutzen und Code mit den Privilegien des angegriffenen Dienstes zur Ausf\u00fchrung bringen. Zur erfolgreichen Ausnutzung dieser Schwachstellen ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T012979",
"160428",
"T013769",
"T005302",
"100461",
"T012776",
"T002137",
"T005923",
"T014786",
"T005617",
"T010156",
"T008880"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-1430"
},
{
"cve": "CVE-2019-1456",
"notes": [
{
"category": "description",
"text": "In verschiedenen Microsoft Windows Betriebssystemen existieren mehrere Schwachstellen. Sie befinden sich in der Windows Jet-Datenbank-Engine, Windows Adobe Type Manager-Bibliothek und Windows Media Foundation und beruhen auf Fehlern bei der Verarbeitung von OpenType-Schriftarten oder Objekten im Speicher und Fehlern bei der Analyse von QuickTime-Mediendateien. Ein entfernter anonymer Angreifer kann dieses nutzen und Code mit den Privilegien des angegriffenen Dienstes zur Ausf\u00fchrung bringen. Zur erfolgreichen Ausnutzung dieser Schwachstellen ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T012979",
"160428",
"T013769",
"T005302",
"100461",
"T012776",
"T002137",
"T005923",
"T014786",
"T005617",
"T010156",
"T008880"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-1456"
},
{
"cve": "CVE-2019-1441",
"notes": [
{
"category": "description",
"text": "In verschiedenen Microsoft Windows Betriebssystemen existiert eine Schwachstelle. Sie befindet sich in der Windows-Schriftartenbibliothek und beruht auf einem Fehler bei der Verarbeitung eingebetteter Schriftarten. Ein entfernter anonymer Angreifer kann dieses nutzen und Code mit administrativen Privilegien zur Ausf\u00fchrung bringen. Zur erfolgreichen Ausnutzung dieser Schwachstelle ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T012979",
"160428",
"T013769",
"T005302",
"100461",
"T012776",
"T002137",
"T005923",
"T014786",
"T005617",
"T010156",
"T008880"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-1441"
},
{
"cve": "CVE-2019-1234",
"notes": [
{
"category": "description",
"text": "Im Microsoft Windows Azure Stack existiert eine Schwachstelle. Sie beruht darauf, dass der Azure Stack bestimmte Anforderungen nicht validieren kann. Ein Angreifer kann dieses nutzen und einen Spoofing Angriff durchf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T012979",
"160428",
"T013769",
"T005302",
"100461",
"T012776",
"T002137",
"T005923",
"T014786",
"T005617",
"T010156",
"T008880"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-1234"
},
{
"cve": "CVE-2019-1384",
"notes": [
{
"category": "description",
"text": "In verschiedenen Microsoft Windows Betriebssystemen existiert eine Schwachstelle. Sie beruht auf einem Fehler bei der Pr\u00fcfung von NTLM Netzwerkauthentifizierungsnachrichten. Ein authentisierter Angreifer kann dieses nutzen und die Sicherheitsfunktion umgehen."
}
],
"product_status": {
"known_affected": [
"T012979",
"160428",
"T013769",
"T005302",
"100461",
"T012776",
"T002137",
"T005923",
"T014786",
"T005617",
"T010156",
"T008880"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-1384"
},
{
"cve": "CVE-2019-1424",
"notes": [
{
"category": "description",
"text": "In verschiedenen Microsoft Windows Betriebssystemen existiert eine Schwachstelle. Sie beruht auf einem Fehler, wenn Windows NetLogon einen sicheren Kommunikationskanal nicht ordnungsgem\u00e4\u00df verarbeitet. Ein entfernter anonymer Angreifer in einer Man-in-the-Middle Position kann dieses nutzen und die Sicherheitsfunktionen umgehen."
}
],
"product_status": {
"known_affected": [
"T012979",
"160428",
"T013769",
"T005302",
"100461",
"T012776",
"T002137",
"T005923",
"T014786",
"T005617",
"T010156",
"T008880"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-1424"
}
]
}
wid-sec-w-2023-0884
Vulnerability from csaf_certbund
Notes
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Windows ist ein Betriebssystem von Microsoft.\r\nMicrosoft Windows RT ist eine Version des Windows-Betriebssystems von Microsoft f\u00fcr Ger\u00e4te basierend auf der ARM-Architektur, wie beispielsweise Tablet-Computer.\r\nDie Windows Azure-Plattform ist eine Cloud Computing-Plattform von Microsoft.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, authentisierter oder anonymer Angreifer kann mehrere Schwachstellen in verschiedenen Microsoft Windows Betriebssystemen und Microsoft Windows Azure Stack ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren, Code mit erweiterten Privilegien zur Ausf\u00fchrung zu bringen, Sicherheitsmechanismen zu umgehen, Spoofing Angriffe durchzuf\u00fchren, vertrauliche Daten einzusehen oder seine Privilegien zu erweitern.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2023-0884 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2019/wid-sec-w-2023-0884.json"
},
{
"category": "self",
"summary": "WID-SEC-2023-0884 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-0884"
},
{
"category": "external",
"summary": "CISA Known Exploited Vulnerabilities Catalog vom 2023-04-10",
"url": "https://www.cisa.gov/news-events/alerts/2023/04/07/cisa-adds-five-known-exploited-vulnerabilities-catalog"
},
{
"category": "external",
"summary": "Microsoft Leitfaden f\u00fcr Sicherheitsupdates vom 2019-11-12",
"url": "https://portal.msrc.microsoft.com/de-de/security-guidance"
},
{
"category": "external",
"summary": "Hitachi Vulnerability Information HITACHI-SEC-2019-311 vom 2019-12-05",
"url": "http://www.hitachi.co.jp/products/it/storage-solutions/global/sec_info/2019/11.html"
}
],
"source_lang": "en-US",
"title": "Microsoft Windows: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2023-04-10T22:00:00.000+00:00",
"generator": {
"date": "2024-08-15T17:48:17.777+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.5"
}
},
"id": "WID-SEC-W-2023-0884",
"initial_release_date": "2019-11-12T23:00:00.000+00:00",
"revision_history": [
{
"date": "2019-11-12T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2019-12-04T23:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von HITACHI aufgenommen"
},
{
"date": "2023-04-10T22:00:00.000+00:00",
"number": "3",
"summary": "Exploit aufgenommen"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Microsoft Windows 10",
"product": {
"name": "Microsoft Windows 10",
"product_id": "T005617",
"product_identification_helper": {
"cpe": "cpe:/o:microsoft:windows_10:-"
}
}
},
{
"category": "product_name",
"name": "Microsoft Windows 7",
"product": {
"name": "Microsoft Windows 7",
"product_id": "100461",
"product_identification_helper": {
"cpe": "cpe:/o:microsoft:windows_7:-"
}
}
},
{
"category": "product_name",
"name": "Microsoft Windows 8.1",
"product": {
"name": "Microsoft Windows 8.1",
"product_id": "T005302",
"product_identification_helper": {
"cpe": "cpe:/o:microsoft:windows_8.1:-"
}
}
},
{
"category": "product_name",
"name": "Microsoft Windows Azure Stack",
"product": {
"name": "Microsoft Windows Azure Stack",
"product_id": "T010156",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:windows_azure:-"
}
}
},
{
"category": "product_name",
"name": "Microsoft Windows RT 8.1",
"product": {
"name": "Microsoft Windows RT 8.1",
"product_id": "T002137",
"product_identification_helper": {
"cpe": "cpe:/o:microsoft:windows_rt_8.1:-"
}
}
},
{
"category": "product_name",
"name": "Microsoft Windows Server",
"product": {
"name": "Microsoft Windows Server",
"product_id": "T012776",
"product_identification_helper": {
"cpe": "cpe:/o:microsoft:windows_server:-"
}
}
},
{
"category": "product_name",
"name": "Microsoft Windows Server 2008 R2 SP1",
"product": {
"name": "Microsoft Windows Server 2008 R2 SP1",
"product_id": "T013769",
"product_identification_helper": {
"cpe": "cpe:/o:microsoft:windows_server_2008_r2:sp_1"
}
}
},
{
"category": "product_name",
"name": "Microsoft Windows Server 2008 SP2",
"product": {
"name": "Microsoft Windows Server 2008 SP2",
"product_id": "160428",
"product_identification_helper": {
"cpe": "cpe:/o:microsoft:windows_server_2008::sp2"
}
}
},
{
"category": "product_name",
"name": "Microsoft Windows Server 2012",
"product": {
"name": "Microsoft Windows Server 2012",
"product_id": "T005923",
"product_identification_helper": {
"cpe": "cpe:/o:microsoft:windows_server_2012:-"
}
}
},
{
"category": "product_name",
"name": "Microsoft Windows Server 2012 R2",
"product": {
"name": "Microsoft Windows Server 2012 R2",
"product_id": "T014786",
"product_identification_helper": {
"cpe": "cpe:/o:microsoft:windows_server_2012_r2:-"
}
}
},
{
"category": "product_name",
"name": "Microsoft Windows Server 2016",
"product": {
"name": "Microsoft Windows Server 2016",
"product_id": "T008880",
"product_identification_helper": {
"cpe": "cpe:/o:microsoft:windows_server_2016:-"
}
}
},
{
"category": "product_name",
"name": "Microsoft Windows Server 2019",
"product": {
"name": "Microsoft Windows Server 2019",
"product_id": "T012979",
"product_identification_helper": {
"cpe": "cpe:/o:microsoft:windows_server_2019:-"
}
}
}
],
"category": "vendor",
"name": "Microsoft"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-12207",
"notes": [
{
"category": "description",
"text": "In verschiedenen Microsoft Windows Betriebssystemen existieren mehrere Schwachstellen. Sie beruhen auf Fehlern bei der Verarbeitung von Objekten im Speicher oder Fehlern bei der Verarbeitung von Benutzereingaben durch den Microsoft Hyper-V auf einem Hostserver oder den Microsoft Hyper-V-Netzwerkswitch auf einem Hostserver. Ein authentisierter Angreifer kann dieses zu einem Denial of Service Angriff nutzen."
}
],
"product_status": {
"known_affected": [
"T012979",
"160428",
"T013769",
"T005302",
"100461",
"T012776",
"T002137",
"T005923",
"T014786",
"T005617",
"T010156",
"T008880"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2018-12207"
},
{
"cve": "CVE-2019-0712",
"notes": [
{
"category": "description",
"text": "In verschiedenen Microsoft Windows Betriebssystemen existieren mehrere Schwachstellen. Sie beruhen auf Fehlern bei der Verarbeitung von Objekten im Speicher oder Fehlern bei der Verarbeitung von Benutzereingaben durch den Microsoft Hyper-V auf einem Hostserver oder den Microsoft Hyper-V-Netzwerkswitch auf einem Hostserver. Ein authentisierter Angreifer kann dieses zu einem Denial of Service Angriff nutzen."
}
],
"product_status": {
"known_affected": [
"T012979",
"160428",
"T013769",
"T005302",
"100461",
"T012776",
"T002137",
"T005923",
"T014786",
"T005617",
"T010156",
"T008880"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-0712"
},
{
"cve": "CVE-2019-1309",
"notes": [
{
"category": "description",
"text": "In verschiedenen Microsoft Windows Betriebssystemen existieren mehrere Schwachstellen. Sie beruhen auf Fehlern bei der Verarbeitung von Objekten im Speicher oder Fehlern bei der Verarbeitung von Benutzereingaben durch den Microsoft Hyper-V auf einem Hostserver oder den Microsoft Hyper-V-Netzwerkswitch auf einem Hostserver. Ein authentisierter Angreifer kann dieses zu einem Denial of Service Angriff nutzen."
}
],
"product_status": {
"known_affected": [
"T012979",
"160428",
"T013769",
"T005302",
"100461",
"T012776",
"T002137",
"T005923",
"T014786",
"T005617",
"T010156",
"T008880"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-1309"
},
{
"cve": "CVE-2019-1310",
"notes": [
{
"category": "description",
"text": "In verschiedenen Microsoft Windows Betriebssystemen existieren mehrere Schwachstellen. Sie beruhen auf Fehlern bei der Verarbeitung von Objekten im Speicher oder Fehlern bei der Verarbeitung von Benutzereingaben durch den Microsoft Hyper-V auf einem Hostserver oder den Microsoft Hyper-V-Netzwerkswitch auf einem Hostserver. Ein authentisierter Angreifer kann dieses zu einem Denial of Service Angriff nutzen."
}
],
"product_status": {
"known_affected": [
"T012979",
"160428",
"T013769",
"T005302",
"100461",
"T012776",
"T002137",
"T005923",
"T014786",
"T005617",
"T010156",
"T008880"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-1310"
},
{
"cve": "CVE-2019-1391",
"notes": [
{
"category": "description",
"text": "In verschiedenen Microsoft Windows Betriebssystemen existieren mehrere Schwachstellen. Sie beruhen auf Fehlern bei der Verarbeitung von Objekten im Speicher oder Fehlern bei der Verarbeitung von Benutzereingaben durch den Microsoft Hyper-V auf einem Hostserver oder den Microsoft Hyper-V-Netzwerkswitch auf einem Hostserver. Ein authentisierter Angreifer kann dieses zu einem Denial of Service Angriff nutzen."
}
],
"product_status": {
"known_affected": [
"T012979",
"160428",
"T013769",
"T005302",
"100461",
"T012776",
"T002137",
"T005923",
"T014786",
"T005617",
"T010156",
"T008880"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-1391"
},
{
"cve": "CVE-2019-1399",
"notes": [
{
"category": "description",
"text": "In verschiedenen Microsoft Windows Betriebssystemen existieren mehrere Schwachstellen. Sie beruhen auf Fehlern bei der Verarbeitung von Objekten im Speicher oder Fehlern bei der Verarbeitung von Benutzereingaben durch den Microsoft Hyper-V auf einem Hostserver oder den Microsoft Hyper-V-Netzwerkswitch auf einem Hostserver. Ein authentisierter Angreifer kann dieses zu einem Denial of Service Angriff nutzen."
}
],
"product_status": {
"known_affected": [
"T012979",
"160428",
"T013769",
"T005302",
"100461",
"T012776",
"T002137",
"T005923",
"T014786",
"T005617",
"T010156",
"T008880"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-1399"
},
{
"cve": "CVE-2019-1454",
"notes": [
{
"category": "description",
"text": "In verschiedenen Microsoft Windows Betriebssystemen existieren mehrere Schwachstellen. Sie befinden sich im Windows-Benutzerprofildienst (ProfSvc), der Windows-Grafikkomponente, im Windows-Kernelmodustreiber, der StartTileData.dllm, der iphlpsvc.dll, der dssvc.dll, im Windows-Datenfreigabedienst, im Windows-Subsystem f\u00fcr Linux, im Windows Installer, der Win32k-Komponente, im Windows-UPnP-Dienst (Universal Plug and Play), im Windows Kernel, im Windows-Zertifikatdialogfeld, den Windows AppX-Bereitstellungserweiterungen, im ActiveX-Installationsdienst und in splwow64.exe und beruhen u. a. auf Fehlern bei der Verarbeitung von Objekten im Speicher, bei der Verarbeitung von Dateivorg\u00e4ngen oder bei der Verwaltung von Zugriffsprivilegien. Ein authentisierter Angreifer kann dieses nutzen und seine Privilegien erweitern."
}
],
"product_status": {
"known_affected": [
"T012979",
"160428",
"T013769",
"T005302",
"100461",
"T012776",
"T002137",
"T005923",
"T014786",
"T005617",
"T010156",
"T008880"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-1454"
},
{
"cve": "CVE-2019-1438",
"notes": [
{
"category": "description",
"text": "In verschiedenen Microsoft Windows Betriebssystemen existieren mehrere Schwachstellen. Sie befinden sich im Windows-Benutzerprofildienst (ProfSvc), der Windows-Grafikkomponente, im Windows-Kernelmodustreiber, der StartTileData.dllm, der iphlpsvc.dll, der dssvc.dll, im Windows-Datenfreigabedienst, im Windows-Subsystem f\u00fcr Linux, im Windows Installer, der Win32k-Komponente, im Windows-UPnP-Dienst (Universal Plug and Play), im Windows Kernel, im Windows-Zertifikatdialogfeld, den Windows AppX-Bereitstellungserweiterungen, im ActiveX-Installationsdienst und in splwow64.exe und beruhen u. a. auf Fehlern bei der Verarbeitung von Objekten im Speicher, bei der Verarbeitung von Dateivorg\u00e4ngen oder bei der Verwaltung von Zugriffsprivilegien. Ein authentisierter Angreifer kann dieses nutzen und seine Privilegien erweitern."
}
],
"product_status": {
"known_affected": [
"T012979",
"160428",
"T013769",
"T005302",
"100461",
"T012776",
"T002137",
"T005923",
"T014786",
"T005617",
"T010156",
"T008880"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-1438"
},
{
"cve": "CVE-2019-1437",
"notes": [
{
"category": "description",
"text": "In verschiedenen Microsoft Windows Betriebssystemen existieren mehrere Schwachstellen. Sie befinden sich im Windows-Benutzerprofildienst (ProfSvc), der Windows-Grafikkomponente, im Windows-Kernelmodustreiber, der StartTileData.dllm, der iphlpsvc.dll, der dssvc.dll, im Windows-Datenfreigabedienst, im Windows-Subsystem f\u00fcr Linux, im Windows Installer, der Win32k-Komponente, im Windows-UPnP-Dienst (Universal Plug and Play), im Windows Kernel, im Windows-Zertifikatdialogfeld, den Windows AppX-Bereitstellungserweiterungen, im ActiveX-Installationsdienst und in splwow64.exe und beruhen u. a. auf Fehlern bei der Verarbeitung von Objekten im Speicher, bei der Verarbeitung von Dateivorg\u00e4ngen oder bei der Verwaltung von Zugriffsprivilegien. Ein authentisierter Angreifer kann dieses nutzen und seine Privilegien erweitern."
}
],
"product_status": {
"known_affected": [
"T012979",
"160428",
"T013769",
"T005302",
"100461",
"T012776",
"T002137",
"T005923",
"T014786",
"T005617",
"T010156",
"T008880"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-1437"
},
{
"cve": "CVE-2019-1435",
"notes": [
{
"category": "description",
"text": "In verschiedenen Microsoft Windows Betriebssystemen existieren mehrere Schwachstellen. Sie befinden sich im Windows-Benutzerprofildienst (ProfSvc), der Windows-Grafikkomponente, im Windows-Kernelmodustreiber, der StartTileData.dllm, der iphlpsvc.dll, der dssvc.dll, im Windows-Datenfreigabedienst, im Windows-Subsystem f\u00fcr Linux, im Windows Installer, der Win32k-Komponente, im Windows-UPnP-Dienst (Universal Plug and Play), im Windows Kernel, im Windows-Zertifikatdialogfeld, den Windows AppX-Bereitstellungserweiterungen, im ActiveX-Installationsdienst und in splwow64.exe und beruhen u. a. auf Fehlern bei der Verarbeitung von Objekten im Speicher, bei der Verarbeitung von Dateivorg\u00e4ngen oder bei der Verwaltung von Zugriffsprivilegien. Ein authentisierter Angreifer kann dieses nutzen und seine Privilegien erweitern."
}
],
"product_status": {
"known_affected": [
"T012979",
"160428",
"T013769",
"T005302",
"100461",
"T012776",
"T002137",
"T005923",
"T014786",
"T005617",
"T010156",
"T008880"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-1435"
},
{
"cve": "CVE-2019-1434",
"notes": [
{
"category": "description",
"text": "In verschiedenen Microsoft Windows Betriebssystemen existieren mehrere Schwachstellen. Sie befinden sich im Windows-Benutzerprofildienst (ProfSvc), der Windows-Grafikkomponente, im Windows-Kernelmodustreiber, der StartTileData.dllm, der iphlpsvc.dll, der dssvc.dll, im Windows-Datenfreigabedienst, im Windows-Subsystem f\u00fcr Linux, im Windows Installer, der Win32k-Komponente, im Windows-UPnP-Dienst (Universal Plug and Play), im Windows Kernel, im Windows-Zertifikatdialogfeld, den Windows AppX-Bereitstellungserweiterungen, im ActiveX-Installationsdienst und in splwow64.exe und beruhen u. a. auf Fehlern bei der Verarbeitung von Objekten im Speicher, bei der Verarbeitung von Dateivorg\u00e4ngen oder bei der Verwaltung von Zugriffsprivilegien. Ein authentisierter Angreifer kann dieses nutzen und seine Privilegien erweitern."
}
],
"product_status": {
"known_affected": [
"T012979",
"160428",
"T013769",
"T005302",
"100461",
"T012776",
"T002137",
"T005923",
"T014786",
"T005617",
"T010156",
"T008880"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-1434"
},
{
"cve": "CVE-2019-1433",
"notes": [
{
"category": "description",
"text": "In verschiedenen Microsoft Windows Betriebssystemen existieren mehrere Schwachstellen. Sie befinden sich im Windows-Benutzerprofildienst (ProfSvc), der Windows-Grafikkomponente, im Windows-Kernelmodustreiber, der StartTileData.dllm, der iphlpsvc.dll, der dssvc.dll, im Windows-Datenfreigabedienst, im Windows-Subsystem f\u00fcr Linux, im Windows Installer, der Win32k-Komponente, im Windows-UPnP-Dienst (Universal Plug and Play), im Windows Kernel, im Windows-Zertifikatdialogfeld, den Windows AppX-Bereitstellungserweiterungen, im ActiveX-Installationsdienst und in splwow64.exe und beruhen u. a. auf Fehlern bei der Verarbeitung von Objekten im Speicher, bei der Verarbeitung von Dateivorg\u00e4ngen oder bei der Verwaltung von Zugriffsprivilegien. Ein authentisierter Angreifer kann dieses nutzen und seine Privilegien erweitern."
}
],
"product_status": {
"known_affected": [
"T012979",
"160428",
"T013769",
"T005302",
"100461",
"T012776",
"T002137",
"T005923",
"T014786",
"T005617",
"T010156",
"T008880"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-1433"
},
{
"cve": "CVE-2019-1423",
"notes": [
{
"category": "description",
"text": "In verschiedenen Microsoft Windows Betriebssystemen existieren mehrere Schwachstellen. Sie befinden sich im Windows-Benutzerprofildienst (ProfSvc), der Windows-Grafikkomponente, im Windows-Kernelmodustreiber, der StartTileData.dllm, der iphlpsvc.dll, der dssvc.dll, im Windows-Datenfreigabedienst, im Windows-Subsystem f\u00fcr Linux, im Windows Installer, der Win32k-Komponente, im Windows-UPnP-Dienst (Universal Plug and Play), im Windows Kernel, im Windows-Zertifikatdialogfeld, den Windows AppX-Bereitstellungserweiterungen, im ActiveX-Installationsdienst und in splwow64.exe und beruhen u. a. auf Fehlern bei der Verarbeitung von Objekten im Speicher, bei der Verarbeitung von Dateivorg\u00e4ngen oder bei der Verwaltung von Zugriffsprivilegien. Ein authentisierter Angreifer kann dieses nutzen und seine Privilegien erweitern."
}
],
"product_status": {
"known_affected": [
"T012979",
"160428",
"T013769",
"T005302",
"100461",
"T012776",
"T002137",
"T005923",
"T014786",
"T005617",
"T010156",
"T008880"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-1423"
},
{
"cve": "CVE-2019-1422",
"notes": [
{
"category": "description",
"text": "In verschiedenen Microsoft Windows Betriebssystemen existieren mehrere Schwachstellen. Sie befinden sich im Windows-Benutzerprofildienst (ProfSvc), der Windows-Grafikkomponente, im Windows-Kernelmodustreiber, der StartTileData.dllm, der iphlpsvc.dll, der dssvc.dll, im Windows-Datenfreigabedienst, im Windows-Subsystem f\u00fcr Linux, im Windows Installer, der Win32k-Komponente, im Windows-UPnP-Dienst (Universal Plug and Play), im Windows Kernel, im Windows-Zertifikatdialogfeld, den Windows AppX-Bereitstellungserweiterungen, im ActiveX-Installationsdienst und in splwow64.exe und beruhen u. a. auf Fehlern bei der Verarbeitung von Objekten im Speicher, bei der Verarbeitung von Dateivorg\u00e4ngen oder bei der Verwaltung von Zugriffsprivilegien. Ein authentisierter Angreifer kann dieses nutzen und seine Privilegien erweitern."
}
],
"product_status": {
"known_affected": [
"T012979",
"160428",
"T013769",
"T005302",
"100461",
"T012776",
"T002137",
"T005923",
"T014786",
"T005617",
"T010156",
"T008880"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-1422"
},
{
"cve": "CVE-2019-1420",
"notes": [
{
"category": "description",
"text": "In verschiedenen Microsoft Windows Betriebssystemen existieren mehrere Schwachstellen. Sie befinden sich im Windows-Benutzerprofildienst (ProfSvc), der Windows-Grafikkomponente, im Windows-Kernelmodustreiber, der StartTileData.dllm, der iphlpsvc.dll, der dssvc.dll, im Windows-Datenfreigabedienst, im Windows-Subsystem f\u00fcr Linux, im Windows Installer, der Win32k-Komponente, im Windows-UPnP-Dienst (Universal Plug and Play), im Windows Kernel, im Windows-Zertifikatdialogfeld, den Windows AppX-Bereitstellungserweiterungen, im ActiveX-Installationsdienst und in splwow64.exe und beruhen u. a. auf Fehlern bei der Verarbeitung von Objekten im Speicher, bei der Verarbeitung von Dateivorg\u00e4ngen oder bei der Verwaltung von Zugriffsprivilegien. Ein authentisierter Angreifer kann dieses nutzen und seine Privilegien erweitern."
}
],
"product_status": {
"known_affected": [
"T012979",
"160428",
"T013769",
"T005302",
"100461",
"T012776",
"T002137",
"T005923",
"T014786",
"T005617",
"T010156",
"T008880"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-1420"
},
{
"cve": "CVE-2019-1417",
"notes": [
{
"category": "description",
"text": "In verschiedenen Microsoft Windows Betriebssystemen existieren mehrere Schwachstellen. Sie befinden sich im Windows-Benutzerprofildienst (ProfSvc), der Windows-Grafikkomponente, im Windows-Kernelmodustreiber, der StartTileData.dllm, der iphlpsvc.dll, der dssvc.dll, im Windows-Datenfreigabedienst, im Windows-Subsystem f\u00fcr Linux, im Windows Installer, der Win32k-Komponente, im Windows-UPnP-Dienst (Universal Plug and Play), im Windows Kernel, im Windows-Zertifikatdialogfeld, den Windows AppX-Bereitstellungserweiterungen, im ActiveX-Installationsdienst und in splwow64.exe und beruhen u. a. auf Fehlern bei der Verarbeitung von Objekten im Speicher, bei der Verarbeitung von Dateivorg\u00e4ngen oder bei der Verwaltung von Zugriffsprivilegien. Ein authentisierter Angreifer kann dieses nutzen und seine Privilegien erweitern."
}
],
"product_status": {
"known_affected": [
"T012979",
"160428",
"T013769",
"T005302",
"100461",
"T012776",
"T002137",
"T005923",
"T014786",
"T005617",
"T010156",
"T008880"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-1417"
},
{
"cve": "CVE-2019-1416",
"notes": [
{
"category": "description",
"text": "In verschiedenen Microsoft Windows Betriebssystemen existieren mehrere Schwachstellen. Sie befinden sich im Windows-Benutzerprofildienst (ProfSvc), der Windows-Grafikkomponente, im Windows-Kernelmodustreiber, der StartTileData.dllm, der iphlpsvc.dll, der dssvc.dll, im Windows-Datenfreigabedienst, im Windows-Subsystem f\u00fcr Linux, im Windows Installer, der Win32k-Komponente, im Windows-UPnP-Dienst (Universal Plug and Play), im Windows Kernel, im Windows-Zertifikatdialogfeld, den Windows AppX-Bereitstellungserweiterungen, im ActiveX-Installationsdienst und in splwow64.exe und beruhen u. a. auf Fehlern bei der Verarbeitung von Objekten im Speicher, bei der Verarbeitung von Dateivorg\u00e4ngen oder bei der Verwaltung von Zugriffsprivilegien. Ein authentisierter Angreifer kann dieses nutzen und seine Privilegien erweitern."
}
],
"product_status": {
"known_affected": [
"T012979",
"160428",
"T013769",
"T005302",
"100461",
"T012776",
"T002137",
"T005923",
"T014786",
"T005617",
"T010156",
"T008880"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-1416"
},
{
"cve": "CVE-2019-1415",
"notes": [
{
"category": "description",
"text": "In verschiedenen Microsoft Windows Betriebssystemen existieren mehrere Schwachstellen. Sie befinden sich im Windows-Benutzerprofildienst (ProfSvc), der Windows-Grafikkomponente, im Windows-Kernelmodustreiber, der StartTileData.dllm, der iphlpsvc.dll, der dssvc.dll, im Windows-Datenfreigabedienst, im Windows-Subsystem f\u00fcr Linux, im Windows Installer, der Win32k-Komponente, im Windows-UPnP-Dienst (Universal Plug and Play), im Windows Kernel, im Windows-Zertifikatdialogfeld, den Windows AppX-Bereitstellungserweiterungen, im ActiveX-Installationsdienst und in splwow64.exe und beruhen u. a. auf Fehlern bei der Verarbeitung von Objekten im Speicher, bei der Verarbeitung von Dateivorg\u00e4ngen oder bei der Verwaltung von Zugriffsprivilegien. Ein authentisierter Angreifer kann dieses nutzen und seine Privilegien erweitern."
}
],
"product_status": {
"known_affected": [
"T012979",
"160428",
"T013769",
"T005302",
"100461",
"T012776",
"T002137",
"T005923",
"T014786",
"T005617",
"T010156",
"T008880"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-1415"
},
{
"cve": "CVE-2019-1408",
"notes": [
{
"category": "description",
"text": "In verschiedenen Microsoft Windows Betriebssystemen existieren mehrere Schwachstellen. Sie befinden sich im Windows-Benutzerprofildienst (ProfSvc), der Windows-Grafikkomponente, im Windows-Kernelmodustreiber, der StartTileData.dllm, der iphlpsvc.dll, der dssvc.dll, im Windows-Datenfreigabedienst, im Windows-Subsystem f\u00fcr Linux, im Windows Installer, der Win32k-Komponente, im Windows-UPnP-Dienst (Universal Plug and Play), im Windows Kernel, im Windows-Zertifikatdialogfeld, den Windows AppX-Bereitstellungserweiterungen, im ActiveX-Installationsdienst und in splwow64.exe und beruhen u. a. auf Fehlern bei der Verarbeitung von Objekten im Speicher, bei der Verarbeitung von Dateivorg\u00e4ngen oder bei der Verwaltung von Zugriffsprivilegien. Ein authentisierter Angreifer kann dieses nutzen und seine Privilegien erweitern."
}
],
"product_status": {
"known_affected": [
"T012979",
"160428",
"T013769",
"T005302",
"100461",
"T012776",
"T002137",
"T005923",
"T014786",
"T005617",
"T010156",
"T008880"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-1408"
},
{
"cve": "CVE-2019-1407",
"notes": [
{
"category": "description",
"text": "In verschiedenen Microsoft Windows Betriebssystemen existieren mehrere Schwachstellen. Sie befinden sich im Windows-Benutzerprofildienst (ProfSvc), der Windows-Grafikkomponente, im Windows-Kernelmodustreiber, der StartTileData.dllm, der iphlpsvc.dll, der dssvc.dll, im Windows-Datenfreigabedienst, im Windows-Subsystem f\u00fcr Linux, im Windows Installer, der Win32k-Komponente, im Windows-UPnP-Dienst (Universal Plug and Play), im Windows Kernel, im Windows-Zertifikatdialogfeld, den Windows AppX-Bereitstellungserweiterungen, im ActiveX-Installationsdienst und in splwow64.exe und beruhen u. a. auf Fehlern bei der Verarbeitung von Objekten im Speicher, bei der Verarbeitung von Dateivorg\u00e4ngen oder bei der Verwaltung von Zugriffsprivilegien. Ein authentisierter Angreifer kann dieses nutzen und seine Privilegien erweitern."
}
],
"product_status": {
"known_affected": [
"T012979",
"160428",
"T013769",
"T005302",
"100461",
"T012776",
"T002137",
"T005923",
"T014786",
"T005617",
"T010156",
"T008880"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-1407"
},
{
"cve": "CVE-2019-1405",
"notes": [
{
"category": "description",
"text": "In verschiedenen Microsoft Windows Betriebssystemen existieren mehrere Schwachstellen. Sie befinden sich im Windows-Benutzerprofildienst (ProfSvc), der Windows-Grafikkomponente, im Windows-Kernelmodustreiber, der StartTileData.dllm, der iphlpsvc.dll, der dssvc.dll, im Windows-Datenfreigabedienst, im Windows-Subsystem f\u00fcr Linux, im Windows Installer, der Win32k-Komponente, im Windows-UPnP-Dienst (Universal Plug and Play), im Windows Kernel, im Windows-Zertifikatdialogfeld, den Windows AppX-Bereitstellungserweiterungen, im ActiveX-Installationsdienst und in splwow64.exe und beruhen u. a. auf Fehlern bei der Verarbeitung von Objekten im Speicher, bei der Verarbeitung von Dateivorg\u00e4ngen oder bei der Verwaltung von Zugriffsprivilegien. Ein authentisierter Angreifer kann dieses nutzen und seine Privilegien erweitern."
}
],
"product_status": {
"known_affected": [
"T012979",
"160428",
"T013769",
"T005302",
"100461",
"T012776",
"T002137",
"T005923",
"T014786",
"T005617",
"T010156",
"T008880"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-1405"
},
{
"cve": "CVE-2019-1396",
"notes": [
{
"category": "description",
"text": "In verschiedenen Microsoft Windows Betriebssystemen existieren mehrere Schwachstellen. Sie befinden sich im Windows-Benutzerprofildienst (ProfSvc), der Windows-Grafikkomponente, im Windows-Kernelmodustreiber, der StartTileData.dllm, der iphlpsvc.dll, der dssvc.dll, im Windows-Datenfreigabedienst, im Windows-Subsystem f\u00fcr Linux, im Windows Installer, der Win32k-Komponente, im Windows-UPnP-Dienst (Universal Plug and Play), im Windows Kernel, im Windows-Zertifikatdialogfeld, den Windows AppX-Bereitstellungserweiterungen, im ActiveX-Installationsdienst und in splwow64.exe und beruhen u. a. auf Fehlern bei der Verarbeitung von Objekten im Speicher, bei der Verarbeitung von Dateivorg\u00e4ngen oder bei der Verwaltung von Zugriffsprivilegien. Ein authentisierter Angreifer kann dieses nutzen und seine Privilegien erweitern."
}
],
"product_status": {
"known_affected": [
"T012979",
"160428",
"T013769",
"T005302",
"100461",
"T012776",
"T002137",
"T005923",
"T014786",
"T005617",
"T010156",
"T008880"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-1396"
},
{
"cve": "CVE-2019-1395",
"notes": [
{
"category": "description",
"text": "In verschiedenen Microsoft Windows Betriebssystemen existieren mehrere Schwachstellen. Sie befinden sich im Windows-Benutzerprofildienst (ProfSvc), der Windows-Grafikkomponente, im Windows-Kernelmodustreiber, der StartTileData.dllm, der iphlpsvc.dll, der dssvc.dll, im Windows-Datenfreigabedienst, im Windows-Subsystem f\u00fcr Linux, im Windows Installer, der Win32k-Komponente, im Windows-UPnP-Dienst (Universal Plug and Play), im Windows Kernel, im Windows-Zertifikatdialogfeld, den Windows AppX-Bereitstellungserweiterungen, im ActiveX-Installationsdienst und in splwow64.exe und beruhen u. a. auf Fehlern bei der Verarbeitung von Objekten im Speicher, bei der Verarbeitung von Dateivorg\u00e4ngen oder bei der Verwaltung von Zugriffsprivilegien. Ein authentisierter Angreifer kann dieses nutzen und seine Privilegien erweitern."
}
],
"product_status": {
"known_affected": [
"T012979",
"160428",
"T013769",
"T005302",
"100461",
"T012776",
"T002137",
"T005923",
"T014786",
"T005617",
"T010156",
"T008880"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-1395"
},
{
"cve": "CVE-2019-1394",
"notes": [
{
"category": "description",
"text": "In verschiedenen Microsoft Windows Betriebssystemen existieren mehrere Schwachstellen. Sie befinden sich im Windows-Benutzerprofildienst (ProfSvc), der Windows-Grafikkomponente, im Windows-Kernelmodustreiber, der StartTileData.dllm, der iphlpsvc.dll, der dssvc.dll, im Windows-Datenfreigabedienst, im Windows-Subsystem f\u00fcr Linux, im Windows Installer, der Win32k-Komponente, im Windows-UPnP-Dienst (Universal Plug and Play), im Windows Kernel, im Windows-Zertifikatdialogfeld, den Windows AppX-Bereitstellungserweiterungen, im ActiveX-Installationsdienst und in splwow64.exe und beruhen u. a. auf Fehlern bei der Verarbeitung von Objekten im Speicher, bei der Verarbeitung von Dateivorg\u00e4ngen oder bei der Verwaltung von Zugriffsprivilegien. Ein authentisierter Angreifer kann dieses nutzen und seine Privilegien erweitern."
}
],
"product_status": {
"known_affected": [
"T012979",
"160428",
"T013769",
"T005302",
"100461",
"T012776",
"T002137",
"T005923",
"T014786",
"T005617",
"T010156",
"T008880"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-1394"
},
{
"cve": "CVE-2019-1393",
"notes": [
{
"category": "description",
"text": "In verschiedenen Microsoft Windows Betriebssystemen existieren mehrere Schwachstellen. Sie befinden sich im Windows-Benutzerprofildienst (ProfSvc), der Windows-Grafikkomponente, im Windows-Kernelmodustreiber, der StartTileData.dllm, der iphlpsvc.dll, der dssvc.dll, im Windows-Datenfreigabedienst, im Windows-Subsystem f\u00fcr Linux, im Windows Installer, der Win32k-Komponente, im Windows-UPnP-Dienst (Universal Plug and Play), im Windows Kernel, im Windows-Zertifikatdialogfeld, den Windows AppX-Bereitstellungserweiterungen, im ActiveX-Installationsdienst und in splwow64.exe und beruhen u. a. auf Fehlern bei der Verarbeitung von Objekten im Speicher, bei der Verarbeitung von Dateivorg\u00e4ngen oder bei der Verwaltung von Zugriffsprivilegien. Ein authentisierter Angreifer kann dieses nutzen und seine Privilegien erweitern."
}
],
"product_status": {
"known_affected": [
"T012979",
"160428",
"T013769",
"T005302",
"100461",
"T012776",
"T002137",
"T005923",
"T014786",
"T005617",
"T010156",
"T008880"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-1393"
},
{
"cve": "CVE-2019-1392",
"notes": [
{
"category": "description",
"text": "In verschiedenen Microsoft Windows Betriebssystemen existieren mehrere Schwachstellen. Sie befinden sich im Windows-Benutzerprofildienst (ProfSvc), der Windows-Grafikkomponente, im Windows-Kernelmodustreiber, der StartTileData.dllm, der iphlpsvc.dll, der dssvc.dll, im Windows-Datenfreigabedienst, im Windows-Subsystem f\u00fcr Linux, im Windows Installer, der Win32k-Komponente, im Windows-UPnP-Dienst (Universal Plug and Play), im Windows Kernel, im Windows-Zertifikatdialogfeld, den Windows AppX-Bereitstellungserweiterungen, im ActiveX-Installationsdienst und in splwow64.exe und beruhen u. a. auf Fehlern bei der Verarbeitung von Objekten im Speicher, bei der Verarbeitung von Dateivorg\u00e4ngen oder bei der Verwaltung von Zugriffsprivilegien. Ein authentisierter Angreifer kann dieses nutzen und seine Privilegien erweitern."
}
],
"product_status": {
"known_affected": [
"T012979",
"160428",
"T013769",
"T005302",
"100461",
"T012776",
"T002137",
"T005923",
"T014786",
"T005617",
"T010156",
"T008880"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-1392"
},
{
"cve": "CVE-2019-1388",
"notes": [
{
"category": "description",
"text": "In verschiedenen Microsoft Windows Betriebssystemen existieren mehrere Schwachstellen. Sie befinden sich im Windows-Benutzerprofildienst (ProfSvc), der Windows-Grafikkomponente, im Windows-Kernelmodustreiber, der StartTileData.dllm, der iphlpsvc.dll, der dssvc.dll, im Windows-Datenfreigabedienst, im Windows-Subsystem f\u00fcr Linux, im Windows Installer, der Win32k-Komponente, im Windows-UPnP-Dienst (Universal Plug and Play), im Windows Kernel, im Windows-Zertifikatdialogfeld, den Windows AppX-Bereitstellungserweiterungen, im ActiveX-Installationsdienst und in splwow64.exe und beruhen u. a. auf Fehlern bei der Verarbeitung von Objekten im Speicher, bei der Verarbeitung von Dateivorg\u00e4ngen oder bei der Verwaltung von Zugriffsprivilegien. Ein authentisierter Angreifer kann dieses nutzen und seine Privilegien erweitern."
}
],
"product_status": {
"known_affected": [
"T012979",
"160428",
"T013769",
"T005302",
"100461",
"T012776",
"T002137",
"T005923",
"T014786",
"T005617",
"T010156",
"T008880"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-1388"
},
{
"cve": "CVE-2019-1385",
"notes": [
{
"category": "description",
"text": "In verschiedenen Microsoft Windows Betriebssystemen existieren mehrere Schwachstellen. Sie befinden sich im Windows-Benutzerprofildienst (ProfSvc), der Windows-Grafikkomponente, im Windows-Kernelmodustreiber, der StartTileData.dllm, der iphlpsvc.dll, der dssvc.dll, im Windows-Datenfreigabedienst, im Windows-Subsystem f\u00fcr Linux, im Windows Installer, der Win32k-Komponente, im Windows-UPnP-Dienst (Universal Plug and Play), im Windows Kernel, im Windows-Zertifikatdialogfeld, den Windows AppX-Bereitstellungserweiterungen, im ActiveX-Installationsdienst und in splwow64.exe und beruhen u. a. auf Fehlern bei der Verarbeitung von Objekten im Speicher, bei der Verarbeitung von Dateivorg\u00e4ngen oder bei der Verwaltung von Zugriffsprivilegien. Ein authentisierter Angreifer kann dieses nutzen und seine Privilegien erweitern."
}
],
"product_status": {
"known_affected": [
"T012979",
"160428",
"T013769",
"T005302",
"100461",
"T012776",
"T002137",
"T005923",
"T014786",
"T005617",
"T010156",
"T008880"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-1385"
},
{
"cve": "CVE-2019-1383",
"notes": [
{
"category": "description",
"text": "In verschiedenen Microsoft Windows Betriebssystemen existieren mehrere Schwachstellen. Sie befinden sich im Windows-Benutzerprofildienst (ProfSvc), der Windows-Grafikkomponente, im Windows-Kernelmodustreiber, der StartTileData.dllm, der iphlpsvc.dll, der dssvc.dll, im Windows-Datenfreigabedienst, im Windows-Subsystem f\u00fcr Linux, im Windows Installer, der Win32k-Komponente, im Windows-UPnP-Dienst (Universal Plug and Play), im Windows Kernel, im Windows-Zertifikatdialogfeld, den Windows AppX-Bereitstellungserweiterungen, im ActiveX-Installationsdienst und in splwow64.exe und beruhen u. a. auf Fehlern bei der Verarbeitung von Objekten im Speicher, bei der Verarbeitung von Dateivorg\u00e4ngen oder bei der Verwaltung von Zugriffsprivilegien. Ein authentisierter Angreifer kann dieses nutzen und seine Privilegien erweitern."
}
],
"product_status": {
"known_affected": [
"T012979",
"160428",
"T013769",
"T005302",
"100461",
"T012776",
"T002137",
"T005923",
"T014786",
"T005617",
"T010156",
"T008880"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-1383"
},
{
"cve": "CVE-2019-1382",
"notes": [
{
"category": "description",
"text": "In verschiedenen Microsoft Windows Betriebssystemen existieren mehrere Schwachstellen. Sie befinden sich im Windows-Benutzerprofildienst (ProfSvc), der Windows-Grafikkomponente, im Windows-Kernelmodustreiber, der StartTileData.dllm, der iphlpsvc.dll, der dssvc.dll, im Windows-Datenfreigabedienst, im Windows-Subsystem f\u00fcr Linux, im Windows Installer, der Win32k-Komponente, im Windows-UPnP-Dienst (Universal Plug and Play), im Windows Kernel, im Windows-Zertifikatdialogfeld, den Windows AppX-Bereitstellungserweiterungen, im ActiveX-Installationsdienst und in splwow64.exe und beruhen u. a. auf Fehlern bei der Verarbeitung von Objekten im Speicher, bei der Verarbeitung von Dateivorg\u00e4ngen oder bei der Verwaltung von Zugriffsprivilegien. Ein authentisierter Angreifer kann dieses nutzen und seine Privilegien erweitern."
}
],
"product_status": {
"known_affected": [
"T012979",
"160428",
"T013769",
"T005302",
"100461",
"T012776",
"T002137",
"T005923",
"T014786",
"T005617",
"T010156",
"T008880"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-1382"
},
{
"cve": "CVE-2019-1380",
"notes": [
{
"category": "description",
"text": "In verschiedenen Microsoft Windows Betriebssystemen existieren mehrere Schwachstellen. Sie befinden sich im Windows-Benutzerprofildienst (ProfSvc), der Windows-Grafikkomponente, im Windows-Kernelmodustreiber, der StartTileData.dllm, der iphlpsvc.dll, der dssvc.dll, im Windows-Datenfreigabedienst, im Windows-Subsystem f\u00fcr Linux, im Windows Installer, der Win32k-Komponente, im Windows-UPnP-Dienst (Universal Plug and Play), im Windows Kernel, im Windows-Zertifikatdialogfeld, den Windows AppX-Bereitstellungserweiterungen, im ActiveX-Installationsdienst und in splwow64.exe und beruhen u. a. auf Fehlern bei der Verarbeitung von Objekten im Speicher, bei der Verarbeitung von Dateivorg\u00e4ngen oder bei der Verwaltung von Zugriffsprivilegien. Ein authentisierter Angreifer kann dieses nutzen und seine Privilegien erweitern."
}
],
"product_status": {
"known_affected": [
"T012979",
"160428",
"T013769",
"T005302",
"100461",
"T012776",
"T002137",
"T005923",
"T014786",
"T005617",
"T010156",
"T008880"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-1380"
},
{
"cve": "CVE-2019-1379",
"notes": [
{
"category": "description",
"text": "In verschiedenen Microsoft Windows Betriebssystemen existieren mehrere Schwachstellen. Sie befinden sich im Windows-Benutzerprofildienst (ProfSvc), der Windows-Grafikkomponente, im Windows-Kernelmodustreiber, der StartTileData.dllm, der iphlpsvc.dll, der dssvc.dll, im Windows-Datenfreigabedienst, im Windows-Subsystem f\u00fcr Linux, im Windows Installer, der Win32k-Komponente, im Windows-UPnP-Dienst (Universal Plug and Play), im Windows Kernel, im Windows-Zertifikatdialogfeld, den Windows AppX-Bereitstellungserweiterungen, im ActiveX-Installationsdienst und in splwow64.exe und beruhen u. a. auf Fehlern bei der Verarbeitung von Objekten im Speicher, bei der Verarbeitung von Dateivorg\u00e4ngen oder bei der Verwaltung von Zugriffsprivilegien. Ein authentisierter Angreifer kann dieses nutzen und seine Privilegien erweitern."
}
],
"product_status": {
"known_affected": [
"T012979",
"160428",
"T013769",
"T005302",
"100461",
"T012776",
"T002137",
"T005923",
"T014786",
"T005617",
"T010156",
"T008880"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-1379"
},
{
"cve": "CVE-2019-1324",
"notes": [
{
"category": "description",
"text": "In verschiedenen Microsoft Windows Betriebssystemen existiert eine Schwachstelle. Sie beruht auf einem Fehler bei der Verarbeitung von IPv6-Flowlabel durch den Windows-TCP/IP-Stapel. Ein anonymer Angreifer kann dieses nutzen und vertrauliche Daten einsehen."
}
],
"product_status": {
"known_affected": [
"T012979",
"160428",
"T013769",
"T005302",
"100461",
"T012776",
"T002137",
"T005923",
"T014786",
"T005617",
"T010156",
"T008880"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-1324"
},
{
"cve": "CVE-2019-11135",
"notes": [
{
"category": "description",
"text": "In verschiedenen Microsoft Windows Betriebssystemen existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Windows Kernel, Windows-Fehlerberichterstattung (Windows Error Reporting, WER), Windows Servicing Stack, Windows Remoteprozeduraufruf, Adobe Type Manager-Schriftartentreiber (ATMFD.dll) f\u00fcr Windows, Windows Modules Installer-Dienst und Win32k und beruhen auf Fehlern bei der Initialisierung und Verarbeitung von Objekten im Speicher und bei der Verwaltung von Zugriffsprivilegien. Ein authentisierter Angreifer kann dieses nutzen und vertrauliche Daten einsehen."
}
],
"product_status": {
"known_affected": [
"T012979",
"160428",
"T013769",
"T005302",
"100461",
"T012776",
"T002137",
"T005923",
"T014786",
"T005617",
"T010156",
"T008880"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11135"
},
{
"cve": "CVE-2019-1374",
"notes": [
{
"category": "description",
"text": "In verschiedenen Microsoft Windows Betriebssystemen existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Windows Kernel, Windows-Fehlerberichterstattung (Windows Error Reporting, WER), Windows Servicing Stack, Windows Remoteprozeduraufruf, Adobe Type Manager-Schriftartentreiber (ATMFD.dll) f\u00fcr Windows, Windows Modules Installer-Dienst und Win32k und beruhen auf Fehlern bei der Initialisierung und Verarbeitung von Objekten im Speicher und bei der Verwaltung von Zugriffsprivilegien. Ein authentisierter Angreifer kann dieses nutzen und vertrauliche Daten einsehen."
}
],
"product_status": {
"known_affected": [
"T012979",
"160428",
"T013769",
"T005302",
"100461",
"T012776",
"T002137",
"T005923",
"T014786",
"T005617",
"T010156",
"T008880"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-1374"
},
{
"cve": "CVE-2019-1381",
"notes": [
{
"category": "description",
"text": "In verschiedenen Microsoft Windows Betriebssystemen existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Windows Kernel, Windows-Fehlerberichterstattung (Windows Error Reporting, WER), Windows Servicing Stack, Windows Remoteprozeduraufruf, Adobe Type Manager-Schriftartentreiber (ATMFD.dll) f\u00fcr Windows, Windows Modules Installer-Dienst und Win32k und beruhen auf Fehlern bei der Initialisierung und Verarbeitung von Objekten im Speicher und bei der Verwaltung von Zugriffsprivilegien. Ein authentisierter Angreifer kann dieses nutzen und vertrauliche Daten einsehen."
}
],
"product_status": {
"known_affected": [
"T012979",
"160428",
"T013769",
"T005302",
"100461",
"T012776",
"T002137",
"T005923",
"T014786",
"T005617",
"T010156",
"T008880"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-1381"
},
{
"cve": "CVE-2019-1409",
"notes": [
{
"category": "description",
"text": "In verschiedenen Microsoft Windows Betriebssystemen existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Windows Kernel, Windows-Fehlerberichterstattung (Windows Error Reporting, WER), Windows Servicing Stack, Windows Remoteprozeduraufruf, Adobe Type Manager-Schriftartentreiber (ATMFD.dll) f\u00fcr Windows, Windows Modules Installer-Dienst und Win32k und beruhen auf Fehlern bei der Initialisierung und Verarbeitung von Objekten im Speicher und bei der Verwaltung von Zugriffsprivilegien. Ein authentisierter Angreifer kann dieses nutzen und vertrauliche Daten einsehen."
}
],
"product_status": {
"known_affected": [
"T012979",
"160428",
"T013769",
"T005302",
"100461",
"T012776",
"T002137",
"T005923",
"T014786",
"T005617",
"T010156",
"T008880"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-1409"
},
{
"cve": "CVE-2019-1412",
"notes": [
{
"category": "description",
"text": "In verschiedenen Microsoft Windows Betriebssystemen existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Windows Kernel, Windows-Fehlerberichterstattung (Windows Error Reporting, WER), Windows Servicing Stack, Windows Remoteprozeduraufruf, Adobe Type Manager-Schriftartentreiber (ATMFD.dll) f\u00fcr Windows, Windows Modules Installer-Dienst und Win32k und beruhen auf Fehlern bei der Initialisierung und Verarbeitung von Objekten im Speicher und bei der Verwaltung von Zugriffsprivilegien. Ein authentisierter Angreifer kann dieses nutzen und vertrauliche Daten einsehen."
}
],
"product_status": {
"known_affected": [
"T012979",
"160428",
"T013769",
"T005302",
"100461",
"T012776",
"T002137",
"T005923",
"T014786",
"T005617",
"T010156",
"T008880"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-1412"
},
{
"cve": "CVE-2019-1418",
"notes": [
{
"category": "description",
"text": "In verschiedenen Microsoft Windows Betriebssystemen existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Windows Kernel, Windows-Fehlerberichterstattung (Windows Error Reporting, WER), Windows Servicing Stack, Windows Remoteprozeduraufruf, Adobe Type Manager-Schriftartentreiber (ATMFD.dll) f\u00fcr Windows, Windows Modules Installer-Dienst und Win32k und beruhen auf Fehlern bei der Initialisierung und Verarbeitung von Objekten im Speicher und bei der Verwaltung von Zugriffsprivilegien. Ein authentisierter Angreifer kann dieses nutzen und vertrauliche Daten einsehen."
}
],
"product_status": {
"known_affected": [
"T012979",
"160428",
"T013769",
"T005302",
"100461",
"T012776",
"T002137",
"T005923",
"T014786",
"T005617",
"T010156",
"T008880"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-1418"
},
{
"cve": "CVE-2019-1436",
"notes": [
{
"category": "description",
"text": "In verschiedenen Microsoft Windows Betriebssystemen existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Windows Kernel, Windows-Fehlerberichterstattung (Windows Error Reporting, WER), Windows Servicing Stack, Windows Remoteprozeduraufruf, Adobe Type Manager-Schriftartentreiber (ATMFD.dll) f\u00fcr Windows, Windows Modules Installer-Dienst und Win32k und beruhen auf Fehlern bei der Initialisierung und Verarbeitung von Objekten im Speicher und bei der Verwaltung von Zugriffsprivilegien. Ein authentisierter Angreifer kann dieses nutzen und vertrauliche Daten einsehen."
}
],
"product_status": {
"known_affected": [
"T012979",
"160428",
"T013769",
"T005302",
"100461",
"T012776",
"T002137",
"T005923",
"T014786",
"T005617",
"T010156",
"T008880"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-1436"
},
{
"cve": "CVE-2019-1440",
"notes": [
{
"category": "description",
"text": "In verschiedenen Microsoft Windows Betriebssystemen existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten Windows Kernel, Windows-Fehlerberichterstattung (Windows Error Reporting, WER), Windows Servicing Stack, Windows Remoteprozeduraufruf, Adobe Type Manager-Schriftartentreiber (ATMFD.dll) f\u00fcr Windows, Windows Modules Installer-Dienst und Win32k und beruhen auf Fehlern bei der Initialisierung und Verarbeitung von Objekten im Speicher und bei der Verwaltung von Zugriffsprivilegien. Ein authentisierter Angreifer kann dieses nutzen und vertrauliche Daten einsehen."
}
],
"product_status": {
"known_affected": [
"T012979",
"160428",
"T013769",
"T005302",
"100461",
"T012776",
"T002137",
"T005923",
"T014786",
"T005617",
"T010156",
"T008880"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-1440"
},
{
"cve": "CVE-2019-1411",
"notes": [
{
"category": "description",
"text": "In verschiedenen Microsoft Windows Betriebssystemen existieren mehrere Schwachstellen. Sie befinden sich in DirectWrite und der Windows-GDI-Komponente und beruhen auf Fehlern bei der Verarbeitung von Objekten im Speicher. Ein entfernter anonymer Angreifer kann dieses nutzen und vertrauliche Daten einsehen. Zur erfolgreichen Ausnutzung dieser Schwachstellen muss der Angreifer den Benutzer dazu bringen, eine modifizierte Datei zu \u00f6ffnen oder eine pr\u00e4parierte Web Seite aufzurufen."
}
],
"product_status": {
"known_affected": [
"T012979",
"160428",
"T013769",
"T005302",
"100461",
"T012776",
"T002137",
"T005923",
"T014786",
"T005617",
"T010156",
"T008880"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-1411"
},
{
"cve": "CVE-2019-1432",
"notes": [
{
"category": "description",
"text": "In verschiedenen Microsoft Windows Betriebssystemen existieren mehrere Schwachstellen. Sie befinden sich in DirectWrite und der Windows-GDI-Komponente und beruhen auf Fehlern bei der Verarbeitung von Objekten im Speicher. Ein entfernter anonymer Angreifer kann dieses nutzen und vertrauliche Daten einsehen. Zur erfolgreichen Ausnutzung dieser Schwachstellen muss der Angreifer den Benutzer dazu bringen, eine modifizierte Datei zu \u00f6ffnen oder eine pr\u00e4parierte Web Seite aufzurufen."
}
],
"product_status": {
"known_affected": [
"T012979",
"160428",
"T013769",
"T005302",
"100461",
"T012776",
"T002137",
"T005923",
"T014786",
"T005617",
"T010156",
"T008880"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-1432"
},
{
"cve": "CVE-2019-1439",
"notes": [
{
"category": "description",
"text": "In verschiedenen Microsoft Windows Betriebssystemen existieren mehrere Schwachstellen. Sie befinden sich in DirectWrite und der Windows-GDI-Komponente und beruhen auf Fehlern bei der Verarbeitung von Objekten im Speicher. Ein entfernter anonymer Angreifer kann dieses nutzen und vertrauliche Daten einsehen. Zur erfolgreichen Ausnutzung dieser Schwachstellen muss der Angreifer den Benutzer dazu bringen, eine modifizierte Datei zu \u00f6ffnen oder eine pr\u00e4parierte Web Seite aufzurufen."
}
],
"product_status": {
"known_affected": [
"T012979",
"160428",
"T013769",
"T005302",
"100461",
"T012776",
"T002137",
"T005923",
"T014786",
"T005617",
"T010156",
"T008880"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-1439"
},
{
"cve": "CVE-2019-0721",
"notes": [
{
"category": "description",
"text": "In verschiedenen Microsoft Windows Betriebssystemen existieren mehrere Schwachstellen. Sie befinden sich im Windows Hyper-V und Windows Hyper-V-Netzwerkswitch und beruhen auf Fehlern bei der Verarbeitung von Eingaben von einem auf einem Gastbetriebssystem authentifizierten Benutzer. Ein authentisierter Angreifer kann dieses nutzen und Code mit den Privilegien des Hyper-V zur Ausf\u00fchrung bringen."
}
],
"product_status": {
"known_affected": [
"T012979",
"160428",
"T013769",
"T005302",
"100461",
"T012776",
"T002137",
"T005923",
"T014786",
"T005617",
"T010156",
"T008880"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-0721"
},
{
"cve": "CVE-2019-1389",
"notes": [
{
"category": "description",
"text": "In verschiedenen Microsoft Windows Betriebssystemen existieren mehrere Schwachstellen. Sie befinden sich im Windows Hyper-V und Windows Hyper-V-Netzwerkswitch und beruhen auf Fehlern bei der Verarbeitung von Eingaben von einem auf einem Gastbetriebssystem authentifizierten Benutzer. Ein authentisierter Angreifer kann dieses nutzen und Code mit den Privilegien des Hyper-V zur Ausf\u00fchrung bringen."
}
],
"product_status": {
"known_affected": [
"T012979",
"160428",
"T013769",
"T005302",
"100461",
"T012776",
"T002137",
"T005923",
"T014786",
"T005617",
"T010156",
"T008880"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-1389"
},
{
"cve": "CVE-2019-1397",
"notes": [
{
"category": "description",
"text": "In verschiedenen Microsoft Windows Betriebssystemen existieren mehrere Schwachstellen. Sie befinden sich im Windows Hyper-V und Windows Hyper-V-Netzwerkswitch und beruhen auf Fehlern bei der Verarbeitung von Eingaben von einem auf einem Gastbetriebssystem authentifizierten Benutzer. Ein authentisierter Angreifer kann dieses nutzen und Code mit den Privilegien des Hyper-V zur Ausf\u00fchrung bringen."
}
],
"product_status": {
"known_affected": [
"T012979",
"160428",
"T013769",
"T005302",
"100461",
"T012776",
"T002137",
"T005923",
"T014786",
"T005617",
"T010156",
"T008880"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-1397"
},
{
"cve": "CVE-2019-1398",
"notes": [
{
"category": "description",
"text": "In verschiedenen Microsoft Windows Betriebssystemen existieren mehrere Schwachstellen. Sie befinden sich im Windows Hyper-V und Windows Hyper-V-Netzwerkswitch und beruhen auf Fehlern bei der Verarbeitung von Eingaben von einem auf einem Gastbetriebssystem authentifizierten Benutzer. Ein authentisierter Angreifer kann dieses nutzen und Code mit den Privilegien des Hyper-V zur Ausf\u00fchrung bringen."
}
],
"product_status": {
"known_affected": [
"T012979",
"160428",
"T013769",
"T005302",
"100461",
"T012776",
"T002137",
"T005923",
"T014786",
"T005617",
"T010156",
"T008880"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-1398"
},
{
"cve": "CVE-2019-1406",
"notes": [
{
"category": "description",
"text": "In verschiedenen Microsoft Windows Betriebssystemen existieren mehrere Schwachstellen. Sie befinden sich in der Windows Jet-Datenbank-Engine, Windows Adobe Type Manager-Bibliothek und Windows Media Foundation und beruhen auf Fehlern bei der Verarbeitung von OpenType-Schriftarten oder Objekten im Speicher und Fehlern bei der Analyse von QuickTime-Mediendateien. Ein entfernter anonymer Angreifer kann dieses nutzen und Code mit den Privilegien des angegriffenen Dienstes zur Ausf\u00fchrung bringen. Zur erfolgreichen Ausnutzung dieser Schwachstellen ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T012979",
"160428",
"T013769",
"T005302",
"100461",
"T012776",
"T002137",
"T005923",
"T014786",
"T005617",
"T010156",
"T008880"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-1406"
},
{
"cve": "CVE-2019-1419",
"notes": [
{
"category": "description",
"text": "In verschiedenen Microsoft Windows Betriebssystemen existieren mehrere Schwachstellen. Sie befinden sich in der Windows Jet-Datenbank-Engine, Windows Adobe Type Manager-Bibliothek und Windows Media Foundation und beruhen auf Fehlern bei der Verarbeitung von OpenType-Schriftarten oder Objekten im Speicher und Fehlern bei der Analyse von QuickTime-Mediendateien. Ein entfernter anonymer Angreifer kann dieses nutzen und Code mit den Privilegien des angegriffenen Dienstes zur Ausf\u00fchrung bringen. Zur erfolgreichen Ausnutzung dieser Schwachstellen ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T012979",
"160428",
"T013769",
"T005302",
"100461",
"T012776",
"T002137",
"T005923",
"T014786",
"T005617",
"T010156",
"T008880"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-1419"
},
{
"cve": "CVE-2019-1430",
"notes": [
{
"category": "description",
"text": "In verschiedenen Microsoft Windows Betriebssystemen existieren mehrere Schwachstellen. Sie befinden sich in der Windows Jet-Datenbank-Engine, Windows Adobe Type Manager-Bibliothek und Windows Media Foundation und beruhen auf Fehlern bei der Verarbeitung von OpenType-Schriftarten oder Objekten im Speicher und Fehlern bei der Analyse von QuickTime-Mediendateien. Ein entfernter anonymer Angreifer kann dieses nutzen und Code mit den Privilegien des angegriffenen Dienstes zur Ausf\u00fchrung bringen. Zur erfolgreichen Ausnutzung dieser Schwachstellen ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T012979",
"160428",
"T013769",
"T005302",
"100461",
"T012776",
"T002137",
"T005923",
"T014786",
"T005617",
"T010156",
"T008880"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-1430"
},
{
"cve": "CVE-2019-1456",
"notes": [
{
"category": "description",
"text": "In verschiedenen Microsoft Windows Betriebssystemen existieren mehrere Schwachstellen. Sie befinden sich in der Windows Jet-Datenbank-Engine, Windows Adobe Type Manager-Bibliothek und Windows Media Foundation und beruhen auf Fehlern bei der Verarbeitung von OpenType-Schriftarten oder Objekten im Speicher und Fehlern bei der Analyse von QuickTime-Mediendateien. Ein entfernter anonymer Angreifer kann dieses nutzen und Code mit den Privilegien des angegriffenen Dienstes zur Ausf\u00fchrung bringen. Zur erfolgreichen Ausnutzung dieser Schwachstellen ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T012979",
"160428",
"T013769",
"T005302",
"100461",
"T012776",
"T002137",
"T005923",
"T014786",
"T005617",
"T010156",
"T008880"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-1456"
},
{
"cve": "CVE-2019-1441",
"notes": [
{
"category": "description",
"text": "In verschiedenen Microsoft Windows Betriebssystemen existiert eine Schwachstelle. Sie befindet sich in der Windows-Schriftartenbibliothek und beruht auf einem Fehler bei der Verarbeitung eingebetteter Schriftarten. Ein entfernter anonymer Angreifer kann dieses nutzen und Code mit administrativen Privilegien zur Ausf\u00fchrung bringen. Zur erfolgreichen Ausnutzung dieser Schwachstelle ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T012979",
"160428",
"T013769",
"T005302",
"100461",
"T012776",
"T002137",
"T005923",
"T014786",
"T005617",
"T010156",
"T008880"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-1441"
},
{
"cve": "CVE-2019-1234",
"notes": [
{
"category": "description",
"text": "Im Microsoft Windows Azure Stack existiert eine Schwachstelle. Sie beruht darauf, dass der Azure Stack bestimmte Anforderungen nicht validieren kann. Ein Angreifer kann dieses nutzen und einen Spoofing Angriff durchf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T012979",
"160428",
"T013769",
"T005302",
"100461",
"T012776",
"T002137",
"T005923",
"T014786",
"T005617",
"T010156",
"T008880"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-1234"
},
{
"cve": "CVE-2019-1384",
"notes": [
{
"category": "description",
"text": "In verschiedenen Microsoft Windows Betriebssystemen existiert eine Schwachstelle. Sie beruht auf einem Fehler bei der Pr\u00fcfung von NTLM Netzwerkauthentifizierungsnachrichten. Ein authentisierter Angreifer kann dieses nutzen und die Sicherheitsfunktion umgehen."
}
],
"product_status": {
"known_affected": [
"T012979",
"160428",
"T013769",
"T005302",
"100461",
"T012776",
"T002137",
"T005923",
"T014786",
"T005617",
"T010156",
"T008880"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-1384"
},
{
"cve": "CVE-2019-1424",
"notes": [
{
"category": "description",
"text": "In verschiedenen Microsoft Windows Betriebssystemen existiert eine Schwachstelle. Sie beruht auf einem Fehler, wenn Windows NetLogon einen sicheren Kommunikationskanal nicht ordnungsgem\u00e4\u00df verarbeitet. Ein entfernter anonymer Angreifer in einer Man-in-the-Middle Position kann dieses nutzen und die Sicherheitsfunktionen umgehen."
}
],
"product_status": {
"known_affected": [
"T012979",
"160428",
"T013769",
"T005302",
"100461",
"T012776",
"T002137",
"T005923",
"T014786",
"T005617",
"T010156",
"T008880"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-1424"
}
]
}
wid-sec-w-2023-1689
Vulnerability from csaf_certbund
Notes
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Der Prozessor ist das zentrale Rechenwerk eines Computers.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer oder authentisierter Angreifer kann mehrere Schwachstellen in Intel Prozessoren ausnutzen, um seine Privilegien zu erh\u00f6hen, einen Denial of Service Angriff durchzuf\u00fchren oder vertrauliche Daten einzusehen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- BIOS/Firmware\n- F5 Networks\n- Linux\n- Sonstiges\n- UNIX\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2023-1689 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2019/wid-sec-w-2023-1689.json"
},
{
"category": "self",
"summary": "WID-SEC-2023-1689 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-1689"
},
{
"category": "external",
"summary": "Intel Security Advisory INTEL-SA-00164 vom 2019-11-12",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00164.html"
},
{
"category": "external",
"summary": "Intel Security Advisory INTEL-SA-00210 vom 2019-11-12",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html"
},
{
"category": "external",
"summary": "Intel Security Advisory INTEL-SA-00219 vom 2019-11-12",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00219.html"
},
{
"category": "external",
"summary": "Intel Security Advisory INTEL-SA-00220 vom 2019-11-12",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00220.html"
},
{
"category": "external",
"summary": "Intel Security Advisory INTEL-SA-00240 vom 2019-11-12",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00240.html"
},
{
"category": "external",
"summary": "Intel Security Advisory INTEL-SA-00241 vom 2019-11-12",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html"
},
{
"category": "external",
"summary": "Intel Security Advisory INTEL-SA-00242 vom 2019-11-12",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00242.html"
},
{
"category": "external",
"summary": "Intel Security Advisory INTEL-SA-00254 vom 2019-11-12",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00254.html"
},
{
"category": "external",
"summary": "Intel Security Advisory INTEL-SA-00260 vom 2019-11-12",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00260.html"
},
{
"category": "external",
"summary": "Intel Security Advisory INTEL-SA-00270 vom 2019-11-12",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00270.html"
},
{
"category": "external",
"summary": "Intel Security Advisory INTEL-SA-00271 vom 2019-11-12",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00271.html"
},
{
"category": "external",
"summary": "Intel Security Advisory INTEL-SA-00280 vom 2019-11-12",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00280.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-4565-1 vom 2019-11-13",
"url": "https://lists.debian.org/debian-security-announce/2019/msg00219.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-4564-1 vom 2019-11-13",
"url": "https://lists.debian.org/debian-security-announce/2019/msg00215.html"
},
{
"category": "external",
"summary": "Xen Security Advisory XSA-305 vom 2019-11-12",
"url": "https://xenbits.xen.org/xsa/advisory-305.html"
},
{
"category": "external",
"summary": "Xen Security Advisory XSA-304 vom 2019-11-12",
"url": "https://xenbits.xen.org/xsa/advisory-304.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3832 vom 2019-11-12",
"url": "https://access.redhat.com/errata/RHSA-2019:3832"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3833 vom 2019-11-12",
"url": "https://access.redhat.com/errata/RHSA-2019:3833"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3834 vom 2019-11-12",
"url": "https://access.redhat.com/errata/RHSA-2019:3834"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3835 vom 2019-11-12",
"url": "https://access.redhat.com/errata/RHSA-2019:3835"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3837 vom 2019-11-12",
"url": "https://access.redhat.com/errata/RHSA-2019:3837"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3838 vom 2019-11-12",
"url": "https://access.redhat.com/errata/RHSA-2019:3838"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3839 vom 2019-11-12",
"url": "https://access.redhat.com/errata/RHSA-2019:3839"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3840 vom 2019-11-12",
"url": "https://access.redhat.com/errata/RHSA-2019:3840"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3842 vom 2019-11-12",
"url": "https://access.redhat.com/errata/RHSA-2019:3842"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3844 vom 2019-11-12",
"url": "https://access.redhat.com/errata/RHSA-2019:3844"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3860 vom 2019-11-12",
"url": "https://access.redhat.com/errata/RHSA-2019:3860"
},
{
"category": "external",
"summary": "Oraclevm-errata OVMSA-2019-0052 vom 2019-11-12",
"url": "https://oss.oracle.com/pipermail/oraclevm-errata/2019-November/000966.html"
},
{
"category": "external",
"summary": "The FreeBSD Project Security Advisory FreeBSD-SA-19:25.mcepsc vom 2019-11-12",
"url": "https://www.freebsd.org/security/advisories/FreeBSD-SA-19:25.mcepsc.asc"
},
{
"category": "external",
"summary": "The FreeBSD Project Security Advisory FreeBSD-SA-19:26.mcu vom 2019-11-12",
"url": "https://www.freebsd.org/security/advisories/FreeBSD-SA-19:26.mcu.asc"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-4187-1 vom 2019-11-12",
"url": "https://usn.ubuntu.com/4187-1/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-4188-1 vom 2019-11-12",
"url": "https://usn.ubuntu.com/4188-1/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-4186-2 vom 2019-11-12",
"url": "https://usn.ubuntu.com/4186-2/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-4185-2 vom 2019-11-12",
"url": "https://usn.ubuntu.com/4185-2/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-4184-1 vom 2019-11-12",
"url": "https://usn.ubuntu.com/4184-1/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-4183-1 vom 2019-11-12",
"url": "https://usn.ubuntu.com/4183-1/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-4182-2 vom 2019-11-12",
"url": "https://usn.ubuntu.com/4182-2/"
},
{
"category": "external",
"summary": "Dell Securiy Advisory DSA-2019-147 vom 2019-11-12",
"url": "https://www.dell.com/support/article/de/de/debsdt1/sln319429/dsa-2019-147-dell-client-platform-security-update-for-intel-platform-updates-2019-2?lang=en"
},
{
"category": "external",
"summary": "Dell Securiy Advisory DSA-2019-166 vom 2019-11-12",
"url": "https://www.dell.com/support/article/de/de/debsdt1/sln319434/dsa-2019-166-dell-emc-server-platform-security-advisory-for-intel-platform-updates-2019-2?lang=en"
},
{
"category": "external",
"summary": "Dell Securiy Advisory DSA-2019-153 vom 2019-11-12",
"url": "https://www.dell.com/support/article/de/de/debsdt1/sln319438/dsa-2019-153-dell-emc-networking-security-advisory-for-intel-platform-updates-2019-2?lang=en"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:2946-1 vom 2019-11-12",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192946-1/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:2948-1 vom 2019-11-12",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192948-1/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:2949-1 vom 2019-11-12",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192949-1/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:2957-1 vom 2019-11-12",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192957-1/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:2958-1 vom 2019-11-12",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192958-1/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:2959-1 vom 2019-11-12",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192959-1/"
},
{
"category": "external",
"summary": "VMware Security Advisories VMSA-2019-0020 vom 2019-11-12",
"url": "https://www.vmware.com/security/advisories/VMSA-2019-0020.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-4186-3 vom 2019-11-13",
"url": "https://usn.ubuntu.com/4186-3/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:14217-1 vom 2019-11-13",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-201914217-1.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3873 vom 2019-11-13",
"url": "https://access.redhat.com/errata/RHSA-2019:3873"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3872 vom 2019-11-13",
"url": "https://access.redhat.com/errata/RHSA-2019:3872"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3877 vom 2019-11-13",
"url": "https://access.redhat.com/errata/RHSA-2019:3877"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3878 vom 2019-11-13",
"url": "https://access.redhat.com/errata/RHSA-2019:3878"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3872 vom 2019-11-14",
"url": "https://access.redhat.com/errata/RHSA-2019:3872"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-4184-2 vom 2019-11-13",
"url": "https://usn.ubuntu.com/4184-2/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-4183-2 vom 2019-11-13",
"url": "https://usn.ubuntu.com/4183-2/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-4185-3 vom 2019-11-13",
"url": "https://usn.ubuntu.com/4185-3/"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3883 vom 2019-11-14",
"url": "https://access.redhat.com/errata/RHSA-2019:3883"
},
{
"category": "external",
"summary": "Arch Linux Security Advisory ASA-201911-14 vom 2019-11-13",
"url": "https://security.archlinux.org/ASA-201911-14"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3870 vom 2019-11-13",
"url": "https://access.redhat.com/errata/RHSA-2019:3870"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3871 vom 2019-11-13",
"url": "https://access.redhat.com/errata/RHSA-2019:3871"
},
{
"category": "external",
"summary": "Citrix Hypervisor Security Update CTX263684 vom 2019-11-12",
"url": "https://support.citrix.com/article/CTX263684"
},
{
"category": "external",
"summary": "HPE Security Bulletin HPESBHF03971 rev.1 vom 2019-11-13",
"url": "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03971en_us"
},
{
"category": "external",
"summary": "HPE Security Bulletin HPESBHF03967 rev.1 vom 2019-11-13",
"url": "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03967en_us"
},
{
"category": "external",
"summary": "CentOS Security Advisory CESA-2019:3872 vom 2019-11-14",
"url": "http://centos-announce.2309468.n4.nabble.com/CentOS-announce-CESA-2019-3872-Important-CentOS-7-kernel-Security-Update-tp4645757.html"
},
{
"category": "external",
"summary": "F5 Security Advisory K32412503 vom 2019-11-15",
"url": "https://support.f5.com/csp/article/K32412503"
},
{
"category": "external",
"summary": "CentOS Security Advisory CESA-2019:3834 vom 2019-11-14",
"url": "http://centos-announce.2309468.n4.nabble.com/CentOS-announce-CESA-2019-3834-Important-CentOS-7-kernel-Security-Update-tp4645756.html"
},
{
"category": "external",
"summary": "HP Security Bulletin HPESBHF03963 rev.1 vom 2019-11-13",
"url": "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03968en_us"
},
{
"category": "external",
"summary": "CentOS Security Advisory CESA-2019:3878 vom 2019-11-14",
"url": "http://centos-announce.2309468.n4.nabble.com/CentOS-announce-CESA-2019-3878-Important-CentOS-6-kernel-Security-Update-tp4645758.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3887 vom 2019-11-14",
"url": "https://access.redhat.com/errata/RHSA-2019:3887"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3889 vom 2019-11-14",
"url": "https://access.redhat.com/errata/RHSA-2019:3889"
},
{
"category": "external",
"summary": "AVAYA Security Advisory ASA-2019-237 vom 2019-11-14",
"url": "https://downloads.avaya.com/css/P8/documents/101062296"
},
{
"category": "external",
"summary": "HPE Security Bulletin HPESBHF03969 rev.1 vom 2019-11-13",
"url": "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03969en_us"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:2984-1 vom 2019-11-16",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192984-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:14220-1 vom 2019-11-16",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-201914220-1.html"
},
{
"category": "external",
"summary": "AVAYA Security Advisory ASA-2019-238 vom 2019-11-16",
"url": "https://downloads.avaya.com/css/P8/documents/101062297"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:2988-1 vom 2019-11-16",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192988-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:2987-1 vom 2019-11-16",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192987-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:2986-1 vom 2019-11-16",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192986-1.html"
},
{
"category": "external",
"summary": "ORACLE OVMSA-2019-0054 vom 2019-11-18",
"url": "https://oss.oracle.com/pipermail/oraclevm-errata/2019-November/000967.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3908 vom 2019-11-19",
"url": "https://access.redhat.com/errata/RHSA-2019:3908"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3916 vom 2019-11-19",
"url": "https://access.redhat.com/errata/RHSA-2019:3916"
},
{
"category": "external",
"summary": "AVAYA Security Advisory ASA-2019-242 vom 2019-11-21",
"url": "https://downloads.avaya.com/css/P8/documents/101062452"
},
{
"category": "external",
"summary": "AVAYA Security Advisory ASA-2019-241 vom 2019-11-21",
"url": "https://downloads.avaya.com/css/P8/documents/101062451"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3936 vom 2019-11-20",
"url": "https://access.redhat.com/errata/RHSA-2019:3936"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3941 vom 2019-11-21",
"url": "https://access.redhat.com/errata/RHSA-2019:3941"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:3091-1 vom 2019-11-29",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20193091-1.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-4182-4 vom 2019-12-04",
"url": "https://usn.ubuntu.com/4182-4/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-4182-3 vom 2019-12-04",
"url": "https://usn.ubuntu.com/4182-3/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:3200-1 vom 2019-12-07",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20193200-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:3289-1 vom 2019-12-13",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20193289-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:3294-1 vom 2019-12-14",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20193294-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:3295-1 vom 2019-12-14",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20193295-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:3317-1 vom 2019-12-18",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20193317-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:3316-1 vom 2019-12-18",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20193316-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:3340-1 vom 2019-12-20",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20193340-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:3372-1 vom 2019-12-20",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html"
},
{
"category": "external",
"summary": "F5 Security Advisory K54164678 vom 2019-12-27",
"url": "https://support.f5.com/csp/article/K54164678?utm_source=f5support\u0026utm_medium=RSS"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:0026 vom 2020-01-06",
"url": "https://access.redhat.com/errata/RHSA-2020:0026"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:0028 vom 2020-01-06",
"url": "https://access.redhat.com/errata/RHSA-2020:0028"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2020:0093-1 vom 2020-01-14",
"url": "https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:0204 vom 2020-01-22",
"url": "https://access.redhat.com/errata/RHSA-2020:0204"
},
{
"category": "external",
"summary": "NetApp Security Advisory",
"url": "https://security.netapp.com/advisory/ntap-20191213-0001/"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:0279 vom 2020-01-29",
"url": "https://access.redhat.com/errata/RHSA-2020:0279"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:0328 vom 2020-02-04",
"url": "https://access.redhat.com/errata/RHSA-2020:0328"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:0366 vom 2020-02-04",
"url": "https://access.redhat.com/errata/RHSA-2020:0366"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:0339 vom 2020-02-04",
"url": "https://access.redhat.com/errata/RHSA-2020:0339"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2020:0334-1 vom 2020-02-06",
"url": "https://www.suse.com/support/update/announcement/2020/suse-su-20200334-1.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:0555 vom 2020-02-19",
"url": "https://access.redhat.com/errata/RHSA-2020:0555"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:0666 vom 2020-03-03",
"url": "https://access.redhat.com/errata/RHSA-2020:0666"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:0730 vom 2020-03-05",
"url": "https://access.redhat.com/errata/RHSA-2020:0730"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:0839 vom 2020-03-17",
"url": "https://access.redhat.com/errata/RHSA-2020:0839"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:0834 vom 2020-03-17",
"url": "https://access.redhat.com/errata/RHSA-2020:0834"
},
{
"category": "external",
"summary": "CentOS Security Advisory CESA-2020:0839 vom 2020-03-25",
"url": "http://centos-announce.2309468.n4.nabble.com/CentOS-announce-CESA-2020-0839-Important-CentOS-7-kernel-Security-Update-tp4645862.html"
},
{
"category": "external",
"summary": "AVAYA Security Advisory ASA-2020-026 vom 2020-04-14",
"url": "https://downloads.avaya.com/css/P8/documents/101065862"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:1465 vom 2020-04-14",
"url": "https://access.redhat.com/errata/RHSA-2020:1465"
},
{
"category": "external",
"summary": "HPE SECURITY BULLETIN hpesbhf03966en_us vom 2020-05-05",
"url": "https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US\u0026docId=emr_na-hpesbhf03966en_us"
},
{
"category": "external",
"summary": "HPE SECURITY BULLETIN hpesbhf03961en_us vom 2020-05-05",
"url": "https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US\u0026docId=emr_na-hpesbhf03961en_us"
},
{
"category": "external",
"summary": "EMC Security Advisory 538629 vom 2020-06-22",
"url": "https://www.dell.com/support/security/de-de/details/538629/TSX-Asynchronous-Abort-TAA-CVE-2019-11135-Impact-on-Dell-EMC-Data-Protection-and-Storage-Produc"
},
{
"category": "external",
"summary": "ORACLE OVMSA-2020-0026 vom 2020-06-22",
"url": "https://oss.oracle.com/pipermail/oraclevm-errata/2020-June/000986.html"
},
{
"category": "external",
"summary": "Juniper Security Advisory JSA11026 vom 2020-07-08",
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11026"
},
{
"category": "external",
"summary": "ORACLE OVMSA-2020-0027 vom 2020-07-13",
"url": "https://oss.oracle.com/pipermail/oraclevm-errata/2020-July/000990.html"
},
{
"category": "external",
"summary": "libvirt Security Notice LSN-2019-0008 vom 2020-07-27",
"url": "http://security.libvirt.org/2019/0008.html"
},
{
"category": "external",
"summary": "F5 Security Advisory K17269881 vom 2020-08-26",
"url": "https://support.f5.com/csp/article/K17269881"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2020:2491-1 vom 2020-09-04",
"url": "http://lists.suse.com/pipermail/sle-security-updates/2020-September/007367.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2020:2505-1 vom 2020-09-04",
"url": "http://lists.suse.com/pipermail/sle-security-updates/2020-September/007356.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2020:2526-1 vom 2020-09-04",
"url": "http://lists.suse.com/pipermail/sle-security-updates/2020-September/007365.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2020:2497-1 vom 2020-09-04",
"url": "http://lists.suse.com/pipermail/sle-security-updates/2020-September/007364.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2021-4386 vom 2021-11-16",
"url": "https://linux.oracle.com/errata/ELSA-2021-4386.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2023-3822 vom 2023-07-08",
"url": "https://linux.oracle.com/errata/ELSA-2023-3822.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-1301 vom 2025-02-13",
"url": "https://linux.oracle.com/errata/ELSA-2025-1301.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02853-1 vom 2025-08-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022200.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02923-1 vom 2025-08-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022237.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02969-1 vom 2025-08-25",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022259.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02996-1 vom 2025-08-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02997-1 vom 2025-08-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022283.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20577-1 vom 2025-08-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20586-1 vom 2025-08-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022295.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03011-1 vom 2025-08-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022327.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20602-1 vom 2025-08-29",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022362.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20601-1 vom 2025-08-29",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03023-1 vom 2025-08-29",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022329.html"
}
],
"source_lang": "en-US",
"title": "Intel Prozessoren: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2025-08-31T22:00:00.000+00:00",
"generator": {
"date": "2025-09-01T07:26:11.338+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.4.0"
}
},
"id": "WID-SEC-W-2023-1689",
"initial_release_date": "2019-11-12T23:00:00.000+00:00",
"revision_history": [
{
"date": "2019-11-12T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2019-11-13T23:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Citrix, Ubuntu, SUSE, Red Hat, Arch Linux und Fedora aufgenommen"
},
{
"date": "2019-11-13T23:00:00.000+00:00",
"number": "3",
"summary": "Version nicht vorhanden"
},
{
"date": "2019-11-13T23:00:00.000+00:00",
"number": "4",
"summary": "Version nicht vorhanden"
},
{
"date": "2019-11-14T23:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von HP, CentOS, F5, Red Hat und AVAYA aufgenommen"
},
{
"date": "2019-11-17T23:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von SUSE und AVAYA aufgenommen"
},
{
"date": "2019-11-18T23:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von ORACLE aufgenommen"
},
{
"date": "2019-11-18T23:00:00.000+00:00",
"number": "8",
"summary": "Version nicht vorhanden"
},
{
"date": "2019-11-19T23:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2019-11-20T23:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von AVAYA und Red Hat aufgenommen"
},
{
"date": "2019-11-20T23:00:00.000+00:00",
"number": "11",
"summary": "Version nicht vorhanden"
},
{
"date": "2019-11-21T23:00:00.000+00:00",
"number": "12",
"summary": "Referenz(en) aufgenommen: OVMSA-2019-0056"
},
{
"date": "2019-11-28T23:00:00.000+00:00",
"number": "13",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2019-12-02T23:00:00.000+00:00",
"number": "14",
"summary": "Schreibfehler korrigiert"
},
{
"date": "2019-12-03T23:00:00.000+00:00",
"number": "15",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2019-12-08T23:00:00.000+00:00",
"number": "16",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2019-12-12T23:00:00.000+00:00",
"number": "17",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2019-12-15T23:00:00.000+00:00",
"number": "18",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2019-12-17T23:00:00.000+00:00",
"number": "19",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2019-12-19T23:00:00.000+00:00",
"number": "20",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2019-12-22T23:00:00.000+00:00",
"number": "21",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2019-12-29T23:00:00.000+00:00",
"number": "22",
"summary": "Neue Updates von F5 aufgenommen"
},
{
"date": "2020-01-01T23:00:00.000+00:00",
"number": "23",
"summary": "Referenz(en) aufgenommen: DLA 2051"
},
{
"date": "2020-01-06T23:00:00.000+00:00",
"number": "24",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2020-01-14T23:00:00.000+00:00",
"number": "25",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2020-01-22T23:00:00.000+00:00",
"number": "26",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2020-01-26T23:00:00.000+00:00",
"number": "27",
"summary": "Neue Updates von NetApp aufgenommen"
},
{
"date": "2020-01-29T23:00:00.000+00:00",
"number": "28",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2020-02-03T23:00:00.000+00:00",
"number": "29",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2020-02-04T23:00:00.000+00:00",
"number": "30",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2020-02-06T23:00:00.000+00:00",
"number": "31",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2020-02-19T23:00:00.000+00:00",
"number": "32",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2020-03-03T23:00:00.000+00:00",
"number": "33",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2020-03-05T23:00:00.000+00:00",
"number": "34",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2020-03-17T23:00:00.000+00:00",
"number": "35",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2020-03-25T23:00:00.000+00:00",
"number": "36",
"summary": "Neue Updates von CentOS aufgenommen"
},
{
"date": "2020-04-13T22:00:00.000+00:00",
"number": "37",
"summary": "Neue Updates von AVAYA aufgenommen"
},
{
"date": "2020-04-14T22:00:00.000+00:00",
"number": "38",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2020-05-05T22:00:00.000+00:00",
"number": "39",
"summary": "Neue Updates von HPE"
},
{
"date": "2020-06-21T22:00:00.000+00:00",
"number": "40",
"summary": "Neue Updates von EMC aufgenommen"
},
{
"date": "2020-06-22T22:00:00.000+00:00",
"number": "41",
"summary": "Neue Updates von ORACLE aufgenommen"
},
{
"date": "2020-07-08T22:00:00.000+00:00",
"number": "42",
"summary": "Neue Updates von Juniper aufgenommen"
},
{
"date": "2020-07-13T22:00:00.000+00:00",
"number": "43",
"summary": "Neue Updates von ORACLE aufgenommen"
},
{
"date": "2020-07-27T22:00:00.000+00:00",
"number": "44",
"summary": "Neue Updates von libvirt aufgenommen"
},
{
"date": "2020-08-25T22:00:00.000+00:00",
"number": "45",
"summary": "Neue Updates von F5 aufgenommen"
},
{
"date": "2020-09-06T22:00:00.000+00:00",
"number": "46",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2021-11-16T23:00:00.000+00:00",
"number": "47",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2023-07-09T22:00:00.000+00:00",
"number": "48",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-02-12T23:00:00.000+00:00",
"number": "49",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-08-18T22:00:00.000+00:00",
"number": "50",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-08-19T22:00:00.000+00:00",
"number": "51",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-08-24T22:00:00.000+00:00",
"number": "52",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-08-27T22:00:00.000+00:00",
"number": "53",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-08-28T22:00:00.000+00:00",
"number": "54",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-08-31T22:00:00.000+00:00",
"number": "55",
"summary": "Neue Updates von SUSE aufgenommen"
}
],
"status": "final",
"version": "55"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Avaya Aura Communication Manager",
"product": {
"name": "Avaya Aura Communication Manager",
"product_id": "T015126",
"product_identification_helper": {
"cpe": "cpe:/a:avaya:communication_manager:-"
}
}
},
{
"category": "product_name",
"name": "Avaya Aura Session Manager",
"product": {
"name": "Avaya Aura Session Manager",
"product_id": "T015127",
"product_identification_helper": {
"cpe": "cpe:/a:avaya:session_manager:-"
}
}
},
{
"category": "product_name",
"name": "Avaya Aura System Manager",
"product": {
"name": "Avaya Aura System Manager",
"product_id": "T015518",
"product_identification_helper": {
"cpe": "cpe:/a:avaya:aura_system_manager:-"
}
}
},
{
"category": "product_name",
"name": "Avaya Media Gateway",
"product": {
"name": "Avaya Media Gateway",
"product_id": "T015276",
"product_identification_helper": {
"cpe": "cpe:/h:avaya:media_gateway:-"
}
}
},
{
"category": "product_name",
"name": "Avaya Web License Manager",
"product": {
"name": "Avaya Web License Manager",
"product_id": "T016243",
"product_identification_helper": {
"cpe": "cpe:/a:avaya:web_license_manager:-"
}
}
}
],
"category": "vendor",
"name": "Avaya"
},
{
"branches": [
{
"category": "product_name",
"name": "Citrix Systems XenServer",
"product": {
"name": "Citrix Systems XenServer",
"product_id": "T004077",
"product_identification_helper": {
"cpe": "cpe:/a:citrix:xenserver:-"
}
}
}
],
"category": "vendor",
"name": "Citrix Systems"
},
{
"branches": [
{
"category": "product_name",
"name": "Debian Linux",
"product": {
"name": "Debian Linux",
"product_id": "2951",
"product_identification_helper": {
"cpe": "cpe:/o:debian:debian_linux:-"
}
}
}
],
"category": "vendor",
"name": "Debian"
},
{
"branches": [
{
"category": "product_name",
"name": "Dell Computer",
"product": {
"name": "Dell Computer",
"product_id": "T006498",
"product_identification_helper": {
"cpe": "cpe:/o:dell:dell_computer:-"
}
}
}
],
"category": "vendor",
"name": "Dell"
},
{
"branches": [
{
"category": "product_name",
"name": "F5 BIG-IP",
"product": {
"name": "F5 BIG-IP",
"product_id": "T001663",
"product_identification_helper": {
"cpe": "cpe:/a:f5:big-ip:-"
}
}
}
],
"category": "vendor",
"name": "F5"
},
{
"branches": [
{
"category": "product_name",
"name": "FreeBSD Project FreeBSD OS",
"product": {
"name": "FreeBSD Project FreeBSD OS",
"product_id": "4035",
"product_identification_helper": {
"cpe": "cpe:/o:freebsd:freebsd:-"
}
}
}
],
"category": "vendor",
"name": "FreeBSD Project"
},
{
"branches": [
{
"category": "product_name",
"name": "HP BIOS",
"product": {
"name": "HP BIOS",
"product_id": "T007117",
"product_identification_helper": {
"cpe": "cpe:/h:hp:bios:-"
}
}
}
],
"category": "vendor",
"name": "HP"
},
{
"branches": [
{
"category": "product_name",
"name": "HPE ProLiant",
"product": {
"name": "HPE ProLiant",
"product_id": "T009310",
"product_identification_helper": {
"cpe": "cpe:/h:hp:proliant:-"
}
}
}
],
"category": "vendor",
"name": "HPE"
},
{
"branches": [
{
"category": "product_name",
"name": "Intel AMT SDK",
"product": {
"name": "Intel AMT SDK",
"product_id": "T011597",
"product_identification_helper": {
"cpe": "cpe:/a:intel:active_management_technology_software_development_kit:-"
}
}
},
{
"category": "product_name",
"name": "Intel Prozessor",
"product": {
"name": "Intel Prozessor",
"product_id": "T011586",
"product_identification_helper": {
"cpe": "cpe:/h:intel:intel_prozessor:-"
}
}
},
{
"category": "product_name",
"name": "Intel Xeon",
"product": {
"name": "Intel Xeon",
"product_id": "T011286",
"product_identification_helper": {
"cpe": "cpe:/h:intel:xeon:-"
}
}
}
],
"category": "vendor",
"name": "Intel"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c20.1R1",
"product": {
"name": "Juniper Junos Space \u003c20.1R1",
"product_id": "T016874"
}
},
{
"category": "product_version",
"name": "20.1R1",
"product": {
"name": "Juniper Junos Space 20.1R1",
"product_id": "T016874-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:juniper:junos_space:20.1r1"
}
}
}
],
"category": "product_name",
"name": "Junos Space"
}
],
"category": "vendor",
"name": "Juniper"
},
{
"branches": [
{
"category": "product_name",
"name": "NetApp Data ONTAP",
"product": {
"name": "NetApp Data ONTAP",
"product_id": "7654",
"product_identification_helper": {
"cpe": "cpe:/a:netapp:data_ontap:-"
}
}
},
{
"category": "product_name",
"name": "NetApp FAS",
"product": {
"name": "NetApp FAS",
"product_id": "T011540",
"product_identification_helper": {
"cpe": "cpe:/h:netapp:fas:-"
}
}
}
],
"category": "vendor",
"name": "NetApp"
},
{
"branches": [
{
"category": "product_name",
"name": "Open Source Arch Linux",
"product": {
"name": "Open Source Arch Linux",
"product_id": "T013312",
"product_identification_helper": {
"cpe": "cpe:/o:archlinux:archlinux:-"
}
}
},
{
"category": "product_name",
"name": "Open Source CentOS",
"product": {
"name": "Open Source CentOS",
"product_id": "1727",
"product_identification_helper": {
"cpe": "cpe:/o:centos:centos:-"
}
}
},
{
"category": "product_name",
"name": "Open Source Xen",
"product": {
"name": "Open Source Xen",
"product_id": "T000611",
"product_identification_helper": {
"cpe": "cpe:/o:xen:xen:-"
}
}
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c6.0.0",
"product": {
"name": "Open Source libvirt \u003c6.0.0",
"product_id": "712004"
}
},
{
"category": "product_version",
"name": "6.0.0",
"product": {
"name": "Open Source libvirt 6.0.0",
"product_id": "712004-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:libvirt:6.0.0"
}
}
}
],
"category": "product_name",
"name": "libvirt"
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
},
{
"category": "product_name",
"name": "Oracle VM",
"product": {
"name": "Oracle VM",
"product_id": "T011119",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:vm:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server EUS",
"product": {
"name": "Red Hat Enterprise Linux Server EUS",
"product_id": "T015361",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
}
],
"category": "product_name",
"name": "Enterprise Linux"
},
{
"category": "product_name",
"name": "Red Hat Enterprise MRG",
"product": {
"name": "Red Hat Enterprise MRG",
"product_id": "T003513",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_mrg:-"
}
}
},
{
"category": "product_name",
"name": "Red Hat Fedora",
"product": {
"name": "Red Hat Fedora",
"product_id": "T007849",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:fedora:-"
}
}
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
},
{
"branches": [
{
"category": "product_name",
"name": "VMware ESXi",
"product": {
"name": "VMware ESXi",
"product_id": "T009575",
"product_identification_helper": {
"cpe": "cpe:/o:vmware:esxi:-"
}
}
},
{
"category": "product_name",
"name": "VMware Fusion",
"product": {
"name": "VMware Fusion",
"product_id": "T009574",
"product_identification_helper": {
"cpe": "cpe:/a:vmware:fusion:-"
}
}
},
{
"category": "product_name",
"name": "VMware Workstation",
"product": {
"name": "VMware Workstation",
"product_id": "11768",
"product_identification_helper": {
"cpe": "cpe:/a:vmware:workstation:-"
}
}
}
],
"category": "vendor",
"name": "VMware"
},
{
"branches": [
{
"category": "product_name",
"name": "Intel System Management Software",
"product": {
"name": "Intel System Management Software",
"product_id": "T014240",
"product_identification_helper": {
"cpe": "cpe:/a:intel:system_management_software:-"
}
}
}
],
"category": "vendor",
"name": "intel"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-12207",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2018-12207"
},
{
"cve": "CVE-2019-0117",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-0117"
},
{
"cve": "CVE-2019-0123",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-0123"
},
{
"cve": "CVE-2019-0124",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-0124"
},
{
"cve": "CVE-2019-0131",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-0131"
},
{
"cve": "CVE-2019-0151",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-0151"
},
{
"cve": "CVE-2019-0152",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-0152"
},
{
"cve": "CVE-2019-0154",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-0154"
},
{
"cve": "CVE-2019-0155",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-0155"
},
{
"cve": "CVE-2019-0165",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-0165"
},
{
"cve": "CVE-2019-0166",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-0166"
},
{
"cve": "CVE-2019-0168",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-0168"
},
{
"cve": "CVE-2019-0169",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-0169"
},
{
"cve": "CVE-2019-0184",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-0184"
},
{
"cve": "CVE-2019-0185",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-0185"
},
{
"cve": "CVE-2019-11086",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11086"
},
{
"cve": "CVE-2019-11087",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11087"
},
{
"cve": "CVE-2019-11088",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11088"
},
{
"cve": "CVE-2019-11089",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11089"
},
{
"cve": "CVE-2019-11090",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11090"
},
{
"cve": "CVE-2019-11097",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11097"
},
{
"cve": "CVE-2019-11100",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11100"
},
{
"cve": "CVE-2019-11101",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11101"
},
{
"cve": "CVE-2019-11102",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11102"
},
{
"cve": "CVE-2019-11103",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11103"
},
{
"cve": "CVE-2019-11104",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11104"
},
{
"cve": "CVE-2019-11105",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11105"
},
{
"cve": "CVE-2019-11106",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11106"
},
{
"cve": "CVE-2019-11107",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11107"
},
{
"cve": "CVE-2019-11108",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11108"
},
{
"cve": "CVE-2019-11109",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11109"
},
{
"cve": "CVE-2019-11110",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11110"
},
{
"cve": "CVE-2019-11111",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11111"
},
{
"cve": "CVE-2019-11112",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11112"
},
{
"cve": "CVE-2019-11113",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11113"
},
{
"cve": "CVE-2019-11131",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11131"
},
{
"cve": "CVE-2019-11132",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11132"
},
{
"cve": "CVE-2019-11135",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11135"
},
{
"cve": "CVE-2019-11136",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11136"
},
{
"cve": "CVE-2019-11137",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11137"
},
{
"cve": "CVE-2019-11139",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11139"
},
{
"cve": "CVE-2019-11147",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11147"
},
{
"cve": "CVE-2019-14574",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-14574"
},
{
"cve": "CVE-2019-14590",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-14590"
},
{
"cve": "CVE-2019-14591",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-14591"
}
]
}
WID-SEC-W-2023-1689
Vulnerability from csaf_certbund
Notes
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Der Prozessor ist das zentrale Rechenwerk eines Computers.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer oder authentisierter Angreifer kann mehrere Schwachstellen in Intel Prozessoren ausnutzen, um seine Privilegien zu erh\u00f6hen, einen Denial of Service Angriff durchzuf\u00fchren oder vertrauliche Daten einzusehen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- BIOS/Firmware\n- F5 Networks\n- Linux\n- Sonstiges\n- UNIX\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2023-1689 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2019/wid-sec-w-2023-1689.json"
},
{
"category": "self",
"summary": "WID-SEC-2023-1689 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-1689"
},
{
"category": "external",
"summary": "Intel Security Advisory INTEL-SA-00164 vom 2019-11-12",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00164.html"
},
{
"category": "external",
"summary": "Intel Security Advisory INTEL-SA-00210 vom 2019-11-12",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html"
},
{
"category": "external",
"summary": "Intel Security Advisory INTEL-SA-00219 vom 2019-11-12",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00219.html"
},
{
"category": "external",
"summary": "Intel Security Advisory INTEL-SA-00220 vom 2019-11-12",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00220.html"
},
{
"category": "external",
"summary": "Intel Security Advisory INTEL-SA-00240 vom 2019-11-12",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00240.html"
},
{
"category": "external",
"summary": "Intel Security Advisory INTEL-SA-00241 vom 2019-11-12",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00241.html"
},
{
"category": "external",
"summary": "Intel Security Advisory INTEL-SA-00242 vom 2019-11-12",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00242.html"
},
{
"category": "external",
"summary": "Intel Security Advisory INTEL-SA-00254 vom 2019-11-12",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00254.html"
},
{
"category": "external",
"summary": "Intel Security Advisory INTEL-SA-00260 vom 2019-11-12",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00260.html"
},
{
"category": "external",
"summary": "Intel Security Advisory INTEL-SA-00270 vom 2019-11-12",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00270.html"
},
{
"category": "external",
"summary": "Intel Security Advisory INTEL-SA-00271 vom 2019-11-12",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00271.html"
},
{
"category": "external",
"summary": "Intel Security Advisory INTEL-SA-00280 vom 2019-11-12",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00280.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-4565-1 vom 2019-11-13",
"url": "https://lists.debian.org/debian-security-announce/2019/msg00219.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-4564-1 vom 2019-11-13",
"url": "https://lists.debian.org/debian-security-announce/2019/msg00215.html"
},
{
"category": "external",
"summary": "Xen Security Advisory XSA-305 vom 2019-11-12",
"url": "https://xenbits.xen.org/xsa/advisory-305.html"
},
{
"category": "external",
"summary": "Xen Security Advisory XSA-304 vom 2019-11-12",
"url": "https://xenbits.xen.org/xsa/advisory-304.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3832 vom 2019-11-12",
"url": "https://access.redhat.com/errata/RHSA-2019:3832"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3833 vom 2019-11-12",
"url": "https://access.redhat.com/errata/RHSA-2019:3833"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3834 vom 2019-11-12",
"url": "https://access.redhat.com/errata/RHSA-2019:3834"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3835 vom 2019-11-12",
"url": "https://access.redhat.com/errata/RHSA-2019:3835"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3837 vom 2019-11-12",
"url": "https://access.redhat.com/errata/RHSA-2019:3837"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3838 vom 2019-11-12",
"url": "https://access.redhat.com/errata/RHSA-2019:3838"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3839 vom 2019-11-12",
"url": "https://access.redhat.com/errata/RHSA-2019:3839"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3840 vom 2019-11-12",
"url": "https://access.redhat.com/errata/RHSA-2019:3840"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3842 vom 2019-11-12",
"url": "https://access.redhat.com/errata/RHSA-2019:3842"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3844 vom 2019-11-12",
"url": "https://access.redhat.com/errata/RHSA-2019:3844"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3860 vom 2019-11-12",
"url": "https://access.redhat.com/errata/RHSA-2019:3860"
},
{
"category": "external",
"summary": "Oraclevm-errata OVMSA-2019-0052 vom 2019-11-12",
"url": "https://oss.oracle.com/pipermail/oraclevm-errata/2019-November/000966.html"
},
{
"category": "external",
"summary": "The FreeBSD Project Security Advisory FreeBSD-SA-19:25.mcepsc vom 2019-11-12",
"url": "https://www.freebsd.org/security/advisories/FreeBSD-SA-19:25.mcepsc.asc"
},
{
"category": "external",
"summary": "The FreeBSD Project Security Advisory FreeBSD-SA-19:26.mcu vom 2019-11-12",
"url": "https://www.freebsd.org/security/advisories/FreeBSD-SA-19:26.mcu.asc"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-4187-1 vom 2019-11-12",
"url": "https://usn.ubuntu.com/4187-1/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-4188-1 vom 2019-11-12",
"url": "https://usn.ubuntu.com/4188-1/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-4186-2 vom 2019-11-12",
"url": "https://usn.ubuntu.com/4186-2/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-4185-2 vom 2019-11-12",
"url": "https://usn.ubuntu.com/4185-2/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-4184-1 vom 2019-11-12",
"url": "https://usn.ubuntu.com/4184-1/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-4183-1 vom 2019-11-12",
"url": "https://usn.ubuntu.com/4183-1/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-4182-2 vom 2019-11-12",
"url": "https://usn.ubuntu.com/4182-2/"
},
{
"category": "external",
"summary": "Dell Securiy Advisory DSA-2019-147 vom 2019-11-12",
"url": "https://www.dell.com/support/article/de/de/debsdt1/sln319429/dsa-2019-147-dell-client-platform-security-update-for-intel-platform-updates-2019-2?lang=en"
},
{
"category": "external",
"summary": "Dell Securiy Advisory DSA-2019-166 vom 2019-11-12",
"url": "https://www.dell.com/support/article/de/de/debsdt1/sln319434/dsa-2019-166-dell-emc-server-platform-security-advisory-for-intel-platform-updates-2019-2?lang=en"
},
{
"category": "external",
"summary": "Dell Securiy Advisory DSA-2019-153 vom 2019-11-12",
"url": "https://www.dell.com/support/article/de/de/debsdt1/sln319438/dsa-2019-153-dell-emc-networking-security-advisory-for-intel-platform-updates-2019-2?lang=en"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:2946-1 vom 2019-11-12",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192946-1/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:2948-1 vom 2019-11-12",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192948-1/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:2949-1 vom 2019-11-12",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192949-1/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:2957-1 vom 2019-11-12",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192957-1/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:2958-1 vom 2019-11-12",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192958-1/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:2959-1 vom 2019-11-12",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192959-1/"
},
{
"category": "external",
"summary": "VMware Security Advisories VMSA-2019-0020 vom 2019-11-12",
"url": "https://www.vmware.com/security/advisories/VMSA-2019-0020.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-4186-3 vom 2019-11-13",
"url": "https://usn.ubuntu.com/4186-3/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:14217-1 vom 2019-11-13",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-201914217-1.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3873 vom 2019-11-13",
"url": "https://access.redhat.com/errata/RHSA-2019:3873"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3872 vom 2019-11-13",
"url": "https://access.redhat.com/errata/RHSA-2019:3872"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3877 vom 2019-11-13",
"url": "https://access.redhat.com/errata/RHSA-2019:3877"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3878 vom 2019-11-13",
"url": "https://access.redhat.com/errata/RHSA-2019:3878"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3872 vom 2019-11-14",
"url": "https://access.redhat.com/errata/RHSA-2019:3872"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-4184-2 vom 2019-11-13",
"url": "https://usn.ubuntu.com/4184-2/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-4183-2 vom 2019-11-13",
"url": "https://usn.ubuntu.com/4183-2/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-4185-3 vom 2019-11-13",
"url": "https://usn.ubuntu.com/4185-3/"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3883 vom 2019-11-14",
"url": "https://access.redhat.com/errata/RHSA-2019:3883"
},
{
"category": "external",
"summary": "Arch Linux Security Advisory ASA-201911-14 vom 2019-11-13",
"url": "https://security.archlinux.org/ASA-201911-14"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3870 vom 2019-11-13",
"url": "https://access.redhat.com/errata/RHSA-2019:3870"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3871 vom 2019-11-13",
"url": "https://access.redhat.com/errata/RHSA-2019:3871"
},
{
"category": "external",
"summary": "Citrix Hypervisor Security Update CTX263684 vom 2019-11-12",
"url": "https://support.citrix.com/article/CTX263684"
},
{
"category": "external",
"summary": "HPE Security Bulletin HPESBHF03971 rev.1 vom 2019-11-13",
"url": "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03971en_us"
},
{
"category": "external",
"summary": "HPE Security Bulletin HPESBHF03967 rev.1 vom 2019-11-13",
"url": "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03967en_us"
},
{
"category": "external",
"summary": "CentOS Security Advisory CESA-2019:3872 vom 2019-11-14",
"url": "http://centos-announce.2309468.n4.nabble.com/CentOS-announce-CESA-2019-3872-Important-CentOS-7-kernel-Security-Update-tp4645757.html"
},
{
"category": "external",
"summary": "F5 Security Advisory K32412503 vom 2019-11-15",
"url": "https://support.f5.com/csp/article/K32412503"
},
{
"category": "external",
"summary": "CentOS Security Advisory CESA-2019:3834 vom 2019-11-14",
"url": "http://centos-announce.2309468.n4.nabble.com/CentOS-announce-CESA-2019-3834-Important-CentOS-7-kernel-Security-Update-tp4645756.html"
},
{
"category": "external",
"summary": "HP Security Bulletin HPESBHF03963 rev.1 vom 2019-11-13",
"url": "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03968en_us"
},
{
"category": "external",
"summary": "CentOS Security Advisory CESA-2019:3878 vom 2019-11-14",
"url": "http://centos-announce.2309468.n4.nabble.com/CentOS-announce-CESA-2019-3878-Important-CentOS-6-kernel-Security-Update-tp4645758.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3887 vom 2019-11-14",
"url": "https://access.redhat.com/errata/RHSA-2019:3887"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3889 vom 2019-11-14",
"url": "https://access.redhat.com/errata/RHSA-2019:3889"
},
{
"category": "external",
"summary": "AVAYA Security Advisory ASA-2019-237 vom 2019-11-14",
"url": "https://downloads.avaya.com/css/P8/documents/101062296"
},
{
"category": "external",
"summary": "HPE Security Bulletin HPESBHF03969 rev.1 vom 2019-11-13",
"url": "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03969en_us"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:2984-1 vom 2019-11-16",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192984-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:14220-1 vom 2019-11-16",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-201914220-1.html"
},
{
"category": "external",
"summary": "AVAYA Security Advisory ASA-2019-238 vom 2019-11-16",
"url": "https://downloads.avaya.com/css/P8/documents/101062297"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:2988-1 vom 2019-11-16",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192988-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:2987-1 vom 2019-11-16",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192987-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:2986-1 vom 2019-11-16",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192986-1.html"
},
{
"category": "external",
"summary": "ORACLE OVMSA-2019-0054 vom 2019-11-18",
"url": "https://oss.oracle.com/pipermail/oraclevm-errata/2019-November/000967.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3908 vom 2019-11-19",
"url": "https://access.redhat.com/errata/RHSA-2019:3908"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3916 vom 2019-11-19",
"url": "https://access.redhat.com/errata/RHSA-2019:3916"
},
{
"category": "external",
"summary": "AVAYA Security Advisory ASA-2019-242 vom 2019-11-21",
"url": "https://downloads.avaya.com/css/P8/documents/101062452"
},
{
"category": "external",
"summary": "AVAYA Security Advisory ASA-2019-241 vom 2019-11-21",
"url": "https://downloads.avaya.com/css/P8/documents/101062451"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3936 vom 2019-11-20",
"url": "https://access.redhat.com/errata/RHSA-2019:3936"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3941 vom 2019-11-21",
"url": "https://access.redhat.com/errata/RHSA-2019:3941"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:3091-1 vom 2019-11-29",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20193091-1.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-4182-4 vom 2019-12-04",
"url": "https://usn.ubuntu.com/4182-4/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-4182-3 vom 2019-12-04",
"url": "https://usn.ubuntu.com/4182-3/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:3200-1 vom 2019-12-07",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20193200-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:3289-1 vom 2019-12-13",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20193289-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:3294-1 vom 2019-12-14",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20193294-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:3295-1 vom 2019-12-14",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20193295-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:3317-1 vom 2019-12-18",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20193317-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:3316-1 vom 2019-12-18",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20193316-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:3340-1 vom 2019-12-20",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20193340-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:3372-1 vom 2019-12-20",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20193372-1.html"
},
{
"category": "external",
"summary": "F5 Security Advisory K54164678 vom 2019-12-27",
"url": "https://support.f5.com/csp/article/K54164678?utm_source=f5support\u0026utm_medium=RSS"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:0026 vom 2020-01-06",
"url": "https://access.redhat.com/errata/RHSA-2020:0026"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:0028 vom 2020-01-06",
"url": "https://access.redhat.com/errata/RHSA-2020:0028"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2020:0093-1 vom 2020-01-14",
"url": "https://www.suse.com/support/update/announcement/2020/suse-su-20200093-1.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:0204 vom 2020-01-22",
"url": "https://access.redhat.com/errata/RHSA-2020:0204"
},
{
"category": "external",
"summary": "NetApp Security Advisory",
"url": "https://security.netapp.com/advisory/ntap-20191213-0001/"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:0279 vom 2020-01-29",
"url": "https://access.redhat.com/errata/RHSA-2020:0279"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:0328 vom 2020-02-04",
"url": "https://access.redhat.com/errata/RHSA-2020:0328"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:0366 vom 2020-02-04",
"url": "https://access.redhat.com/errata/RHSA-2020:0366"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:0339 vom 2020-02-04",
"url": "https://access.redhat.com/errata/RHSA-2020:0339"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2020:0334-1 vom 2020-02-06",
"url": "https://www.suse.com/support/update/announcement/2020/suse-su-20200334-1.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:0555 vom 2020-02-19",
"url": "https://access.redhat.com/errata/RHSA-2020:0555"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:0666 vom 2020-03-03",
"url": "https://access.redhat.com/errata/RHSA-2020:0666"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:0730 vom 2020-03-05",
"url": "https://access.redhat.com/errata/RHSA-2020:0730"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:0839 vom 2020-03-17",
"url": "https://access.redhat.com/errata/RHSA-2020:0839"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:0834 vom 2020-03-17",
"url": "https://access.redhat.com/errata/RHSA-2020:0834"
},
{
"category": "external",
"summary": "CentOS Security Advisory CESA-2020:0839 vom 2020-03-25",
"url": "http://centos-announce.2309468.n4.nabble.com/CentOS-announce-CESA-2020-0839-Important-CentOS-7-kernel-Security-Update-tp4645862.html"
},
{
"category": "external",
"summary": "AVAYA Security Advisory ASA-2020-026 vom 2020-04-14",
"url": "https://downloads.avaya.com/css/P8/documents/101065862"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:1465 vom 2020-04-14",
"url": "https://access.redhat.com/errata/RHSA-2020:1465"
},
{
"category": "external",
"summary": "HPE SECURITY BULLETIN hpesbhf03966en_us vom 2020-05-05",
"url": "https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US\u0026docId=emr_na-hpesbhf03966en_us"
},
{
"category": "external",
"summary": "HPE SECURITY BULLETIN hpesbhf03961en_us vom 2020-05-05",
"url": "https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US\u0026docId=emr_na-hpesbhf03961en_us"
},
{
"category": "external",
"summary": "EMC Security Advisory 538629 vom 2020-06-22",
"url": "https://www.dell.com/support/security/de-de/details/538629/TSX-Asynchronous-Abort-TAA-CVE-2019-11135-Impact-on-Dell-EMC-Data-Protection-and-Storage-Produc"
},
{
"category": "external",
"summary": "ORACLE OVMSA-2020-0026 vom 2020-06-22",
"url": "https://oss.oracle.com/pipermail/oraclevm-errata/2020-June/000986.html"
},
{
"category": "external",
"summary": "Juniper Security Advisory JSA11026 vom 2020-07-08",
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11026"
},
{
"category": "external",
"summary": "ORACLE OVMSA-2020-0027 vom 2020-07-13",
"url": "https://oss.oracle.com/pipermail/oraclevm-errata/2020-July/000990.html"
},
{
"category": "external",
"summary": "libvirt Security Notice LSN-2019-0008 vom 2020-07-27",
"url": "http://security.libvirt.org/2019/0008.html"
},
{
"category": "external",
"summary": "F5 Security Advisory K17269881 vom 2020-08-26",
"url": "https://support.f5.com/csp/article/K17269881"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2020:2491-1 vom 2020-09-04",
"url": "http://lists.suse.com/pipermail/sle-security-updates/2020-September/007367.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2020:2505-1 vom 2020-09-04",
"url": "http://lists.suse.com/pipermail/sle-security-updates/2020-September/007356.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2020:2526-1 vom 2020-09-04",
"url": "http://lists.suse.com/pipermail/sle-security-updates/2020-September/007365.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2020:2497-1 vom 2020-09-04",
"url": "http://lists.suse.com/pipermail/sle-security-updates/2020-September/007364.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2021-4386 vom 2021-11-16",
"url": "https://linux.oracle.com/errata/ELSA-2021-4386.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2023-3822 vom 2023-07-08",
"url": "https://linux.oracle.com/errata/ELSA-2023-3822.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-1301 vom 2025-02-13",
"url": "https://linux.oracle.com/errata/ELSA-2025-1301.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02853-1 vom 2025-08-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022200.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02923-1 vom 2025-08-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022237.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02969-1 vom 2025-08-25",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022259.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02996-1 vom 2025-08-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02997-1 vom 2025-08-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022283.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20577-1 vom 2025-08-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20586-1 vom 2025-08-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022295.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03011-1 vom 2025-08-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022327.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20602-1 vom 2025-08-29",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022362.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20601-1 vom 2025-08-29",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03023-1 vom 2025-08-29",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022329.html"
}
],
"source_lang": "en-US",
"title": "Intel Prozessoren: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2025-08-31T22:00:00.000+00:00",
"generator": {
"date": "2025-09-01T07:26:11.338+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.4.0"
}
},
"id": "WID-SEC-W-2023-1689",
"initial_release_date": "2019-11-12T23:00:00.000+00:00",
"revision_history": [
{
"date": "2019-11-12T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2019-11-13T23:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Citrix, Ubuntu, SUSE, Red Hat, Arch Linux und Fedora aufgenommen"
},
{
"date": "2019-11-13T23:00:00.000+00:00",
"number": "3",
"summary": "Version nicht vorhanden"
},
{
"date": "2019-11-13T23:00:00.000+00:00",
"number": "4",
"summary": "Version nicht vorhanden"
},
{
"date": "2019-11-14T23:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von HP, CentOS, F5, Red Hat und AVAYA aufgenommen"
},
{
"date": "2019-11-17T23:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von SUSE und AVAYA aufgenommen"
},
{
"date": "2019-11-18T23:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von ORACLE aufgenommen"
},
{
"date": "2019-11-18T23:00:00.000+00:00",
"number": "8",
"summary": "Version nicht vorhanden"
},
{
"date": "2019-11-19T23:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2019-11-20T23:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von AVAYA und Red Hat aufgenommen"
},
{
"date": "2019-11-20T23:00:00.000+00:00",
"number": "11",
"summary": "Version nicht vorhanden"
},
{
"date": "2019-11-21T23:00:00.000+00:00",
"number": "12",
"summary": "Referenz(en) aufgenommen: OVMSA-2019-0056"
},
{
"date": "2019-11-28T23:00:00.000+00:00",
"number": "13",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2019-12-02T23:00:00.000+00:00",
"number": "14",
"summary": "Schreibfehler korrigiert"
},
{
"date": "2019-12-03T23:00:00.000+00:00",
"number": "15",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2019-12-08T23:00:00.000+00:00",
"number": "16",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2019-12-12T23:00:00.000+00:00",
"number": "17",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2019-12-15T23:00:00.000+00:00",
"number": "18",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2019-12-17T23:00:00.000+00:00",
"number": "19",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2019-12-19T23:00:00.000+00:00",
"number": "20",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2019-12-22T23:00:00.000+00:00",
"number": "21",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2019-12-29T23:00:00.000+00:00",
"number": "22",
"summary": "Neue Updates von F5 aufgenommen"
},
{
"date": "2020-01-01T23:00:00.000+00:00",
"number": "23",
"summary": "Referenz(en) aufgenommen: DLA 2051"
},
{
"date": "2020-01-06T23:00:00.000+00:00",
"number": "24",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2020-01-14T23:00:00.000+00:00",
"number": "25",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2020-01-22T23:00:00.000+00:00",
"number": "26",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2020-01-26T23:00:00.000+00:00",
"number": "27",
"summary": "Neue Updates von NetApp aufgenommen"
},
{
"date": "2020-01-29T23:00:00.000+00:00",
"number": "28",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2020-02-03T23:00:00.000+00:00",
"number": "29",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2020-02-04T23:00:00.000+00:00",
"number": "30",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2020-02-06T23:00:00.000+00:00",
"number": "31",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2020-02-19T23:00:00.000+00:00",
"number": "32",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2020-03-03T23:00:00.000+00:00",
"number": "33",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2020-03-05T23:00:00.000+00:00",
"number": "34",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2020-03-17T23:00:00.000+00:00",
"number": "35",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2020-03-25T23:00:00.000+00:00",
"number": "36",
"summary": "Neue Updates von CentOS aufgenommen"
},
{
"date": "2020-04-13T22:00:00.000+00:00",
"number": "37",
"summary": "Neue Updates von AVAYA aufgenommen"
},
{
"date": "2020-04-14T22:00:00.000+00:00",
"number": "38",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2020-05-05T22:00:00.000+00:00",
"number": "39",
"summary": "Neue Updates von HPE"
},
{
"date": "2020-06-21T22:00:00.000+00:00",
"number": "40",
"summary": "Neue Updates von EMC aufgenommen"
},
{
"date": "2020-06-22T22:00:00.000+00:00",
"number": "41",
"summary": "Neue Updates von ORACLE aufgenommen"
},
{
"date": "2020-07-08T22:00:00.000+00:00",
"number": "42",
"summary": "Neue Updates von Juniper aufgenommen"
},
{
"date": "2020-07-13T22:00:00.000+00:00",
"number": "43",
"summary": "Neue Updates von ORACLE aufgenommen"
},
{
"date": "2020-07-27T22:00:00.000+00:00",
"number": "44",
"summary": "Neue Updates von libvirt aufgenommen"
},
{
"date": "2020-08-25T22:00:00.000+00:00",
"number": "45",
"summary": "Neue Updates von F5 aufgenommen"
},
{
"date": "2020-09-06T22:00:00.000+00:00",
"number": "46",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2021-11-16T23:00:00.000+00:00",
"number": "47",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2023-07-09T22:00:00.000+00:00",
"number": "48",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-02-12T23:00:00.000+00:00",
"number": "49",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-08-18T22:00:00.000+00:00",
"number": "50",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-08-19T22:00:00.000+00:00",
"number": "51",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-08-24T22:00:00.000+00:00",
"number": "52",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-08-27T22:00:00.000+00:00",
"number": "53",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-08-28T22:00:00.000+00:00",
"number": "54",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-08-31T22:00:00.000+00:00",
"number": "55",
"summary": "Neue Updates von SUSE aufgenommen"
}
],
"status": "final",
"version": "55"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Avaya Aura Communication Manager",
"product": {
"name": "Avaya Aura Communication Manager",
"product_id": "T015126",
"product_identification_helper": {
"cpe": "cpe:/a:avaya:communication_manager:-"
}
}
},
{
"category": "product_name",
"name": "Avaya Aura Session Manager",
"product": {
"name": "Avaya Aura Session Manager",
"product_id": "T015127",
"product_identification_helper": {
"cpe": "cpe:/a:avaya:session_manager:-"
}
}
},
{
"category": "product_name",
"name": "Avaya Aura System Manager",
"product": {
"name": "Avaya Aura System Manager",
"product_id": "T015518",
"product_identification_helper": {
"cpe": "cpe:/a:avaya:aura_system_manager:-"
}
}
},
{
"category": "product_name",
"name": "Avaya Media Gateway",
"product": {
"name": "Avaya Media Gateway",
"product_id": "T015276",
"product_identification_helper": {
"cpe": "cpe:/h:avaya:media_gateway:-"
}
}
},
{
"category": "product_name",
"name": "Avaya Web License Manager",
"product": {
"name": "Avaya Web License Manager",
"product_id": "T016243",
"product_identification_helper": {
"cpe": "cpe:/a:avaya:web_license_manager:-"
}
}
}
],
"category": "vendor",
"name": "Avaya"
},
{
"branches": [
{
"category": "product_name",
"name": "Citrix Systems XenServer",
"product": {
"name": "Citrix Systems XenServer",
"product_id": "T004077",
"product_identification_helper": {
"cpe": "cpe:/a:citrix:xenserver:-"
}
}
}
],
"category": "vendor",
"name": "Citrix Systems"
},
{
"branches": [
{
"category": "product_name",
"name": "Debian Linux",
"product": {
"name": "Debian Linux",
"product_id": "2951",
"product_identification_helper": {
"cpe": "cpe:/o:debian:debian_linux:-"
}
}
}
],
"category": "vendor",
"name": "Debian"
},
{
"branches": [
{
"category": "product_name",
"name": "Dell Computer",
"product": {
"name": "Dell Computer",
"product_id": "T006498",
"product_identification_helper": {
"cpe": "cpe:/o:dell:dell_computer:-"
}
}
}
],
"category": "vendor",
"name": "Dell"
},
{
"branches": [
{
"category": "product_name",
"name": "F5 BIG-IP",
"product": {
"name": "F5 BIG-IP",
"product_id": "T001663",
"product_identification_helper": {
"cpe": "cpe:/a:f5:big-ip:-"
}
}
}
],
"category": "vendor",
"name": "F5"
},
{
"branches": [
{
"category": "product_name",
"name": "FreeBSD Project FreeBSD OS",
"product": {
"name": "FreeBSD Project FreeBSD OS",
"product_id": "4035",
"product_identification_helper": {
"cpe": "cpe:/o:freebsd:freebsd:-"
}
}
}
],
"category": "vendor",
"name": "FreeBSD Project"
},
{
"branches": [
{
"category": "product_name",
"name": "HP BIOS",
"product": {
"name": "HP BIOS",
"product_id": "T007117",
"product_identification_helper": {
"cpe": "cpe:/h:hp:bios:-"
}
}
}
],
"category": "vendor",
"name": "HP"
},
{
"branches": [
{
"category": "product_name",
"name": "HPE ProLiant",
"product": {
"name": "HPE ProLiant",
"product_id": "T009310",
"product_identification_helper": {
"cpe": "cpe:/h:hp:proliant:-"
}
}
}
],
"category": "vendor",
"name": "HPE"
},
{
"branches": [
{
"category": "product_name",
"name": "Intel AMT SDK",
"product": {
"name": "Intel AMT SDK",
"product_id": "T011597",
"product_identification_helper": {
"cpe": "cpe:/a:intel:active_management_technology_software_development_kit:-"
}
}
},
{
"category": "product_name",
"name": "Intel Prozessor",
"product": {
"name": "Intel Prozessor",
"product_id": "T011586",
"product_identification_helper": {
"cpe": "cpe:/h:intel:intel_prozessor:-"
}
}
},
{
"category": "product_name",
"name": "Intel Xeon",
"product": {
"name": "Intel Xeon",
"product_id": "T011286",
"product_identification_helper": {
"cpe": "cpe:/h:intel:xeon:-"
}
}
}
],
"category": "vendor",
"name": "Intel"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c20.1R1",
"product": {
"name": "Juniper Junos Space \u003c20.1R1",
"product_id": "T016874"
}
},
{
"category": "product_version",
"name": "20.1R1",
"product": {
"name": "Juniper Junos Space 20.1R1",
"product_id": "T016874-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:juniper:junos_space:20.1r1"
}
}
}
],
"category": "product_name",
"name": "Junos Space"
}
],
"category": "vendor",
"name": "Juniper"
},
{
"branches": [
{
"category": "product_name",
"name": "NetApp Data ONTAP",
"product": {
"name": "NetApp Data ONTAP",
"product_id": "7654",
"product_identification_helper": {
"cpe": "cpe:/a:netapp:data_ontap:-"
}
}
},
{
"category": "product_name",
"name": "NetApp FAS",
"product": {
"name": "NetApp FAS",
"product_id": "T011540",
"product_identification_helper": {
"cpe": "cpe:/h:netapp:fas:-"
}
}
}
],
"category": "vendor",
"name": "NetApp"
},
{
"branches": [
{
"category": "product_name",
"name": "Open Source Arch Linux",
"product": {
"name": "Open Source Arch Linux",
"product_id": "T013312",
"product_identification_helper": {
"cpe": "cpe:/o:archlinux:archlinux:-"
}
}
},
{
"category": "product_name",
"name": "Open Source CentOS",
"product": {
"name": "Open Source CentOS",
"product_id": "1727",
"product_identification_helper": {
"cpe": "cpe:/o:centos:centos:-"
}
}
},
{
"category": "product_name",
"name": "Open Source Xen",
"product": {
"name": "Open Source Xen",
"product_id": "T000611",
"product_identification_helper": {
"cpe": "cpe:/o:xen:xen:-"
}
}
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c6.0.0",
"product": {
"name": "Open Source libvirt \u003c6.0.0",
"product_id": "712004"
}
},
{
"category": "product_version",
"name": "6.0.0",
"product": {
"name": "Open Source libvirt 6.0.0",
"product_id": "712004-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:libvirt:6.0.0"
}
}
}
],
"category": "product_name",
"name": "libvirt"
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
},
{
"category": "product_name",
"name": "Oracle VM",
"product": {
"name": "Oracle VM",
"product_id": "T011119",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:vm:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server EUS",
"product": {
"name": "Red Hat Enterprise Linux Server EUS",
"product_id": "T015361",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
}
],
"category": "product_name",
"name": "Enterprise Linux"
},
{
"category": "product_name",
"name": "Red Hat Enterprise MRG",
"product": {
"name": "Red Hat Enterprise MRG",
"product_id": "T003513",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_mrg:-"
}
}
},
{
"category": "product_name",
"name": "Red Hat Fedora",
"product": {
"name": "Red Hat Fedora",
"product_id": "T007849",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:fedora:-"
}
}
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
},
{
"branches": [
{
"category": "product_name",
"name": "VMware ESXi",
"product": {
"name": "VMware ESXi",
"product_id": "T009575",
"product_identification_helper": {
"cpe": "cpe:/o:vmware:esxi:-"
}
}
},
{
"category": "product_name",
"name": "VMware Fusion",
"product": {
"name": "VMware Fusion",
"product_id": "T009574",
"product_identification_helper": {
"cpe": "cpe:/a:vmware:fusion:-"
}
}
},
{
"category": "product_name",
"name": "VMware Workstation",
"product": {
"name": "VMware Workstation",
"product_id": "11768",
"product_identification_helper": {
"cpe": "cpe:/a:vmware:workstation:-"
}
}
}
],
"category": "vendor",
"name": "VMware"
},
{
"branches": [
{
"category": "product_name",
"name": "Intel System Management Software",
"product": {
"name": "Intel System Management Software",
"product_id": "T014240",
"product_identification_helper": {
"cpe": "cpe:/a:intel:system_management_software:-"
}
}
}
],
"category": "vendor",
"name": "intel"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-12207",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2018-12207"
},
{
"cve": "CVE-2019-0117",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-0117"
},
{
"cve": "CVE-2019-0123",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-0123"
},
{
"cve": "CVE-2019-0124",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-0124"
},
{
"cve": "CVE-2019-0131",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-0131"
},
{
"cve": "CVE-2019-0151",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-0151"
},
{
"cve": "CVE-2019-0152",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-0152"
},
{
"cve": "CVE-2019-0154",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-0154"
},
{
"cve": "CVE-2019-0155",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-0155"
},
{
"cve": "CVE-2019-0165",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-0165"
},
{
"cve": "CVE-2019-0166",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-0166"
},
{
"cve": "CVE-2019-0168",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-0168"
},
{
"cve": "CVE-2019-0169",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-0169"
},
{
"cve": "CVE-2019-0184",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-0184"
},
{
"cve": "CVE-2019-0185",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-0185"
},
{
"cve": "CVE-2019-11086",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11086"
},
{
"cve": "CVE-2019-11087",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11087"
},
{
"cve": "CVE-2019-11088",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11088"
},
{
"cve": "CVE-2019-11089",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11089"
},
{
"cve": "CVE-2019-11090",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11090"
},
{
"cve": "CVE-2019-11097",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11097"
},
{
"cve": "CVE-2019-11100",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11100"
},
{
"cve": "CVE-2019-11101",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11101"
},
{
"cve": "CVE-2019-11102",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11102"
},
{
"cve": "CVE-2019-11103",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11103"
},
{
"cve": "CVE-2019-11104",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11104"
},
{
"cve": "CVE-2019-11105",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11105"
},
{
"cve": "CVE-2019-11106",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11106"
},
{
"cve": "CVE-2019-11107",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11107"
},
{
"cve": "CVE-2019-11108",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11108"
},
{
"cve": "CVE-2019-11109",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11109"
},
{
"cve": "CVE-2019-11110",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11110"
},
{
"cve": "CVE-2019-11111",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11111"
},
{
"cve": "CVE-2019-11112",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11112"
},
{
"cve": "CVE-2019-11113",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11113"
},
{
"cve": "CVE-2019-11131",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11131"
},
{
"cve": "CVE-2019-11132",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11132"
},
{
"cve": "CVE-2019-11135",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11135"
},
{
"cve": "CVE-2019-11136",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11136"
},
{
"cve": "CVE-2019-11137",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11137"
},
{
"cve": "CVE-2019-11139",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11139"
},
{
"cve": "CVE-2019-11147",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-11147"
},
{
"cve": "CVE-2019-14574",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-14574"
},
{
"cve": "CVE-2019-14590",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-14590"
},
{
"cve": "CVE-2019-14591",
"product_status": {
"known_affected": [
"T004077",
"T006498",
"67646",
"4035",
"T007849",
"T011540",
"T011286",
"T015127",
"T011586",
"T015126",
"T016874",
"T004914",
"11768",
"T015361",
"T000611",
"T001663",
"T011119",
"T015518",
"T007117",
"7654",
"T003513",
"T013312",
"T011597",
"T015276",
"T016243",
"T014240",
"2951",
"T002207",
"T000126",
"712004",
"1727",
"T009575",
"T009310",
"T009574"
]
},
"release_date": "2019-11-12T23:00:00.000+00:00",
"title": "CVE-2019-14591"
}
]
}
fkie_cve-2018-12207
Vulnerability from fkie_nvd
| URL | Tags | ||
|---|---|---|---|
| secure@intel.com | http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00042.html | Mailing List, Third Party Advisory | |
| secure@intel.com | https://access.redhat.com/errata/RHSA-2019:3916 | Third Party Advisory | |
| secure@intel.com | https://access.redhat.com/errata/RHSA-2019:3936 | Third Party Advisory | |
| secure@intel.com | https://access.redhat.com/errata/RHSA-2019:3941 | Third Party Advisory | |
| secure@intel.com | https://access.redhat.com/errata/RHSA-2020:0026 | Third Party Advisory | |
| secure@intel.com | https://access.redhat.com/errata/RHSA-2020:0028 | Third Party Advisory | |
| secure@intel.com | https://access.redhat.com/errata/RHSA-2020:0204 | Third Party Advisory | |
| secure@intel.com | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I5WWPW4BSZDDW7VHU427XTVXV7ROOFFW/ | ||
| secure@intel.com | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IZYATWNUGHRBG6I3TC24YHP5Y3J7I6KH/ | ||
| secure@intel.com | https://seclists.org/bugtraq/2020/Jan/21 | Mailing List, Third Party Advisory | |
| secure@intel.com | https://security.gentoo.org/glsa/202003-56 | Third Party Advisory | |
| secure@intel.com | https://support.f5.com/csp/article/K17269881?utm_source=f5support&%3Butm_medium=RSS | ||
| secure@intel.com | https://usn.ubuntu.com/4186-2/ | Third Party Advisory | |
| secure@intel.com | https://www.debian.org/security/2020/dsa-4602 | Third Party Advisory | |
| secure@intel.com | https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html | Vendor Advisory | |
| secure@intel.com | https://www.oracle.com/security-alerts/cpujul2020.html | Patch, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00042.html | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2019:3916 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2019:3936 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2019:3941 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2020:0026 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2020:0028 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2020:0204 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I5WWPW4BSZDDW7VHU427XTVXV7ROOFFW/ | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IZYATWNUGHRBG6I3TC24YHP5Y3J7I6KH/ | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://seclists.org/bugtraq/2020/Jan/21 | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://security.gentoo.org/glsa/202003-56 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://support.f5.com/csp/article/K17269881?utm_source=f5support&%3Butm_medium=RSS | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/4186-2/ | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.debian.org/security/2020/dsa-4602 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.oracle.com/security-alerts/cpujul2020.html | Patch, Third Party Advisory |
| Vendor | Product | Version | |
|---|---|---|---|
| intel | core_i3-10110u_firmware | - | |
| intel | core_i3-10110u | - | |
| intel | core_i3-10110y_firmware | - | |
| intel | core_i3-10110y | - | |
| intel | core_i3-1005g1_firmware | - | |
| intel | core_i3-1005g1 | - | |
| intel | core_i3-9300t_firmware | - | |
| intel | core_i3-9300t | - | |
| intel | core_i3-9300_firmware | - | |
| intel | core_i3-9300 | - | |
| intel | core_i3-9100_firmware | - | |
| intel | core_i3-9100 | - | |
| intel | core_i3-9100t_firmware | - | |
| intel | core_i3-9100t | - | |
| intel | core_i3-9350k_firmware | - | |
| intel | core_i3-9350k | - | |
| intel | core_i3-9320_firmware | - | |
| intel | core_i3-9320 | - | |
| intel | core_i3-8145u_firmware | - | |
| intel | core_i3-8145u | - | |
| intel | core_i3-8300_firmware | - | |
| intel | core_i3-8300 | - | |
| intel | core_i3-8100t_firmware | - | |
| intel | core_i3-8100t | - | |
| intel | core_i3-8300t_firmware | - | |
| intel | core_i3-8300t | - | |
| intel | core_i3-8109u_firmware | - | |
| intel | core_i3-8109u | - | |
| intel | core_i3-8130u_firmware | - | |
| intel | core_i3-8130u | - | |
| intel | core_i3-8100_firmware | - | |
| intel | core_i3-8100 | - | |
| intel | core_i3-8350k_firmware | - | |
| intel | core_i3-8350k | - | |
| intel | core_i3-7100_firmware | - | |
| intel | core_i3-7100 | - | |
| intel | core_i3-7350k_firmware | - | |
| intel | core_i3-7350k | - | |
| intel | core_i3-7300t_firmware | - | |
| intel | core_i3-7300t | - | |
| intel | core_i3-7167u_firmware | - | |
| intel | core_i3-7167u | - | |
| intel | core_i3-7300_firmware | - | |
| intel | core_i3-7300 | - | |
| intel | core_i3-7100h_firmware | - | |
| intel | core_i3-7100h | - | |
| intel | core_i3-7320_firmware | - | |
| intel | core_i3-7320 | - | |
| intel | core_i3-7100t_firmware | - | |
| intel | core_i3-7100t | - | |
| intel | core_i3-7100u_firmware | - | |
| intel | core_i3-7100u | - | |
| intel | core_i3-6100u_firmware | - | |
| intel | core_i3-6100u | - | |
| intel | core_i3-6100h_firmware | - | |
| intel | core_i3-6100h | - | |
| intel | core_i3-6167u_firmware | - | |
| intel | core_i3-6167u | - | |
| intel | core_i3-6100_firmware | - | |
| intel | core_i3-6100 | - | |
| intel | core_i3-5015u_firmware | - | |
| intel | core_i3-5015u | - | |
| intel | core_i3-5020u_firmware | - | |
| intel | core_i3-5020u | - | |
| intel | core_i3-5005u_firmware | - | |
| intel | core_i3-5005u | - | |
| intel | core_i3-5010u_firmware | - | |
| intel | core_i3-5010u | - | |
| intel | core_i3-5157u_firmware | - | |
| intel | core_i3-5157u | - | |
| intel | core_i5-10210u_firmware | - | |
| intel | core_i5-10210u | - | |
| intel | core_i5-10310y_firmware | - | |
| intel | core_i5-10310y | - | |
| intel | core_i5-10210y_firmware | - | |
| intel | core_i5-10210y | - | |
| intel | core_i5-1035g4_firmware | - | |
| intel | core_i5-1035g4 | - | |
| intel | core_i5-1035g7_firmware | - | |
| intel | core_i5-1035g7 | - | |
| intel | core_i5-1035g1_firmware | - | |
| intel | core_i5-1035g1 | - | |
| intel | core_i5-9500_firmware | - | |
| intel | core_i5-9500 | - | |
| intel | core_i5-9600_firmware | - | |
| intel | core_i5-9600 | - | |
| intel | core_i5-9400t_firmware | - | |
| intel | core_i5-9400t | - | |
| intel | core_i5-9600t_firmware | - | |
| intel | core_i5-9600t | - | |
| intel | core_i5-9500t_firmware | - | |
| intel | core_i5-9500t | - | |
| intel | core_i5-9300h_firmware | - | |
| intel | core_i5-9300h | - | |
| intel | core_i5-9400h_firmware | - | |
| intel | core_i5-9400h | - | |
| intel | core_i5-9400_firmware | - | |
| intel | core_i5-9400 | - | |
| intel | core_i5-9600k_firmware | - | |
| intel | core_i5-9600k | - | |
| intel | core_i5-8265u_firmware | - | |
| intel | core_i5-8265u | - | |
| intel | core_i5-8200y_firmware | - | |
| intel | core_i5-8200y | - | |
| intel | core_i5-8400t_firmware | - | |
| intel | core_i5-8400t | - | |
| intel | core_i5-8300h_firmware | - | |
| intel | core_i5-8300h | - | |
| intel | core_i5-8259u_firmware | - | |
| intel | core_i5-8259u | - | |
| intel | core_i5-8269u_firmware | - | |
| intel | core_i5-8269u | - | |
| intel | core_i5-8700b_firmware | - | |
| intel | core_i5-8700b | - | |
| intel | core_i5-8400b_firmware | - | |
| intel | core_i5-8400b | - | |
| intel | core_i5-8500b_firmware | - | |
| intel | core_i5-8500b | - | |
| intel | core_i5\+8500_firmware | - | |
| intel | core_i5\+8500 | - | |
| intel | core_i5\+8400_firmware | - | |
| intel | core_i5\+8400 | - | |
| intel | core_i5-8305g_firmware | - | |
| intel | core_i5-8305g | - | |
| intel | core_i5-8400_firmware | - | |
| intel | core_i5-8400 | - | |
| intel | core_i5-8250u_firmware | - | |
| intel | core_i5-8250u | - | |
| intel | core_i5-8350u_firmware | - | |
| intel | core_i5-8350u | - | |
| intel | core_i5-7400_firmware | - | |
| intel | core_i5-7400 | - | |
| intel | core_i5-7500t_firmware | - | |
| intel | core_i5-7500t | - | |
| intel | core_i5-7600t_firmware | - | |
| intel | core_i5-7600t | - | |
| intel | core_i5-7400t_firmware | - | |
| intel | core_i5-7400t | - | |
| intel | core_i5-7600_firmware | - | |
| intel | core_i5-7600 | - | |
| intel | core_i5-7500_firmware | - | |
| intel | core_i5-7500 | - | |
| intel | core_i5-7300hq_firmware | - | |
| intel | core_i5-7300hq | - | |
| intel | core_i5-7267u_firmware | - | |
| intel | core_i5-7267u | - | |
| intel | core_i5-7600k_firmware | - | |
| intel | core_i5-7600k | - | |
| intel | core_i5-7260u_firmware | - | |
| intel | core_i5-7260u | - | |
| intel | core_i5-7440hq_firmware | - | |
| intel | core_i5-7440hq | - | |
| intel | core_i5-7287u_firmware | - | |
| intel | core_i5-7287u | - | |
| intel | core_i5-7360u_firmware | - | |
| intel | core_i5-7360u | - | |
| intel | core_i5-7200u_firmware | - | |
| intel | core_i5-7200u | - | |
| intel | core_i5-7y54_firmware | - | |
| intel | core_i5-7y54 | - | |
| intel | core_i5-6350hq_firmware | - | |
| intel | core_i5-6350hq | - | |
| intel | core_i5-6200u_firmware | - | |
| intel | core_i5-6200u | - | |
| intel | core_i5-6300hq_firmware | - | |
| intel | core_i5-6300hq | - | |
| intel | core_i5-6287u_firmware | - | |
| intel | core_i5-6287u | - | |
| intel | core_i5-6267u_firmware | - | |
| intel | core_i5-6267u | - | |
| intel | core_i5-6260u_firmware | - | |
| intel | core_i5-6260u | - | |
| intel | core_i5-5350h_firmware | - | |
| intel | core_i5-5350h | - | |
| intel | core_i5-5200u_firmware | - | |
| intel | core_i5-5200u | - | |
| intel | core_i5-5287u_firmware | - | |
| intel | core_i5-5287u | - | |
| intel | core_i5-5250u_firmware | - | |
| intel | core_i5-5250u | - | |
| intel | core_i5-5257u_firmware | - | |
| intel | core_i5-5257u | - | |
| intel | core_i7-10510u_firmware | - | |
| intel | core_i7-10510u | - | |
| intel | core_i7-10510y_firmware | - | |
| intel | core_i7-10510y | - | |
| intel | core_i7-10710u_firmware | - | |
| intel | core_i7-10710u | - | |
| intel | core_i7-1065g7_firmware | - | |
| intel | core_i7-1065g7 | - | |
| intel | core_i7-9700t_firmware | - | |
| intel | core_i7-9700t | - | |
| intel | core_i7-9700_firmware | - | |
| intel | core_i7-9700 | - | |
| intel | core_i7-9750h_firmware | - | |
| intel | core_i7-9750h | - | |
| intel | core_i7-9850h_firmware | - | |
| intel | core_i7-9850h | - | |
| intel | core_i7-9700k_firmware | - | |
| intel | core_i7-9700k | - | |
| intel | core_i7-8565u_firmware | - | |
| intel | core_i7-8565u | - | |
| intel | core_i7-8500y_firmware | - | |
| intel | core_i7-8500y | - | |
| intel | core_i7-8086k_firmware | - | |
| intel | core_i7-8086k | - | |
| intel | core_i7-8750h_firmware | - | |
| intel | core_i7-8750h | - | |
| intel | core_i7-8559u_firmware | - | |
| intel | core_i7-8559u | - | |
| intel | core_i7\+8700_firmware | - | |
| intel | core_i7\+8700 | - | |
| intel | core_i7-8709g_firmware | - | |
| intel | core_i7-8709g | - | |
| intel | core_i7-8809g_firmware | - | |
| intel | core_i7-8809g | - | |
| intel | core_i7-8705g_firmware | - | |
| intel | core_i7-8705g | - | |
| intel | core_i7-8706g_firmware | - | |
| intel | core_i7-8706g | - | |
| intel | core_i7-8550u_firmware | - | |
| intel | core_i7-8550u | - | |
| intel | core_i7-8650u_firmware | - | |
| intel | core_i7-8650u | - | |
| intel | core_i7-7700t_firmware | - | |
| intel | core_i7-7700t | - | |
| intel | core_i7-7820hk_firmware | - | |
| intel | core_i7-7820hk | - | |
| intel | core_i7-7700hq_firmware | - | |
| intel | core_i7-7700hq | - | |
| intel | core_i7-7660u_firmware | - | |
| intel | core_i7-7660u | - | |
| intel | core_i7-7560u_firmware | - | |
| intel | core_i7-7560u | - | |
| intel | core_i7-7700_firmware | - | |
| intel | core_i7-7700 | - | |
| intel | core_i7-7567u_firmware | - | |
| intel | core_i7-7567u | - | |
| intel | core_i7-7700k_firmware | - | |
| intel | core_i7-7700k | - | |
| intel | core_i7-7920hq_firmware | - | |
| intel | core_i7-7920hq | - | |
| intel | core_i7-7820hq_firmware | - | |
| intel | core_i7-7820hq | - | |
| intel | core_i7-7500u_firmware | - | |
| intel | core_i7-7500u | - | |
| intel | core_i7-6970hq_firmware | - | |
| intel | core_i7-6970hq | - | |
| intel | core_i7-6870hq_firmware | - | |
| intel | core_i7-6870hq | - | |
| intel | core_i7-6770hq_firmware | - | |
| intel | core_i7-6770hq | - | |
| intel | core_i7-6500u_firmware | - | |
| intel | core_i7-6500u | - | |
| intel | core_i7-6700hq_firmware | - | |
| intel | core_i7-6700hq | - | |
| intel | core_i7-6820hk_firmware | - | |
| intel | core_i7-6820hk | - | |
| intel | core_i7-6560u_firmware | - | |
| intel | core_i7-6560u | - | |
| intel | core_i7-6567u_firmware | - | |
| intel | core_i7-6567u | - | |
| intel | core_i7-5850hq_firmware | - | |
| intel | core_i7-5850hq | - | |
| intel | core_i7-5950hq_firmware | - | |
| intel | core_i7-5950hq | - | |
| intel | core_i7-5775c_firmware | - | |
| intel | core_i7-5775c | - | |
| intel | core_i7-5700hq_firmware | - | |
| intel | core_i7-5700hq | - | |
| intel | core_i7-5750hq_firmware | - | |
| intel | core_i7-5750hq | - | |
| intel | core_i7-5500u_firmware | - | |
| intel | core_i7-5500u | - | |
| intel | core_i7-5550u_firmware | - | |
| intel | core_i7-5550u | - | |
| intel | core_i7-5557u_firmware | - | |
| intel | core_i7-5557u | - | |
| intel | core_m3-8100y_firmware | - | |
| intel | core_m3-8100y | - | |
| intel | core_m3-7y30_firmware | - | |
| intel | core_m3-7y30 | - | |
| intel | core_m3-6y54_firmware | - | |
| intel | core_m3-6y54 | - | |
| intel | core_m3-6y30_firmware | - | |
| intel | core_m3-6y30 | - | |
| intel | core_m-5y31_firmware | - | |
| intel | core_m-5y31 | - | |
| intel | core_m-5y51_firmware | - | |
| intel | core_m-5y51 | - | |
| intel | core_m-5y10c_firmware | - | |
| intel | core_m-5y10c | - | |
| intel | core_m-5y10_firmware | - | |
| intel | core_m-5y10 | - | |
| intel | core_m-5y10a_firmware | - | |
| intel | core_m-5y10a | - | |
| intel | core_m-5y71_firmware | - | |
| intel | core_m-5y71 | - | |
| intel | core_m-5y70_firmware | - | |
| intel | core_m-5y70 | - | |
| intel | core_m-5y10c_firmware | - | |
| intel | core_m-5y10c | - | |
| intel | core_i9-10980xe_firmware | - | |
| intel | core_i9-10980xe | - | |
| intel | core_i9-10900x_x-series_firmware | - | |
| intel | core_i9-10900x_x-series | - | |
| intel | core_i9-10920x_x-series_firmware | - | |
| intel | core_i9-10920x_x-series | - | |
| intel | core_i9-10940x_x-series_firmware | - | |
| intel | core_i9-10940x_x-series | - | |
| intel | core_i9-9900x_x-series_firmware | - | |
| intel | core_i9-9900x_x-series | - | |
| intel | core_i9-9920x_x-series_firmware | - | |
| intel | core_i9-9920x_x-series | - | |
| intel | core_i9-9960x_x-series_firmware | - | |
| intel | core_i9-9960x_x-series | - | |
| intel | core_i9-9980xe_firmware | - | |
| intel | core_i9-9980xe | - | |
| intel | core_i9-9940x_x-series_firmware | - | |
| intel | core_i9-9940x_x-series | - | |
| intel | core_i9-7960x_firmware | - | |
| intel | core_i9-7960x | - | |
| intel | core_i9-7940x_firmware | - | |
| intel | core_i9-7940x | - | |
| intel | core_i9-7980xe_firmware | - | |
| intel | core_i9-7980xe | - | |
| intel | core_i9-7920x_firmware | - | |
| intel | core_i9-7920x | - | |
| intel | core_i9-7900x_firmware | - | |
| intel | core_i9-7900x | - | |
| intel | core_i7-7820x_firmware | - | |
| intel | core_i7-7820x | - | |
| intel | core_i7-7800x_firmware | - | |
| intel | core_i7-7800x | - | |
| intel | pentium_gold_g5620_firmware | - | |
| intel | pentium_gold_g5620 | - | |
| intel | pentium_gold_g5600t_firmware | - | |
| intel | pentium_gold_g5600t | - | |
| intel | pentium_gold_g5600_firmware | - | |
| intel | pentium_gold_g5600 | - | |
| intel | pentium_gold_g5500t_firmware | - | |
| intel | pentium_gold_g5500t | - | |
| intel | pentium_gold_g5500_firmware | - | |
| intel | pentium_gold_g5500 | - | |
| intel | pentium_gold_g5420t_firmware | - | |
| intel | pentium_gold_g5420t | - | |
| intel | pentium_gold_g5420_firmware | - | |
| intel | pentium_gold_g5420 | - | |
| intel | pentium_gold_6405u_firmware | - | |
| intel | pentium_gold_6405u | - | |
| intel | pentium_gold_5405u_firmware | - | |
| intel | pentium_gold_5405u | - | |
| intel | pentium_gold_g5400t_firmware | - | |
| intel | pentium_gold_g5400t | - | |
| intel | pentium_gold_g5400_firmware | - | |
| intel | pentium_gold_g5400 | - | |
| intel | pentium_gold_4425y_firmware | - | |
| intel | pentium_gold_4425y | - | |
| intel | pentium_gold_4417u_firmware | - | |
| intel | pentium_gold_4417u | - | |
| intel | pentium_gold_4415u_firmware | - | |
| intel | pentium_gold_4415u | - | |
| intel | pentium_gold_4415y_firmware | - | |
| intel | pentium_gold_4415y | - | |
| intel | pentium_gold_4410y_firmware | - | |
| intel | pentium_gold_4410y | - | |
| intel | celeron_g4950_firmware | - | |
| intel | celeron_g4950 | - | |
| intel | celeron_g4932e_firmware | - | |
| intel | celeron_g4932e | - | |
| intel | celeron_g4930t_firmware | - | |
| intel | celeron_g4930t | - | |
| intel | celeron_g4930e_firmware | - | |
| intel | celeron_g4930e | - | |
| intel | celeron_g4930_firmware | - | |
| intel | celeron_g4930 | - | |
| intel | celeron_g4920_firmware | - | |
| intel | celeron_g4920 | - | |
| intel | celeron_g4900t_firmware | - | |
| intel | celeron_g4900t | - | |
| intel | celeron_g4900_firmware | - | |
| intel | celeron_g4900 | - | |
| intel | celeron_g3950_firmware | - | |
| intel | celeron_g3950 | - | |
| intel | celeron_g3930te_firmware | - | |
| intel | celeron_g3930te | - | |
| intel | celeron_g3930t_firmware | - | |
| intel | celeron_g3930t | - | |
| intel | celeron_g3930e_firmware | - | |
| intel | celeron_g3930e | - | |
| intel | celeron_g3930_firmware | - | |
| intel | celeron_g3930 | - | |
| intel | celeron_g3920_firmware | - | |
| intel | celeron_g3920 | - | |
| intel | celeron_g3902e_firmware | - | |
| intel | celeron_g3902e | - | |
| intel | celeron_g3900te_firmware | - | |
| intel | celeron_g3900te | - | |
| intel | celeron_g3900e_firmware | - | |
| intel | celeron_g3900e | - | |
| intel | celeron_g3900t_firmware | - | |
| intel | celeron_g3900t | - | |
| intel | celeron_g3900_firmware | - | |
| intel | celeron_g3900 | - | |
| intel | celeron_g1850_firmware | - | |
| intel | celeron_g1850 | - | |
| intel | celeron_g1840t_firmware | - | |
| intel | celeron_g1840t | - | |
| intel | celeron_g1840_firmware | - | |
| intel | celeron_g1840 | - | |
| intel | celeron_g1830_firmware | - | |
| intel | celeron_g1830 | - | |
| intel | celeron_g1820te_firmware | - | |
| intel | celeron_g1820te | - | |
| intel | celeron_g1820t_firmware | - | |
| intel | celeron_g1820t | - | |
| intel | celeron_g1630_firmware | - | |
| intel | celeron_g1630 | - | |
| intel | celeron_g1820_firmware | - | |
| intel | celeron_g1820 | - | |
| intel | celeron_g1620t_firmware | - | |
| intel | celeron_g1620t | - | |
| intel | celeron_g1620_firmware | - | |
| intel | celeron_g1620 | - | |
| intel | celeron_g1610t_firmware | - | |
| intel | celeron_g1610t | - | |
| intel | celeron_g1610_firmware | - | |
| intel | celeron_g1610 | - | |
| intel | xeon_platinum_9282_firmware | - | |
| intel | xeon_platinum_9282 | - | |
| intel | xeon_platinum_9242_firmware | - | |
| intel | xeon_platinum_9242 | - | |
| intel | xeon_platinum_9222_firmware | - | |
| intel | xeon_platinum_9222 | - | |
| intel | xeon_platinum_9221_firmware | - | |
| intel | xeon_platinum_9221 | - | |
| intel | xeon_platinum_8280m_firmware | - | |
| intel | xeon_platinum_8280m | - | |
| intel | xeon_platinum_8280l_firmware | - | |
| intel | xeon_platinum_8280l | - | |
| intel | xeon_platinum_8280_firmware | - | |
| intel | xeon_platinum_8280 | - | |
| intel | xeon_platinum_8276m_firmware | - | |
| intel | xeon_platinum_8276m | - | |
| intel | xeon_platinum_8276l_firmware | - | |
| intel | xeon_platinum_8276l | - | |
| intel | xeon_platinum_8276_firmware | - | |
| intel | xeon_platinum_8276 | - | |
| intel | xeon_platinum_8270_firmware | - | |
| intel | xeon_platinum_8270 | - | |
| intel | xeon_platinum_8268_firmware | - | |
| intel | xeon_platinum_8268 | - | |
| intel | xeon_platinum_8260y_firmware | - | |
| intel | xeon_platinum_8260y | - | |
| intel | xeon_platinum_8260m_firmware | - | |
| intel | xeon_platinum_8260m | - | |
| intel | xeon_platinum_8260l_firmware | - | |
| intel | xeon_platinum_8260l | - | |
| intel | xeon_platinum_8260_firmware | - | |
| intel | xeon_platinum_8260 | - | |
| intel | xeon_platinum_8256_firmware | - | |
| intel | xeon_platinum_8256 | - | |
| intel | xeon_platinum_8253_firmware | - | |
| intel | xeon_platinum_8253 | - | |
| intel | xeon_gold_6262v_firmware | - | |
| intel | xeon_gold_6262v | - | |
| intel | xeon_gold_6254_firmware | - | |
| intel | xeon_gold_6254 | - | |
| intel | xeon_gold_6252n_firmware | - | |
| intel | xeon_gold_6252n | - | |
| intel | xeon_gold_6252_firmware | - | |
| intel | xeon_gold_6252 | - | |
| intel | xeon_gold_6248_firmware | - | |
| intel | xeon_gold_6248 | - | |
| intel | xeon_gold_6246_firmware | - | |
| intel | xeon_gold_6246 | - | |
| intel | xeon_gold_6244_firmware | - | |
| intel | xeon_gold_6244 | - | |
| intel | xeon_gold_6242_firmware | - | |
| intel | xeon_gold_6242 | - | |
| intel | xeon_gold_6240y_firmware | - | |
| intel | xeon_gold_6240y_ | - | |
| intel | xeon_gold_6240m_firmware | - | |
| intel | xeon_gold_6240m | - | |
| intel | xeon_gold_6240l_firmware | - | |
| intel | xeon_gold_6240l | - | |
| intel | xeon_gold_6240_firmware | - | |
| intel | xeon_gold_6240 | - | |
| intel | xeon_gold_6238t_firmware | - | |
| intel | xeon_gold_6238t | - | |
| intel | xeon_gold_6238m_firmware | - | |
| intel | xeon_gold_6238m | - | |
| intel | xeon_gold_6238l_firmware | - | |
| intel | xeon_gold_6238l | - | |
| intel | xeon_gold_6238_firmware | - | |
| intel | xeon_gold_6238 | - | |
| intel | xeon_gold_6234_firmware | - | |
| intel | xeon_gold_6234 | - | |
| intel | xeon_gold_6230t_firmware | - | |
| intel | xeon_gold_6230t | - | |
| intel | xeon_gold_6230n_firmware | - | |
| intel | xeon_gold_6230n | - | |
| intel | xeon_gold_6230_firmware | - | |
| intel | xeon_gold_6230 | - | |
| intel | xeon_gold_6226_firmware | - | |
| intel | xeon_gold_6226 | - | |
| intel | xeon_gold_6222v_firmware | - | |
| intel | xeon_gold_6222v | - | |
| intel | xeon_gold_5222_firmware | - | |
| intel | xeon_gold_5222 | - | |
| intel | xeon_gold_5220t_firmware | - | |
| intel | xeon_gold_5220t_ | - | |
| intel | xeon_gold_5220s_firmware | - | |
| intel | xeon_gold_5220s | - | |
| intel | xeon_gold_5220_firmware | - | |
| intel | xeon_gold_5220 | - | |
| intel | xeon_gold_5218t_firmware | - | |
| intel | xeon_gold_5218t_ | - | |
| intel | xeon_gold_5218n_firmware | - | |
| intel | xeon_gold_5218n | - | |
| intel | xeon_gold_5218b_firmware | - | |
| intel | xeon_gold_5218b | - | |
| intel | xeon_gold_5218_firmware | - | |
| intel | xeon_gold_5218 | - | |
| intel | xeon_gold_5217_firmware | - | |
| intel | xeon_gold_5217 | - | |
| intel | xeon_gold_5215m_firmware | - | |
| intel | xeon_gold_5215m | - | |
| intel | xeon_gold_5215l_firmware | - | |
| intel | xeon_gold_5215l | - | |
| intel | xeon_gold_5215_firmware | - | |
| intel | xeon_gold_5215 | - | |
| intel | xeon_silver_4216_firmware | - | |
| intel | xeon_silver_4216 | - | |
| intel | xeon_silver_4215_firmware | - | |
| intel | xeon_silver_4215 | - | |
| intel | xeon_silver_4214y_firmware | - | |
| intel | xeon_silver_4214y | - | |
| intel | xeon_silver_4214_firmware | - | |
| intel | xeon_silver_4214 | - | |
| intel | xeon_silver_4210_firmware | - | |
| intel | xeon_silver_4210 | - | |
| intel | xeon_silver_4209t_firmware | - | |
| intel | xeon_silver_4209t | - | |
| intel | xeon_silver_4208_firmware | - | |
| intel | xeon_silver_4208 | - | |
| intel | xeon_bronze_3204_firmware | - | |
| intel | xeon_bronze_3204 | - | |
| intel | xeon_e7-8890_v4_firmware | - | |
| intel | xeon_e7-8890_v4 | - | |
| intel | xeon_e7-8893_v4_firmware | - | |
| intel | xeon_e7-8893_v4 | - | |
| intel | xeon_e7-8880_v4_firmware | - | |
| intel | xeon_e7-8880_v4 | - | |
| intel | xeon_e7-4830_v4_firmware | - | |
| intel | xeon_e7-4830_v4 | - | |
| intel | xeon_e7-8860_v4_firmware | - | |
| intel | xeon_e7-8860_v4 | - | |
| intel | xeon_e7-4809_v4_firmware | - | |
| intel | xeon_e7-4809_v4 | - | |
| intel | xeon_e7-8870_v4_firmware | - | |
| intel | xeon_e7-8870_v4 | - | |
| intel | xeon_e7-4820_v4_firmware | - | |
| intel | xeon_e7-4820_v4 | - | |
| intel | xeon_e7-8891_v4_firmware | - | |
| intel | xeon_e7-8891_v4 | - | |
| intel | xeon_e7-8867_v4_firmware | - | |
| intel | xeon_e7-8867_v4 | - | |
| intel | xeon_e7-4850_v4_firmware | - | |
| intel | xeon_e7-4850_v4 | - | |
| intel | xeon_e7-8855_v4_firmware | - | |
| intel | xeon_e7-8855_v4 | - | |
| intel | xeon_e7-8860_v3_firmware | - | |
| intel | xeon_e7-8860_v3 | - | |
| intel | xeon_e7-8867_v3_firmware | - | |
| intel | xeon_e7-8867_v3 | - | |
| intel | xeon_e7-8870_v3_firmware | - | |
| intel | xeon_e7-8870_v3 | - | |
| intel | xeon_e7-8880_v3_firmware | - | |
| intel | xeon_e7-8880_v3 | - | |
| intel | xeon_e7-8880l_v3_firmware | - | |
| intel | xeon_e7-8880l_v3 | - | |
| intel | xeon_e7-4809_v3_firmware | - | |
| intel | xeon_e7-4809_v3 | - | |
| intel | xeon_e7-8890_v3_firmware | - | |
| intel | xeon_e7-8890_v3 | - | |
| intel | xeon_e7-4820_v3_firmware | - | |
| intel | xeon_e7-4820_v3 | - | |
| intel | xeon_e7-8891_v3_firmware | - | |
| intel | xeon_e7-8891_v3 | - | |
| intel | xeon_e7-4830_v3_firmware | - | |
| intel | xeon_e7-4830_v3 | - | |
| intel | xeon_e7-4850_v3_firmware | - | |
| intel | xeon_e7-4850_v3 | - | |
| intel | xeon_e7-8893_v3_firmware | - | |
| intel | xeon_e7-8893_v3 | - | |
| intel | xeon_e7-4809_v2_firmware | - | |
| intel | xeon_e7-4809_v2 | - | |
| intel | xeon_e7-8880l_v2_firmware | - | |
| intel | xeon_e7-8880l_v2 | - | |
| intel | xeon_e7-8880_v2_firmware | - | |
| intel | xeon_e7-8880_v2 | - | |
| intel | xeon_e7-4820_v2_firmware | - | |
| intel | xeon_e7-4820_v2 | - | |
| intel | xeon_e7-8890_v2_firmware | - | |
| intel | xeon_e7-8890_v2 | - | |
| intel | xeon_e7-8891_v2_firmware | - | |
| intel | xeon_e7-8891_v2 | - | |
| intel | xeon_e7-2850_v2_firmware | - | |
| intel | xeon_e7-2850_v2 | - | |
| intel | xeon_e7-4830_v2_firmware | - | |
| intel | xeon_e7-4830_v2 | - | |
| intel | xeon_e7-8893_v2_firmware | - | |
| intel | xeon_e7-8893_v2 | - | |
| intel | xeon_e7-2870_v2_firmware | - | |
| intel | xeon_e7-2870_v2 | - | |
| intel | xeon_e7-4850_v2_firmware | - | |
| intel | xeon_e7-4850_v2 | - | |
| intel | xeon_e7-2880_v2_firmware | - | |
| intel | xeon_e7-2880_v2 | - | |
| intel | xeon_e7-2890_v2_firmware | - | |
| intel | xeon_e7-2890_v2 | - | |
| intel | xeon_e7-4860_v2_firmware | - | |
| intel | xeon_e7-4860_v2 | - | |
| intel | xeon_e7-4870_v2_firmware | - | |
| intel | xeon_e7-4870_v2 | - | |
| intel | xeon_e7-4890_v2_firmware | - | |
| intel | xeon_e7-4890_v2 | - | |
| intel | xeon_e7-8850_v2_firmware | - | |
| intel | xeon_e7-8850_v2 | - | |
| intel | xeon_e7-8857_v2_firmware | - | |
| intel | xeon_e7-8857_v2 | - | |
| intel | xeon_e7-8870_v2_firmware | - | |
| intel | xeon_e7-8870_v2 | - | |
| intel | xeon_e7-4880_v2_firmware | - | |
| intel | xeon_e7-4880_v2 | - | |
| intel | xeon_e7-8895_v2_firmware | - | |
| intel | xeon_e7-8895_v2 | - | |
| intel | xeon_e5-2699a_v4_firmware | - | |
| intel | xeon_e5-2699a_v4 | - | |
| intel | xeon_e5-4627_v4_firmware | - | |
| intel | xeon_e5-4627_v4 | - | |
| intel | xeon_e5-4610a_v4_firmware | - | |
| intel | xeon_e5-4610a_v4 | - | |
| intel | xeon_e5-4620_v4_firmware | - | |
| intel | xeon_e5-4620_v4 | - | |
| intel | xeon_e5-4628l_v4_firmware | - | |
| intel | xeon_e5-4628l_v4 | - | |
| intel | xeon_e5-4660_v4_firmware | - | |
| intel | xeon_e5-4660_v4 | - | |
| intel | xeon_e5-4640_v4_firmware | - | |
| intel | xeon_e5-4640_v4 | - | |
| intel | xeon_e5-4669_v4_firmware | - | |
| intel | xeon_e5-4669_v4 | - | |
| intel | xeon_e5-4667_v4_firmware | - | |
| intel | xeon_e5-4667_v4 | - | |
| intel | xeon_e5-4655_v4_firmware | - | |
| intel | xeon_e5-4655_v4 | - | |
| intel | xeon_e5-4650_v4_firmware | - | |
| intel | xeon_e5-4650_v4 | - | |
| intel | xeon_e5-1660_v4_firmware | - | |
| intel | xeon_e5-1660_v4 | - | |
| intel | xeon_e5-1630_v4_firmware | - | |
| intel | xeon_e5-1630_v4 | - | |
| intel | xeon_e5-1620_v4_firmware | - | |
| intel | xeon_e5-1620_v4 | - | |
| intel | xeon_e5-1680_v4_firmware | - | |
| intel | xeon_e5-1680_v4 | - | |
| intel | xeon_e5-1650_v4_firmware | - | |
| intel | xeon_e5-1650_v4 | - | |
| intel | xeon_e5-2687w_v4_firmware | - | |
| intel | xeon_e5-2687w_v4 | - | |
| intel | xeon_e5-2695_v4_firmware | - | |
| intel | xeon_e5-2695_v4 | - | |
| intel | xeon_e5-2690_v4_firmware | - | |
| intel | xeon_e5-2690_v4 | - | |
| intel | xeon_e5-2699_v4_firmware | - | |
| intel | xeon_e5-2699_v4 | - | |
| intel | xeon_e5-2650l_v4_firmware | - | |
| intel | xeon_e5-2650l_v4 | - | |
| intel | xeon_e5-2658_v4_firmware | - | |
| intel | xeon_e5-2658_v4 | - | |
| intel | xeon_e5-2698_v4_firmware | - | |
| intel | xeon_e5-2698_v4 | - | |
| intel | xeon_e5-2660_v4_firmware | - | |
| intel | xeon_e5-2660_v4 | - | |
| intel | xeon_e5-2680_v4_firmware | - | |
| intel | xeon_e5-2680_v4 | - | |
| intel | xeon_e5-2697_v4_firmware | - | |
| intel | xeon_e5-2697_v4 | - | |
| intel | xeon_e5-2683_v4_firmware | - | |
| intel | xeon_e5-2683_v4 | - | |
| intel | xeon_e5-2628l_v4_firmware | - | |
| intel | xeon_e5-2628l_v4 | - | |
| intel | xeon_e5-2650_v4_firmware | - | |
| intel | xeon_e5-2650_v4 | - | |
| intel | xeon_e5-2697a_v4_firmware | - | |
| intel | xeon_e5-2697a_v4 | - | |
| intel | xeon_e5-2648l_v4_firmware | - | |
| intel | xeon_e5-2648l_v4 | - | |
| intel | xeon_e5-2620_v4_firmware | - | |
| intel | xeon_e5-2620_v4 | - | |
| intel | xeon_e5-2630l_v4_firmware | - | |
| intel | xeon_e5-2630l_v4 | - | |
| intel | xeon_e5-2608l_v4_firmware | - | |
| intel | xeon_e5-2608l_v4 | - | |
| intel | xeon_e5-2667_v4_firmware | - | |
| intel | xeon_e5-2667_v4 | - | |
| intel | xeon_e5-2643_v4_firmware | - | |
| intel | xeon_e5-2643_v4 | - | |
| intel | xeon_e5-2623_v4_firmware | - | |
| intel | xeon_e5-2623_v4 | - | |
| intel | xeon_e5-2609_v4_firmware | - | |
| intel | xeon_e5-2609_v4 | - | |
| intel | xeon_e5-2630_v4_firmware | - | |
| intel | xeon_e5-2630_v4 | - | |
| intel | xeon_e5-2618l_v4_firmware | - | |
| intel | xeon_e5-2618l_v4 | - | |
| intel | xeon_e5-2637_v4_firmware | - | |
| intel | xeon_e5-2637_v4 | - | |
| intel | xeon_e5-2603_v4_firmware | - | |
| intel | xeon_e5-2603_v4 | - | |
| intel | xeon_e5-2640_v4_firmware | - | |
| intel | xeon_e5-2640_v4 | - | |
| intel | xeon_e5-4640_v3_firmware | - | |
| intel | xeon_e5-4640_v3 | - | |
| intel | xeon_e5-4650_v3_firmware | - | |
| intel | xeon_e5-4650_v3 | - | |
| intel | xeon_e5-4655_v3_firmware | - | |
| intel | xeon_e5-4655_v3 | - | |
| intel | xeon_e5-4660_v3_firmware | - | |
| intel | xeon_e5-4660_v3 | - | |
| intel | xeon_e5-4667_v3_firmware | - | |
| intel | xeon_e5-4667_v3 | - | |
| intel | xeon_e5-4669_v3_firmware | - | |
| intel | xeon_e5-4669_v3 | - | |
| intel | xeon_e5-4610_v3_firmware | - | |
| intel | xeon_e5-4610_v3 | - | |
| intel | xeon_e5-4620_v3_firmware | - | |
| intel | xeon_e5-4620_v3 | - | |
| intel | xeon_e5-4627_v3_firmware | - | |
| intel | xeon_e5-4627_v3 | - | |
| intel | xeon_e5-2695_v3_firmware | - | |
| intel | xeon_e5-2695_v3 | - | |
| intel | xeon_e5-2697_v3_firmware | - | |
| intel | xeon_e5-2697_v3 | - | |
| intel | xeon_e5-2698_v3_firmware | - | |
| intel | xeon_e5-2698_v3 | - | |
| intel | xeon_e5-2699_v3_firmware | - | |
| intel | xeon_e5-2699_v3 | - | |
| intel | xeon_e5-2683_v3_firmware | - | |
| intel | xeon_e5-2683_v3 | - | |
| intel | xeon_e5-2690_v3_firmware | - | |
| intel | xeon_e5-2690_v3 | - | |
| intel | xeon_e5-2650_v3_firmware | - | |
| intel | xeon_e5-2650_v3 | - | |
| intel | xeon_e5-2660_v3_firmware | - | |
| intel | xeon_e5-2660_v3 | - | |
| intel | xeon_e5-2680_v3_firmware | - | |
| intel | xeon_e5-2680_v3 | - | |
| intel | xeon_e5-2670_v3_firmware | - | |
| intel | xeon_e5-2670_v3 | - | |
| intel | xeon_e5-1630_v3_firmware | - | |
| intel | xeon_e5-1630_v3 | - | |
| intel | xeon_e5-1650_v3_firmware | - | |
| intel | xeon_e5-1650_v3 | - | |
| intel | xeon_e5-2687w_v3_firmware | - | |
| intel | xeon_e5-2687w_v3 | - | |
| intel | xeon_e5-2643_v3_firmware | - | |
| intel | xeon_e5-2643_v3 | - | |
| intel | xeon_e5-1660_v3_firmware | - | |
| intel | xeon_e5-1660_v3 | - | |
| intel | xeon_e5-1680_v3_firmware | - | |
| intel | xeon_e5-1680_v3 | - | |
| intel | xeon_e5-2650l_v3_firmware | - | |
| intel | xeon_e5-2650l_v3 | - | |
| intel | xeon_e5-2620_v3_firmware | - | |
| intel | xeon_e5-2620_v3 | - | |
| intel | xeon_e5-2623_v3_firmware | - | |
| intel | xeon_e5-2623_v3 | - | |
| intel | xeon_e5-1620_v3_firmware | - | |
| intel | xeon_e5-1620_v3 | - | |
| intel | xeon_e5-2630_v3_firmware | - | |
| intel | xeon_e5-2630_v3 | - | |
| intel | xeon_e5-2630l_v3_firmware | - | |
| intel | xeon_e5-2630l_v3 | - | |
| intel | xeon_e5-2637_v3_firmware | - | |
| intel | xeon_e5-2637_v3 | - | |
| intel | xeon_e5-2640_v3_firmware | - | |
| intel | xeon_e5-2640_v3 | - | |
| intel | xeon_e5-2603_v3_firmware | - | |
| intel | xeon_e5-2603_v3 | - | |
| intel | xeon_e5-2667_v3_firmware | - | |
| intel | xeon_e5-2667_v3 | - | |
| intel | xeon_e5-4640_v2_firmware | - | |
| intel | xeon_e5-4640_v2 | - | |
| intel | xeon_e5-4650_v2_firmware | - | |
| intel | xeon_e5-4650_v2 | - | |
| intel | xeon_e5-4657l_v2_firmware | - | |
| intel | xeon_e5-4657l_v2 | - | |
| intel | xeon_e5-4607_v2_firmware | - | |
| intel | xeon_e5-4607_v2 | - | |
| intel | xeon_e5-4610_v2_firmware | - | |
| intel | xeon_e5-4610_v2 | - | |
| intel | xeon_e5-4620_v2_firmware | - | |
| intel | xeon_e5-4620_v2 | - | |
| intel | xeon_e5-4657l_v2_firmware | - | |
| intel | xeon_e5-4657l_v2 | - | |
| intel | xeon_e5-4627_v2_firmware | - | |
| intel | xeon_e5-4627_v2 | - | |
| intel | xeon_e5-4603_v2_firmware | - | |
| intel | xeon_e5-4603_v2 | - | |
| intel | xeon_e5-2420_v2_firmware | - | |
| intel | xeon_e5-2420_v2 | - | |
| intel | xeon_e5-2440_v2_firmware | - | |
| intel | xeon_e5-2440_v2 | - | |
| intel | xeon_e5-2403_v2_firmware | - | |
| intel | xeon_e5-2403_v2 | - | |
| intel | xeon_e5-2430_v2_firmware | - | |
| intel | xeon_e5-2430_v2 | - | |
| intel | xeon_e5-2450_v2_firmware | - | |
| intel | xeon_e5-2450_v2 | - | |
| intel | xeon_e5-2430l_v2_firmware | - | |
| intel | xeon_e5-2430l_v2 | - | |
| intel | xeon_e5-2450l_v2_firmware | - | |
| intel | xeon_e5-2450l_v2 | - | |
| intel | xeon_e5-2470_v2_firmware | - | |
| intel | xeon_e5-2470_v2 | - | |
| intel | xeon_e5-2407_v2_firmware | - | |
| intel | xeon_e5-2407_v2 | - | |
| intel | xeon_e5-2640_v2_firmware | - | |
| intel | xeon_e5-2640_v2 | - | |
| intel | xeon_e5-2680_v2_firmware | - | |
| intel | xeon_e5-2680_v2 | - | |
| intel | xeon_e5-2690_v2_firmware | - | |
| intel | xeon_e5-2690_v2 | - | |
| intel | xeon_e5-2643_v2_firmware | - | |
| intel | xeon_e5-2643_v2 | - | |
| intel | xeon_e5-2650_v2_firmware | - | |
| intel | xeon_e5-2650_v2 | - | |
| intel | xeon_e5-2650l_v2_firmware | - | |
| intel | xeon_e5-2650l_v2 | - | |
| intel | xeon_e5-2695_v2_firmware | - | |
| intel | xeon_e5-2695_v2 | - | |
| intel | xeon_e5-2660_v2_firmware | - | |
| intel | xeon_e5-2660_v2 | - | |
| intel | xeon_e5-2667_v2_firmware | - | |
| intel | xeon_e5-2667_v2 | - | |
| intel | xeon_e5-2697_v2_firmware | - | |
| intel | xeon_e5-2697_v2 | - | |
| intel | xeon_e5-2603_v2_firmware | - | |
| intel | xeon_e5-2603_v2 | - | |
| intel | xeon_e5-2670_v2_firmware | - | |
| intel | xeon_e5-2670_v2 | - | |
| intel | xeon_e5-2609_v2_firmware | - | |
| intel | xeon_e5-2609_v2 | - | |
| intel | xeon_e5-1620_v2_firmware | - | |
| intel | xeon_e5-1620_v2 | - | |
| intel | xeon_e5-2687w_v2_firmware | - | |
| intel | xeon_e5-2687w_v2 | - | |
| intel | xeon_e5-1650_v2_firmware | - | |
| intel | xeon_e5-1650_v2 | - | |
| intel | xeon_e5-2620_v2_firmware | - | |
| intel | xeon_e5-2620_v2 | - | |
| intel | xeon_e5-1660_v2_firmware | - | |
| intel | xeon_e5-1660_v2 | - | |
| intel | xeon_e5-2630_v2_firmware | - | |
| intel | xeon_e5-2630_v2 | - | |
| intel | xeon_e5-2630l_v2_firmware | - | |
| intel | xeon_e5-2630l_v2 | - | |
| intel | xeon_e5-2637_v2_firmware | - | |
| intel | xeon_e5-2637_v2 | - | |
| intel | xeon_e3-1230_v6_firmware | - | |
| intel | xeon_e3-1230_v6 | - | |
| intel | xeon_e3-1280_v6_firmware | - | |
| intel | xeon_e3-1280_v6 | - | |
| intel | xeon_e3-1225_v6_firmware | - | |
| intel | xeon_e3-1225_v6 | - | |
| intel | xeon_e3-1240_v6_firmware | - | |
| intel | xeon_e3-1240_v6 | - | |
| intel | xeon_e3-1275_v6_firmware | - | |
| intel | xeon_e3-1275_v6 | - | |
| intel | xeon_e3-1220_v6_firmware | - | |
| intel | xeon_e3-1220_v6 | - | |
| intel | xeon_e3-1270_v6_firmware | - | |
| intel | xeon_e3-1270_v6 | - | |
| intel | xeon_e3-1245_v6_firmware | - | |
| intel | xeon_e3-1245_v6 | - | |
| intel | xeon_e3-1535m_v6_firmware | - | |
| intel | xeon_e3-1535m_v6 | - | |
| intel | xeon_e3-1505m_v6_firmware | - | |
| intel | xeon_e3-1505m_v6 | - | |
| intel | xeon_e3-1565l_v5_firmware | - | |
| intel | xeon_e3-1565l_v5 | - | |
| intel | xeon_e3-1585l_v5_firmware | - | |
| intel | xeon_e3-1585l_v5 | - | |
| intel | xeon_e3-1585_v5_firmware | - | |
| intel | xeon_e3-1585_v5 | - | |
| intel | xeon_e3-1558l_v5_firmware | - | |
| intel | xeon_e3-1558l_v5 | - | |
| intel | xeon_e3-1545m_v5_firmware | - | |
| intel | xeon_e3-1545m_v5 | - | |
| intel | xeon_e3-1575m_v5_firmware | - | |
| intel | xeon_e3-1575m_v5 | - | |
| intel | xeon_e3-1515m_v5_firmware | - | |
| intel | xeon_e3-1515m_v5 | - | |
| intel | xeon_e3-1240l_v5_firmware | - | |
| intel | xeon_e3-1240l_v5 | - | |
| intel | xeon_e3-1235l_v5_firmware | - | |
| intel | xeon_e3-1235l_v5 | - | |
| intel | xeon_e3-1280_v5_firmware | - | |
| intel | xeon_e3-1280_v5 | - | |
| intel | xeon_e3-1220_v5_firmware | - | |
| intel | xeon_e3-1220_v5 | - | |
| intel | xeon_e3-1230_v5_firmware | - | |
| intel | xeon_e3-1230_v5 | - | |
| intel | xeon_e3-1245_v5_firmware | - | |
| intel | xeon_e3-1245_v5 | - | |
| intel | xeon_e3-1270_v5_firmware | - | |
| intel | xeon_e3-1270_v5 | - | |
| intel | xeon_e3-1225_v5_firmware | - | |
| intel | xeon_e3-1225_v5 | - | |
| intel | xeon_e3-1260l_v5_firmware | - | |
| intel | xeon_e3-1260l_v5 | - | |
| intel | xeon_e3-1240_v5_firmware | - | |
| intel | xeon_e3-1240_v5 | - | |
| intel | xeon_e3-1275_v5_firmware | - | |
| intel | xeon_e3-1275_v5 | - | |
| intel | xeon_e3-1268l_v5_firmware | - | |
| intel | xeon_e3-1268l_v5 | - | |
| intel | xeon_e3-1505m_v5_firmware | - | |
| intel | xeon_e3-1505m_v5 | - | |
| intel | xeon_e3-1535m_v5_firmware | - | |
| intel | xeon_e3-1535m_v5 | - | |
| intel | xeon_e3-1265l_v4_firmware | - | |
| intel | xeon_e3-1265l_v4 | - | |
| intel | xeon_e3-1285l_v4_firmware | - | |
| intel | xeon_e3-1285l_v4 | - | |
| intel | xeon_e3-1285_v4_firmware | - | |
| intel | xeon_e3-1285_v4 | - | |
| intel | xeon_e3-1241_v3_firmware | - | |
| intel | xeon_e3-1241_v3 | - | |
| intel | xeon_e3-1231_v3_firmware | - | |
| intel | xeon_e3-1231_v3 | - | |
| intel | xeon_e3-1240l_v3_firmware | - | |
| intel | xeon_e3-1240l_v3 | - | |
| intel | xeon_e3-1276_v3_firmware | - | |
| intel | xeon_e3-1276_v3 | - | |
| intel | xeon_e3-1281_v3_firmware | - | |
| intel | xeon_e3-1281_v3 | - | |
| intel | xeon_e3-1246_v3_firmware | - | |
| intel | xeon_e3-1246_v3 | - | |
| intel | xeon_e3-1271_v3_firmware | - | |
| intel | xeon_e3-1271_v3 | - | |
| intel | xeon_e3-1226_v3_firmware | - | |
| intel | xeon_e3-1226_v3 | - | |
| intel | xeon_e3-1220l_v3_firmware | - | |
| intel | xeon_e3-1220l_v3 | - | |
| intel | xeon_e3-1220_v3_firmware | - | |
| intel | xeon_e3-1220_v3 | - | |
| intel | xeon_e3-1230l_v3_firmware | - | |
| intel | xeon_e3-1230l_v3 | - | |
| intel | xeon_e3-1225_v3_firmware | - | |
| intel | xeon_e3-1225_v3 | - | |
| intel | xeon_e3-1265l_v3_firmware | - | |
| intel | xeon_e3-1265l_v3 | - | |
| intel | xeon_e3-1275_v3_firmware | - | |
| intel | xeon_e3-1275_v3 | - | |
| intel | xeon_e-2226g_firmware | - | |
| intel | xeon_e-2226g | - | |
| intel | xeon_e-2234_firmware | - | |
| intel | xeon_e-2234 | - | |
| intel | xeon_e-2236_firmware | - | |
| intel | xeon_e-2236 | - | |
| intel | xeon_e-2244g_firmware | - | |
| intel | xeon_e-2244g | - | |
| intel | xeon_e-2274g_firmware | - | |
| intel | xeon_e-2274g | - | |
| intel | xeon_e-2246g_firmware | - | |
| intel | xeon_e-2246g | - | |
| intel | xeon_e-2224_firmware | - | |
| intel | xeon_e-2224 | - | |
| intel | xeon_e-2224g_firmware | - | |
| intel | xeon_e-2224g | - | |
| intel | xeon_e-2288g_firmware | - | |
| intel | xeon_e-2288g | - | |
| intel | xeon_e-2278g_firmware | - | |
| intel | xeon_e-2278g | - | |
| intel | xeon_e-2286g_firmware | - | |
| intel | xeon_e-2286g | - | |
| intel | xeon_e-2276g_firmware | - | |
| intel | xeon_e-2276g | - | |
| intel | xeon_e-2124g_firmware | - | |
| intel | xeon_e-2124g | - | |
| intel | xeon_e-2146g_firmware | - | |
| intel | xeon_e-2146g | - | |
| intel | xeon_e-2176g_firmware | - | |
| intel | xeon_e-2176g | - | |
| intel | xeon_e-2136_firmware | - | |
| intel | xeon_e-2136 | - | |
| intel | xeon_e-2134_firmware | - | |
| intel | xeon_e-2134 | - | |
| intel | xeon_e-2144g_firmware | - | |
| intel | xeon_e-2144g | - | |
| intel | xeon_e-2174g_firmware | - | |
| intel | xeon_e-2174g | - | |
| intel | xeon_e-2104g_firmware | - | |
| intel | xeon_e-2104g | - | |
| intel | xeon_e-2186g_firmware | - | |
| intel | xeon_e-2186g | - | |
| intel | xeon_e-2126g_firmware | - | |
| intel | xeon_e-2126g | - | |
| intel | xeon_e-2124_firmware | - | |
| intel | xeon_e-2124 | - | |
| intel | xeon_d-1602_firmware | - | |
| intel | xeon_d-1602 | - | |
| intel | xeon_d-1653n_firmware | - | |
| intel | xeon_d-1653n | - | |
| intel | xeon_d-1622_firmware | - | |
| intel | xeon_d-1622 | - | |
| intel | xeon_d-1623n_firmware | - | |
| intel | xeon_d-1623n | - | |
| intel | xeon_d-1627_firmware | - | |
| intel | xeon_d-1627 | - | |
| intel | xeon_d-1637_firmware | - | |
| intel | xeon_d-1637 | - | |
| intel | xeon_d-1633n_firmware | - | |
| intel | xeon_d-1633n | - | |
| intel | xeon_d-1649n_firmware | - | |
| intel | xeon_d-1649n | - | |
| intel | xeon_d-2141i_firmware | - | |
| intel | xeon_d-2141i | - | |
| intel | xeon_d-2177nt_firmware | - | |
| intel | xeon_d-2177nt | - | |
| intel | xeon_d-2161i_firmware | - | |
| intel | xeon_d-2161i | - | |
| intel | xeon_d-2143it_firmware | - | |
| intel | xeon_d-2143it | - | |
| intel | xeon_d-2146nt_firmware | - | |
| intel | xeon_d-2146nt | - | |
| intel | xeon_d-2145nt_firmware | - | |
| intel | xeon_d-2145nt | - | |
| intel | xeon_d-2123it_firmware | - | |
| intel | xeon_d-2123it | - | |
| intel | xeon_d-2173it_firmware | - | |
| intel | xeon_d-2173it | - | |
| intel | xeon_d-2191_firmware | - | |
| intel | xeon_d-2191 | - | |
| intel | xeon_d-2187nt_firmware | - | |
| intel | xeon_d-2187nt | - | |
| intel | xeon_d-2142it_firmware | - | |
| intel | xeon_d-2142it | - | |
| intel | xeon_d-2163it_firmware | - | |
| intel | xeon_d-2163it | - | |
| intel | xeon_d-2183it_firmware | - | |
| intel | xeon_d-2183it | - | |
| intel | xeon_d-2166nt_firmware | - | |
| intel | xeon_d-2166nt | - | |
| intel | xeon_d-1533n_firmware | - | |
| intel | xeon_d-1533n | - | |
| intel | xeon_d-1513n_firmware | - | |
| intel | xeon_d-1513n | - | |
| intel | xeon_d-1543n_firmware | - | |
| intel | xeon_d-1543n | - | |
| intel | xeon_d-1523n_firmware | - | |
| intel | xeon_d-1523n | - | |
| intel | xeon_d-1553n_firmware | - | |
| intel | xeon_d-1553n | - | |
| intel | xeon_d-1539_firmware | - | |
| intel | xeon_d-1539 | - | |
| intel | xeon_d-1529_firmware | - | |
| intel | xeon_d-1529 | - | |
| intel | xeon_d-1559_firmware | - | |
| intel | xeon_d-1559 | - | |
| intel | xeon_d-1557_firmware | - | |
| intel | xeon_d-1557 | - | |
| intel | xeon_d-1567_firmware | - | |
| intel | xeon_d-1567 | - | |
| intel | xeon_d-1577_firmware | - | |
| intel | xeon_d-1577 | - | |
| intel | xeon_d-1571_firmware | - | |
| intel | xeon_d-1571 | - | |
| intel | xeon_d-1528_firmware | - | |
| intel | xeon_d-1528 | - | |
| intel | xeon_d-1541_firmware | - | |
| intel | xeon_d-1541 | - | |
| intel | xeon_d-1518_firmware | - | |
| intel | xeon_d-1518 | - | |
| intel | xeon_d-1521_firmware | - | |
| intel | xeon_d-1521 | - | |
| intel | xeon_d-1531_firmware | - | |
| intel | xeon_d-1531 | - | |
| intel | xeon_d-1548_firmware | - | |
| intel | xeon_d-1548 | - | |
| intel | xeon_d-1527_firmware | - | |
| intel | xeon_d-1527 | - | |
| intel | xeon_d-1537_firmware | - | |
| intel | xeon_d-1537 | - | |
| intel | xeon_d-1520_firmware | - | |
| intel | xeon_d-1520 | - | |
| intel | xeon_d-1540_firmware | - | |
| intel | xeon_d-1540 | - | |
| intel | xeon_w-2275_firmware | - | |
| intel | xeon_w-2275 | - | |
| intel | xeon_w-2295_firmware | - | |
| intel | xeon_w-2295 | - | |
| intel | xeon_w-2265_firmware | - | |
| intel | xeon_w-2265 | - | |
| intel | xeon_w-2255_firmware | - | |
| intel | xeon_w-2255 | - | |
| intel | xeon_w-2223_firmware | - | |
| intel | xeon_w-2223 | - | |
| intel | xeon_w-2245_firmware | - | |
| intel | xeon_w-2245 | - | |
| intel | xeon_w-2225_firmware | - | |
| intel | xeon_w-2225 | - | |
| intel | xeon_w-2235_firmware | - | |
| intel | xeon_w-2235 | - | |
| intel | xeon_w-3265m_firmware | - | |
| intel | xeon_w-3265m | - | |
| intel | xeon_w-3245m_firmware | - | |
| intel | xeon_w-3245m | - | |
| intel | xeon_w-3275_firmware | - | |
| intel | xeon_w-3275 | - | |
| intel | xeon_w-3245_firmware | - | |
| intel | xeon_w-3245 | - | |
| intel | xeon_w-3275m_firmware | - | |
| intel | xeon_w-3275m | - | |
| intel | xeon_w-3223_firmware | - | |
| intel | xeon_w-3223 | - | |
| intel | xeon_w-3265_firmware | - | |
| intel | xeon_w-3265 | - | |
| intel | xeon_w-3225_firmware | - | |
| intel | xeon_w-3225 | - | |
| intel | xeon_w-3175x_firmware | - | |
| intel | xeon_w-3175x | - | |
| intel | xeon_w-2175_firmware | - | |
| intel | xeon_w-2175 | - | |
| intel | xeon_w-2133_firmware | - | |
| intel | xeon_w-2133 | - | |
| intel | xeon_w-2155_firmware | - | |
| intel | xeon_w-2155 | - | |
| intel | xeon_w-2123_firmware | - | |
| intel | xeon_w-2123 | - | |
| intel | xeon_w-2145_firmware | - | |
| intel | xeon_w-2145 | - | |
| intel | xeon_w-2125_firmware | - | |
| intel | xeon_w-2125 | - | |
| intel | xeon_w-2135_firmware | - | |
| intel | xeon_w-2135 | - | |
| intel | xeon_w-2195_firmware | - | |
| intel | xeon_w-2195 | - | |
| intel | xeon_x7560_firmware | - | |
| intel | xeon_x7560 | - | |
| intel | xeon_l7555_firmware | - | |
| intel | xeon_l7555 | - | |
| intel | xeon_x7550_firmware | - | |
| intel | xeon_x7550 | - | |
| intel | xeon_l7545_firmware | - | |
| intel | xeon_l7545 | - | |
| intel | xeon_x7542_firmware | - | |
| intel | xeon_x7542 | - | |
| intel | xeon_e7540_firmware | - | |
| intel | xeon_e7540 | - | |
| intel | xeon_e7530_firmware | - | |
| intel | xeon_e7530 | - | |
| intel | xeon_e7520_firmware | - | |
| intel | xeon_e7520 | - | |
| intel | xeon_x7460_firmware | - | |
| intel | xeon_x7460 | - | |
| intel | xeon_e7450_firmware | - | |
| intel | xeon_e7450 | - | |
| intel | xeon_l7455_firmware | - | |
| intel | xeon_l7455 | - | |
| intel | xeon_l7445_firmware | - | |
| intel | xeon_l7445 | - | |
| intel | xeon_e7440_firmware | - | |
| intel | xeon_e7440 | - | |
| intel | xeon_e7430_firmware | - | |
| intel | xeon_e7430 | - | |
| intel | xeon_e7420_firmware | - | |
| intel | xeon_e7420 | - | |
| intel | xeon_x7350_firmware | - | |
| intel | xeon_x7350 | - | |
| intel | xeon_l7345_firmware | - | |
| intel | xeon_l7345 | - | |
| intel | xeon_e7340_firmware | - | |
| intel | xeon_e7340 | - | |
| intel | xeon_e7330_firmware | - | |
| intel | xeon_e7330 | - | |
| intel | xeon_e7320_firmware | - | |
| intel | xeon_e7320 | - | |
| intel | xeon_e7310_firmware | - | |
| intel | xeon_e7310 | - | |
| intel | xeon_e7220_firmware | - | |
| intel | xeon_e7220 | - | |
| intel | xeon_e7210_firmware | - | |
| intel | xeon_e7210 | - | |
| intel | xeon_7150n_firmware | - | |
| intel | xeon_7150n | - | |
| intel | xeon_7140n_firmware | - | |
| intel | xeon_7140n | - | |
| intel | xeon_7140m_firmware | - | |
| intel | xeon_7140m | - | |
| intel | xeon_7130n_firmware | - | |
| intel | xeon_7130n | - | |
| intel | xeon_7130m_firmware | - | |
| intel | xeon_7130m | - | |
| intel | xeon_7120n_firmware | - | |
| intel | xeon_7120n | - | |
| intel | xeon_7120m_firmware | - | |
| intel | xeon_7120m | - | |
| intel | xeon_7110n_firmware | - | |
| intel | xeon_7110n | - | |
| intel | xeon_7110m_firmware | - | |
| intel | xeon_7110m | - | |
| intel | xeon_7041_firmware | - | |
| intel | xeon_7041 | - | |
| intel | xeon_7040_firmware | - | |
| intel | xeon_7040 | - | |
| intel | xeon_7020_firmware | - | |
| intel | xeon_7020 | - | |
| intel | xeon_7030_firmware | - | |
| intel | xeon_7030 | - | |
| intel | xeon_x6550_firmware | - | |
| intel | xeon_x6550 | - | |
| intel | xeon_e6540_firmware | - | |
| intel | xeon_e6540 | - | |
| intel | xeon_e6510_firmware | - | |
| intel | xeon_e6510 | - | |
| intel | xeon_x5690_firmware | - | |
| intel | xeon_x5690 | - | |
| intel | xeon_x5687_firmware | - | |
| intel | xeon_x5687 | - | |
| intel | xeon_x5680_firmware | - | |
| intel | xeon_x5680 | - | |
| intel | xeon_x5677_firmware | - | |
| intel | xeon_x5677 | - | |
| intel | xeon_x5675_firmware | - | |
| intel | xeon_x5675 | - | |
| intel | xeon_x5672_firmware | - | |
| intel | xeon_x5672 | - | |
| intel | xeon_x5670_firmware | - | |
| intel | xeon_x5670 | - | |
| intel | xeon_x5667_firmware | - | |
| intel | xeon_x5667 | - | |
| intel | xeon_x5660_firmware | - | |
| intel | xeon_x5660 | - | |
| intel | xeon_x5650_firmware | - | |
| intel | xeon_x5650 | - | |
| intel | xeon_e5649_firmware | - | |
| intel | xeon_e5649 | - | |
| intel | xeon_x5647_firmware | - | |
| intel | xeon_x5647 | - | |
| intel | xeon_e5645_firmware | - | |
| intel | xeon_e5645 | - | |
| intel | xeon_l5640_firmware | - | |
| intel | xeon_l5640 | - | |
| intel | xeon_e5640_firmware | - | |
| intel | xeon_e5640 | - | |
| intel | xeon_l5638_firmware | - | |
| intel | xeon_l5638 | - | |
| intel | xeon_l5630_firmware | - | |
| intel | xeon_l5630 | - | |
| intel | xeon_e5630_firmware | - | |
| intel | xeon_e5630 | - | |
| intel | xeon_e5620_firmware | - | |
| intel | xeon_e5620 | - | |
| intel | xeon_l5618_firmware | - | |
| intel | xeon_l5618 | - | |
| intel | xeon_l5609_firmware | - | |
| intel | xeon_l5609 | - | |
| intel | xeon_e5607_firmware | - | |
| intel | xeon_e5607 | - | |
| intel | xeon_e5606_firmware | - | |
| intel | xeon_e5606 | - | |
| intel | xeon_e5506_firmware | - | |
| intel | xeon_e5506 | - | |
| intel | xeon_e5603_firmware | - | |
| intel | xeon_e5603 | - | |
| intel | xeon_w5590_firmware | - | |
| intel | xeon_w5590 | - | |
| intel | xeon_w5580_firmware | - | |
| intel | xeon_w5580 | - | |
| intel | xeon_x5570_firmware | - | |
| intel | xeon_x5570 | - | |
| intel | xeon_x5560_firmware | - | |
| intel | xeon_x5560 | - | |
| intel | xeon_x5550_firmware | - | |
| intel | xeon_x5550 | - | |
| intel | xeon_ec5549_firmware | - | |
| intel | xeon_ec5549 | - | |
| intel | xeon_e5540_firmware | - | |
| intel | xeon_e5540 | - | |
| intel | xeon_ec5539_firmware | - | |
| intel | xeon_ec5539 | - | |
| intel | xeon_l5530_firmware | - | |
| intel | xeon_l5530 | - | |
| intel | xeon_e5530_firmware | - | |
| intel | xeon_e5530 | - | |
| intel | xeon_lc5528_firmware | - | |
| intel | xeon_lc5528 | - | |
| intel | xeon_l5520_firmware | - | |
| intel | xeon_l5520 | - | |
| intel | xeon_e5520_firmware | - | |
| intel | xeon_e5520 | - | |
| intel | xeon_lc5518_firmware | - | |
| intel | xeon_lc5518 | - | |
| intel | xeon_l5518_firmware | - | |
| intel | xeon_l5518 | - | |
| intel | xeon_ec5509_firmware | - | |
| intel | xeon_ec5509 | - | |
| intel | xeon_l5508_firmware | - | |
| intel | xeon_l5508 | - | |
| intel | xeon_e5507_firmware | - | |
| intel | xeon_e5507 | - | |
| intel | xeon_l5506_firmware | - | |
| intel | xeon_l5506 | - | |
| intel | xeon_e5504_firmware | - | |
| intel | xeon_e5504 | - | |
| intel | xeon_e5503_firmware | - | |
| intel | xeon_e5503 | - | |
| intel | xeon_e5502_firmware | - | |
| intel | xeon_e5502 | - | |
| intel | xeon_x5492_firmware | - | |
| intel | xeon_x5492 | - | |
| intel | xeon_x5482_firmware | - | |
| intel | xeon_x5482 | - | |
| intel | xeon_x5472_firmware | - | |
| intel | xeon_x5472 | - | |
| intel | xeon_e5472_firmware | - | |
| intel | xeon_e5472 | - | |
| intel | xeon_x5470_firmware | - | |
| intel | xeon_x5470 | - | |
| intel | xeon_e5462_firmware | - | |
| intel | xeon_e5462 | - | |
| intel | xeon_x5460_firmware | - | |
| intel | xeon_x5460 | - | |
| intel | xeon_x5450_firmware | - | |
| intel | xeon_x5450 | - | |
| intel | xeon_e5450_firmware | - | |
| intel | xeon_e5450 | - | |
| intel | xeon_e5440_firmware | - | |
| intel | xeon_e5440 | - | |
| intel | xeon_l5430_firmware | - | |
| intel | xeon_l5430 | - | |
| intel | xeon_e5430_firmware | - | |
| intel | xeon_e5430 | - | |
| intel | xeon_l5420_firmware | - | |
| intel | xeon_l5420 | - | |
| intel | xeon_e5420_firmware | - | |
| intel | xeon_e5420 | - | |
| intel | xeon_l5410_firmware | - | |
| intel | xeon_l5410 | - | |
| intel | xeon_e5410_firmware | - | |
| intel | xeon_e5410 | - | |
| intel | xeon_l5408_firmware | - | |
| intel | xeon_l5408 | - | |
| intel | xeon_e5405_firmware | - | |
| intel | xeon_e5405 | - | |
| intel | xeon_x5365_firmware | - | |
| intel | xeon_x5365 | - | |
| intel | xeon_x5355_firmware | - | |
| intel | xeon_x5355 | - | |
| intel | xeon_e5345_firmware | - | |
| intel | xeon_e5345 | - | |
| intel | xeon_l5335_firmware | - | |
| intel | xeon_l5335 | - | |
| intel | xeon_e5335_firmware | - | |
| intel | xeon_e5335 | - | |
| intel | xeon_l5320_firmware | - | |
| intel | xeon_l5320 | - | |
| intel | xeon_e5320_firmware | - | |
| intel | xeon_e5320 | - | |
| intel | xeon_l5318_firmware | - | |
| intel | xeon_l5318 | - | |
| intel | xeon_l5310_firmware | - | |
| intel | xeon_l5310 | - | |
| intel | xeon_e5310_firmware | - | |
| intel | xeon_e5310 | - | |
| intel | xeon_x5272_firmware | - | |
| intel | xeon_x5272 | - | |
| intel | xeon_x5270_firmware | - | |
| intel | xeon_x5270 | - | |
| intel | xeon_x5260_firmware | - | |
| intel | xeon_x5260 | - | |
| intel | xeon_l5240_firmware | - | |
| intel | xeon_l5240 | - | |
| intel | xeon_e5240_firmware | - | |
| intel | xeon_e5240 | - | |
| intel | xeon_l5238_firmware | - | |
| intel | xeon_l5238 | - | |
| intel | xeon_e5220_firmware | - | |
| intel | xeon_e5220 | - | |
| intel | xeon_l5215_firmware | - | |
| intel | xeon_l5215 | - | |
| intel | xeon_e5205_firmware | - | |
| intel | xeon_e5205 | - | |
| intel | xeon_5160_firmware | - | |
| intel | xeon_5160 | - | |
| intel | xeon_5150_firmware | - | |
| intel | xeon_5150 | - | |
| intel | xeon_lv_5148_firmware | - | |
| intel | xeon_lv_5148 | - | |
| intel | xeon_5140_firmware | - | |
| intel | xeon_5140 | - | |
| intel | xeon_lv_5138_firmware | - | |
| intel | xeon_lv_5138 | - | |
| intel | xeon_lv_5133_firmware | - | |
| intel | xeon_lv_5133 | - | |
| intel | xeon_5130_firmware | - | |
| intel | xeon_5130 | - | |
| intel | xeon_lv_5128_firmware | - | |
| intel | xeon_lv_5128 | - | |
| intel | xeon_5120_firmware | - | |
| intel | xeon_5120 | - | |
| intel | xeon_lv_5113_firmware | - | |
| intel | xeon_lv_5113 | - | |
| intel | xeon_5110_firmware | - | |
| intel | xeon_5110 | - | |
| intel | xeon_5080_firmware | - | |
| intel | xeon_5080 | - | |
| intel | xeon_5070_firmware | - | |
| intel | xeon_5070 | - | |
| intel | xeon_5063_firmware | - | |
| intel | xeon_5063 | - | |
| intel | xeon_5060_firmware | - | |
| intel | xeon_5060 | - | |
| intel | xeon_5050_firmware | - | |
| intel | xeon_5050 | - | |
| intel | xeon_5040_firmware | - | |
| intel | xeon_5040 | - | |
| intel | xeon_5030_firmware | - | |
| intel | xeon_5030 | - | |
| intel | xeon_w3690_firmware | - | |
| intel | xeon_w3690 | - | |
| intel | xeon_w3680_firmware | - | |
| intel | xeon_w3680 | - | |
| intel | xeon_w3670_firmware | - | |
| intel | xeon_w3670 | - | |
| intel | xeon_w3580_firmware | - | |
| intel | xeon_w3580 | - | |
| intel | xeon_w3570_firmware | - | |
| intel | xeon_w3570 | - | |
| intel | xeon_w3565_firmware | - | |
| intel | xeon_w3565 | - | |
| intel | xeon_w3550_firmware | - | |
| intel | xeon_w3550 | - | |
| intel | xeon_w3540_firmware | - | |
| intel | xeon_w3540 | - | |
| intel | xeon_ec3539_firmware | - | |
| intel | xeon_ec3539 | - | |
| intel | xeon_w3530_firmware | - | |
| intel | xeon_w3530 | - | |
| intel | xeon_lc3528_firmware | - | |
| intel | xeon_lc3528 | - | |
| intel | xeon_w3520_firmware | - | |
| intel | xeon_w3520 | - | |
| intel | xeon_lc3518_firmware | - | |
| intel | xeon_lc3518 | - | |
| intel | xeon_x3480_firmware | - | |
| intel | xeon_x3480 | - | |
| intel | xeon_x3470_firmware | - | |
| intel | xeon_x3470 | - | |
| intel | xeon_x3460_firmware | - | |
| intel | xeon_x3460 | - | |
| intel | xeon_x3450_firmware | - | |
| intel | xeon_x3450 | - | |
| intel | xeon_x3440_firmware | - | |
| intel | xeon_x3440 | - | |
| intel | xeon_x3430_firmware | - | |
| intel | xeon_x3430 | - | |
| intel | xeon_l3426_firmware | - | |
| intel | xeon_l3426 | - | |
| intel | xeon_l3406_firmware | - | |
| intel | xeon_l3406 | - | |
| intel | xeon_x3380_firmware | - | |
| intel | xeon_x3380 | - | |
| intel | xeon_x3370_firmware | - | |
| intel | xeon_x3370 | - | |
| intel | xeon_x3360_firmware | - | |
| intel | xeon_x3360 | - | |
| intel | xeon_l3360_firmware | - | |
| intel | xeon_l3360 | - | |
| intel | xeon_x3350_firmware | - | |
| intel | xeon_x3350 | - | |
| intel | xeon_x3330_firmware | - | |
| intel | xeon_x3330 | - | |
| intel | xeon_x3320_firmware | - | |
| intel | xeon_x3320 | - | |
| intel | xeon_x3230_firmware | - | |
| intel | xeon_x3230 | - | |
| intel | xeon_x3220_firmware | - | |
| intel | xeon_x3220 | - | |
| intel | xeon_x3210_firmware | - | |
| intel | xeon_x3210 | - | |
| intel | xeon_e3120_firmware | - | |
| intel | xeon_e3120 | - | |
| intel | xeon_l3110_firmware | - | |
| intel | xeon_l3110 | - | |
| intel | xeon_e3110_firmware | - | |
| intel | xeon_e3110 | - | |
| intel | xeon_3070_firmware | - | |
| intel | xeon_3070 | - | |
| intel | xeon_3065_firmware | - | |
| intel | xeon_3065 | - | |
| intel | xeon_3060_firmware | - | |
| intel | xeon_3060 | - | |
| intel | xeon_3050_firmware | - | |
| intel | xeon_3050 | - | |
| intel | xeon_3040_firmware | - | |
| intel | xeon_3040 | - | |
| intel | xeon_l3014_firmware | - | |
| intel | xeon_l3014 | - | |
| debian | debian_linux | 9.0 | |
| opensuse | leap | 15.1 | |
| fedoraproject | fedora | 30 | |
| fedoraproject | fedora | 31 | |
| canonical | ubuntu_linux | 14.04 | |
| f5 | big-ip_access_policy_manager | * | |
| f5 | big-ip_access_policy_manager | * | |
| f5 | big-ip_access_policy_manager | * | |
| f5 | big-ip_access_policy_manager | * | |
| f5 | big-ip_access_policy_manager | * | |
| f5 | big-ip_advanced_firewall_manager | * | |
| f5 | big-ip_advanced_firewall_manager | * | |
| f5 | big-ip_advanced_firewall_manager | * | |
| f5 | big-ip_advanced_firewall_manager | * | |
| f5 | big-ip_advanced_firewall_manager | * | |
| f5 | big-ip_analytics | * | |
| f5 | big-ip_analytics | * | |
| f5 | big-ip_analytics | * | |
| f5 | big-ip_analytics | * | |
| f5 | big-ip_analytics | * | |
| f5 | big-ip_application_acceleration_manager | * | |
| f5 | big-ip_application_acceleration_manager | * | |
| f5 | big-ip_application_acceleration_manager | * | |
| f5 | big-ip_application_acceleration_manager | * | |
| f5 | big-ip_application_acceleration_manager | * | |
| f5 | big-ip_application_security_manager | * | |
| f5 | big-ip_application_security_manager | * | |
| f5 | big-ip_application_security_manager | * | |
| f5 | big-ip_application_security_manager | * | |
| f5 | big-ip_application_security_manager | * | |
| f5 | big-ip_domain_name_system | * | |
| f5 | big-ip_domain_name_system | * | |
| f5 | big-ip_domain_name_system | * | |
| f5 | big-ip_domain_name_system | * | |
| f5 | big-ip_domain_name_system | * | |
| f5 | big-ip_fraud_protection_service | * | |
| f5 | big-ip_fraud_protection_service | * | |
| f5 | big-ip_fraud_protection_service | * | |
| f5 | big-ip_fraud_protection_service | * | |
| f5 | big-ip_fraud_protection_service | * | |
| f5 | big-ip_global_traffic_manager | * | |
| f5 | big-ip_global_traffic_manager | * | |
| f5 | big-ip_global_traffic_manager | * | |
| f5 | big-ip_global_traffic_manager | * | |
| f5 | big-ip_global_traffic_manager | * | |
| f5 | big-ip_link_controller | * | |
| f5 | big-ip_link_controller | * | |
| f5 | big-ip_link_controller | * | |
| f5 | big-ip_link_controller | * | |
| f5 | big-ip_link_controller | * | |
| f5 | big-ip_local_traffic_manager | * | |
| f5 | big-ip_local_traffic_manager | * | |
| f5 | big-ip_local_traffic_manager | * | |
| f5 | big-ip_local_traffic_manager | * | |
| f5 | big-ip_local_traffic_manager | * | |
| f5 | big-ip_policy_enforcement_manager | * | |
| f5 | big-ip_policy_enforcement_manager | * | |
| f5 | big-ip_policy_enforcement_manager | * | |
| f5 | big-ip_policy_enforcement_manager | * | |
| f5 | big-ip_policy_enforcement_manager | * | |
| f5 | big-iq_centralized_management | * | |
| f5 | big-iq_centralized_management | * | |
| f5 | big-iq_centralized_management | 7.0.0 | |
| f5 | enterprise_manager | 3.1.1 | |
| redhat | openshift_container_platform | 4.1 | |
| redhat | openshift_container_platform | 4.2 | |
| redhat | enterprise_linux_server | 7.0 | |
| redhat | enterprise_linux_server_aus | 7.6 | |
| redhat | enterprise_linux_server_aus | 7.7 | |
| redhat | enterprise_linux_server_eus | 7.6 | |
| redhat | enterprise_linux_server_eus | 7.7 | |
| redhat | enterprise_linux_server_eus | 8.1 | |
| redhat | enterprise_linux_server_tus | 7.6 | |
| redhat | enterprise_linux_server_tus | 7.7 | |
| oracle | solaris | 11 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i3-10110u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E80BB84A-3BF8-40E0-BB06-FD39C583B94B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i3-10110u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "44BF0AFB-E9DC-4EA5-BFFF-48F896C655E0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i3-10110y_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0A589B59-DB9C-427F-A28A-BFD01EC64997",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i3-10110y:-:*:*:*:*:*:*:*",
"matchCriteriaId": "43454510-4BE7-4CD1-960D-AE1B36EFBEA5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i3-1005g1_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "71EE1DE3-2F84-481A-BE31-7FDF4B4E76C7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i3-1005g1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "30B2F570-1DD9-49C7-BB72-0EA0E9A417C4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i3-9300t_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B7474BC6-6D73-47B5-B7B4-AA6BBFFC36A4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i3-9300t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "85B0AC6F-52DC-4697-A29A-B4DE51B41D57",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i3-9300_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "196BA038-162F-4E30-8DE3-6FFB35102A1A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i3-9300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5CA88723-29A0-4F7C-BED3-70E35F913384",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i3-9100_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "77B8A8CC-9009-4CF0-894F-97079FD27796",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i3-9100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "89E9DCEC-6AFD-476F-93A1-E19BFC124BD9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i3-9100t_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CD20B8F2-FCD6-454F-955F-9F59B140593C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i3-9100t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D53FC6C0-C1B3-422F-BAFC-3B4CD0EB28B7",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i3-9350k_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3AC85FC5-274A-43B1-A9B6-245130812551",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i3-9350k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "98752CBB-B870-4DA2-BF09-0A6A847E7F19",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i3-9320_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "769E9A01-C94B-4254-8510-ABE32567E22D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i3-9320:-:*:*:*:*:*:*:*",
"matchCriteriaId": "64206B12-9CB6-4E4F-9200-EE062693FC9E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i3-8145u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1100AAC2-5A94-4EF3-AB94-AB4B4085F109",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i3-8145u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0D78093B-076C-48FB-A224-F94F5743ACF3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i3-8300_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "30904062-0998-4D93-8F61-36C41BCD11F9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i3-8300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F1DCD6D7-7FF2-419B-A41C-CF1FA830F289",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i3-8100t_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9147C908-0B5E-4CC4-BFDA-FDC8219494A2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i3-8100t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "33B0B0C9-54ED-4D7E-B0F2-C87690056800",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i3-8300t_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CC25F057-A548-4E02-A464-8AE97B40A39D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i3-8300t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B8127E47-6082-4313-B310-1C6278471A21",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i3-8109u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "65CAE5F9-E9D5-4EE1-A02D-88707B118C1C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i3-8109u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E7DDCC11-A3DD-493E-AAFA-B50050FE3AC4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i3-8130u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7DB32980-A87F-4AC6-9F1C-EA690582DECF",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i3-8130u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6287BCB7-8EFD-485E-B40E-AE6B9DB067DF",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i3-8100_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6325AFF1-8B27-408C-ADC3-E1FA826A2B9B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i3-8100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FD84789A-B7F4-493E-A3F6-D5287ACFEB98",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i3-8350k_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F99AFDF6-1B9C-4F06-A827-F0C5052EA485",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i3-8350k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C14BA084-59CC-40E8-A62F-7AD1C9DD9283",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i3-7100_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F9D0FC02-90FB-4C7D-88A6-CCC7FC7D96F9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i3-7100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EC9F763B-B469-42DC-952F-48448121373F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i3-7350k_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2AE97A31-CFCC-43AA-9354-E7ACC2415211",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i3-7350k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5E86321B-B1BD-43B7-A7F5-05CABE35F40E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i3-7300t_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AE031B88-677D-4EA4-A257-1641680E407E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i3-7300t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9CF355B2-A5D6-41CC-8404-2B61A594BA6D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i3-7167u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CBC24393-D20D-4BED-B327-2DC80876383B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i3-7167u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6F609E73-203F-45B9-9A3A-DC754B33860A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i3-7300_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B860BA95-FB11-4314-8EF7-9992F2F26C68",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i3-7300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7E3A734E-973B-4904-A905-51E438879B8F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i3-7100h_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CD689A93-49A6-49F8-83A8-D87563658FAC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i3-7100h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "31CBD3FB-0835-4F28-BFA2-3D07459066F3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i3-7320_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1CE3890B-D84E-4552-BCC5-9CB8C615BAD5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i3-7320:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4C51A38C-E4AE-46B9-ACE6-82E8F7B668D4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i3-7100t_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4BBB9687-14B5-4F4E-B6A8-1524930E605E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i3-7100t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A7C8B4BA-24E8-4856-A2D9-BD2CE2C858AF",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i3-7100u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E9B1E75F-5225-4656-90EF-473D417D3051",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i3-7100u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5F059A42-0B43-4F79-BBAF-6ED05CFFE7EB",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i3-6100u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6E23104C-8296-4A9B-BC55-E2E7B1CE7AF7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i3-6100u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BE0F2403-8146-4CA0-9E89-04022B375CEC",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i3-6100h_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "546BA014-D154-4B2E-9EB9-CAA4B810264A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i3-6100h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F0B9E6DB-C9C3-4B19-915B-B2E6E4D12158",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i3-6167u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C68A5FCF-3ECB-4831-A217-F58B63CCA4BF",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i3-6167u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "20B1E424-885F-4BB0-9257-8284A18B1655",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i3-6100_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "43C4ABB7-71F8-4AF6-918F-263E58FC26EF",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i3-6100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8A6E16A4-5B81-412F-9B02-D15288F0EB52",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i3-5015u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E8464165-83B9-4745-A71D-0072AB466DF9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i3-5015u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "81A627BB-47E3-4870-8B66-92546ABA0060",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i3-5020u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2D6CD613-B37A-442E-842C-9F60E8F96951",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i3-5020u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B6DD467D-BCB8-48CA-920B-5591A3E8D4C9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i3-5005u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "23B5896D-2B98-45AE-B4BF-1196C5362785",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i3-5005u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E3F45AB6-55EF-4ED0-BBAD-E78894ED399B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i3-5010u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1D47B941-8617-4EDA-9EFA-577BDBB3D1B0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i3-5010u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5DA07BF1-F5E6-4AFB-AE92-26E3E5125064",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i3-5157u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "83279B8E-8448-4D7A-8795-D7DAA6BD4092",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i3-5157u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9A64B0EA-FB22-4CE6-81E7-56CFFE12FC5A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i5-10210u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "16920A34-D1CE-4F1A-BCF7-045E3B3AA9AC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i5-10210u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "71615EAF-4DF4-4B9E-BF34-6ED0371A53D7",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i5-10310y_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "95BC9762-7F9A-483A-8C20-94481FD54000",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i5-10310y:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C8515D29-3823-4F9B-9578-8BB52336A2A7",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i5-10210y_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4D188A7A-9456-4535-A230-C16033A22F21",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i5-10210y:-:*:*:*:*:*:*:*",
"matchCriteriaId": "376B6DD7-1284-4BD9-88A4-5C34303CC5D1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i5-1035g4_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5071EBE4-CC92-4238-A23E-0213CB14E19A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i5-1035g4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3907FA31-6F1A-45BA-ACF3-1C8EE05D9BA0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i5-1035g7_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "70EC3730-5825-422D-A728-D719F447E5E4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i5-1035g7:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D48D9F5F-95BD-4F6B-8A37-D1CAA7D2DB25",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i5-1035g1_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "502AE808-A66F-4C02-A112-C4D682F3E13F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i5-1035g1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BE048AEB-094D-4102-9DBF-488FEB53FF89",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i5-9500_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "443C4081-E238-4AF4-AABE-AB5489756333",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i5-9500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "35F7D93A-7C16-4189-ACF2-9B3760180FCE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i5-9600_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BB2ED2C7-D6E3-46F8-B1B3-8B4FB939B189",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i5-9600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "26975700-3A56-4D17-ADDC-77CCE82A6C98",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i5-9400t_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7FF61383-1558-4AE6-97ED-3B8A20667EEE",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i5-9400t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E7950151-6BF6-4A80-9370-ED92B59635BC",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i5-9600t_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F8356AC2-3879-4E3C-B1CD-9B1EAF0761CB",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i5-9600t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "43B9F540-DFCD-40B2-8DE2-9AE9D123A48F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i5-9500t_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5AC225BE-FA97-41D2-AD32-5FE58C2DAB94",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i5-9500t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3E8A3281-8FB9-4695-A5BB-F33B5EB6EF2C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i5-9300h_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "37E9BA09-E255-438E-9938-3F51A78A3331",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i5-9300h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9A735A90-47E1-44C6-AE76-F6C7FFDCD4D0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i5-9400h_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D95AB3F9-7B28-46F8-8882-4976DBBCC767",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i5-9400h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "85F465BF-4548-45EB-AC40-384F4E6248EE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i5-9400_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8AA0AF35-BED8-41EC-831A-57CFA7A5F0D0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i5-9400:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8AC9F52F-6669-459A-A0A9-8F472E1F2761",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i5-9600k_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B26CE379-73B5-4E3C-B0B2-7550A3A670BC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i5-9600k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B1DFFFEB-CC63-4F51-8828-C5D4E0287264",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i5-8265u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A7001A74-CFF9-4CBB-A72B-E476C22ADF07",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i5-8265u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6D3E166F-3D9F-4D0D-924A-147883598EA3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i5-8200y_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E9C3DCA2-6087-4286-A84A-6091149083C9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i5-8200y:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2AC12E92-33CB-4603-AC14-3351CE1D4E3A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i5-8400t_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "71A5BA9C-83FD-4E4F-8CC7-ABC317BC0F98",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i5-8400t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AA341190-21EC-46FB-849D-F54AD3DFCF93",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i5-8300h_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4E3236A7-F174-4A47-90B3-7E0457CB3455",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i5-8300h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8BD64BB5-CBC1-4862-BEE6-04FC53017976",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i5-8259u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C2797768-C460-4901-99BE-148A7BADC020",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i5-8259u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D0D473E4-5EB1-434D-9D8F-C9365988EEAD",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i5-8269u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "07658CBC-A0FD-4A0F-BCBB-FC24115F7FDC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i5-8269u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "70D9D4EE-A6CA-4C9F-905F-27570858B5FE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i5-8700b_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3AD0F061-1664-4C0C-9207-8991C6F79F35",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i5-8700b:-:*:*:*:*:*:*:*",
"matchCriteriaId": "35B77BF8-E6BD-47EA-A303-9E584D3A2736",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i5-8400b_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2D1FEE69-E2FD-4F88-9D25-7CE3D53D1001",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i5-8400b:-:*:*:*:*:*:*:*",
"matchCriteriaId": "43DA2F8C-1C05-4447-A861-A33E81050F37",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i5-8500b_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "495C794A-3EB2-4C2B-8312-65C1C70EFFAB",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i5-8500b:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7A98CDB0-BC13-4FB3-9DF2-56D9DCD9002F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i5\\+8500_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "25773AA8-5882-4C05-9A67-FE0D37C9DCAF",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i5\\+8500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EDF4BEEF-A8FA-4A9A-A906-20268F7886C4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i5\\+8400_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9DB5F890-8B92-4F12-8D34-7E9045D22DAF",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i5\\+8400:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2816803A-2A97-48B2-ACB5-BA35FC6CD82D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i5-8305g_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3CF5BB43-9A54-4F8F-86EB-04B56135F69A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i5-8305g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F4D55B9D-4BAB-4082-A33F-626E15229333",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i5-8400_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DE4ECE37-14C8-4035-9410-F66AF586934D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i5-8400:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9D350A92-3992-4464-84AB-960ABCA45698",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i5-8250u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D3C71C3D-D137-4302-8B35-3A2AA08DD92C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i5-8250u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2DDA599F-09D5-4351-B7F5-351A2E04E091",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i5-8350u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1C1B41F0-B592-4E76-823E-847DDCC49859",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i5-8350u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4E920376-561D-4892-97A2-F4400223B3CA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i5-7400_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "84928CAE-996F-42F9-8CB2-E3BC13E3D448",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i5-7400:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DE4C6ADA-EE5E-401D-82B4-6E450EDBD49E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i5-7500t_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B52E5B70-12E0-4AA2-81E5-71BBBFA1D500",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i5-7500t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6AEAE7D3-6E26-43C5-B530-B0EE3DA65C80",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i5-7600t_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "66430AA1-841C-4204-8846-B2FBEFF4269A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i5-7600t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2B91585C-4BD7-475B-8AC8-1B813A698D77",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i5-7400t_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "01CD5DEE-86B0-4431-A542-603300A28DB3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i5-7400t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "173C6F98-4022-4F40-A39A-D3D490CA6461",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i5-7600_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "62D1D375-D4AE-4866-8472-30EBF2A6F057",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i5-7600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2603B0FB-A7B0-4E87-B989-D7EFFC2A64E4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i5-7500_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "92E1FB35-EB0D-46D9-8B07-5B74CD56B36C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i5-7500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2F3E6176-6F6D-4488-A03B-2BBF846ADC93",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i5-7300hq_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "828E6E11-A376-4F40-9077-81B9000B2692",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i5-7300hq:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8EE85AE7-B4BD-442E-AFAB-CD01744C91B7",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i5-7267u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1737E9B0-D3DF-4B8A-8548-9B2CD94EB31F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i5-7267u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BF244D02-2B47-4884-8D70-37DFEB18CB60",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i5-7600k_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3244927F-488B-4F7D-A616-02D26E64C88C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i5-7600k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BF705120-459D-49BA-BDCD-6AC38D95C820",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i5-7260u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "059D9645-5A07-44C5-A3B7-E8948D5F942A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i5-7260u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EFA6BB38-CDF8-46B0-9910-897AB7920D18",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i5-7440hq_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2128AB8F-506E-4E75-AEBE-418EDFE083FC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i5-7440hq:-:*:*:*:*:*:*:*",
"matchCriteriaId": "78F1BD53-55ED-4346-A67A-141B5BC552CD",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i5-7287u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "419D32E2-D53C-4A81-8E9D-E79FD5D89B7B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i5-7287u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "615D9B0D-8E91-4C8F-B5BC-6315C2CA90BD",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i5-7360u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A308E6AF-16CB-4722-8318-94F7B1877535",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i5-7360u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "ADA681B4-37F8-4E2E-B73B-E0E17C66B754",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i5-7200u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "634087B5-A4D5-45AC-871F-7E785F48B9C3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i5-7200u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E993BEE9-72BD-4615-B1BE-5E9129D61ABD",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i5-7y54_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AC557726-C2D4-4E95-AE20-85FE621586FC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i5-7y54:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CFA675E6-83DD-47FF-BEBC-D32E5223A065",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i5-6350hq_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DC4E97FA-FEF9-4EB1-9B94-9CFC4C5A6821",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i5-6350hq:-:*:*:*:*:*:*:*",
"matchCriteriaId": "41F7C959-BC66-40AB-8038-D37181A4CE5A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i5-6200u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6FD63AC3-9528-484C-9B94-5AE1790A6492",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i5-6200u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9F611716-F3D6-4187-AE71-4FF87C95C18E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i5-6300hq_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7505980F-57C3-4278-AA6F-59933ACB34A5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i5-6300hq:-:*:*:*:*:*:*:*",
"matchCriteriaId": "93929C7B-D4D9-436B-BA69-FD3C22FCEC2D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i5-6287u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "867B2DCB-A413-4EAB-811B-02BD5BA30F3E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i5-6287u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A0F889F1-3B57-46C1-9C23-9E78CD0DEECF",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i5-6267u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "83E3A698-AB8A-40C6-BBE1-61FCB0375483",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i5-6267u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1054FBFC-1609-4301-A0D0-B78878FB2427",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i5-6260u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "180F2FC8-2C6D-4D54-9CE5-B74348BF1663",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i5-6260u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D5F67974-81B3-43C2-8DAE-A66C6A876B7A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i5-5350h_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "079CAA7D-456D-499E-8604-F218DE1333AF",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i5-5350h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E6FCEEDB-C125-4F83-99B6-9DC8736F2F00",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i5-5200u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4FC041F8-7830-4CED-8330-88412A9F4EFC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i5-5200u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "60A08817-7679-4B7B-8D32-08F7F42525CC",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i5-5287u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A77B4603-C1B5-4C2D-8072-F0339B5B8682",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i5-5287u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B7138774-E0CF-47C6-BA82-4034AA63AC1D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i5-5250u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F6C53104-79C6-4FDE-AE7C-233813939FDA",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i5-5250u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D8085F23-481D-4395-9071-5F79DCC4EFEA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i5-5257u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F92C5142-6771-4C3B-BB2F-CBC60BFD2FC0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i5-5257u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9CB0B9DA-FB37-4E96-99E7-3345B53FDC2F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i7-10510u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0D449326-502E-488D-9933-863B9CF997FC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i7-10510u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "494A828B-F2BF-40CA-AAFB-7D2AF2BAF3AA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i7-10510y_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "27E24442-6697-4D2D-9515-43E4370474B4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i7-10510y:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FD97F84B-ED73-4FFD-8634-10631FEE03EA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i7-10710u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5E7092CF-E482-4103-8AF9-A4C19238F9D5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i7-10710u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DA491401-C484-4F77-ABF8-D389C94BF7B7",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i7-1065g7_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8F807F51-D647-4867-BBDA-17492346EB64",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i7-1065g7:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2243674B-E505-4FED-B063-953A1569EA30",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i7-9700t_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3BF1493D-E866-4FA7-93A6-2461053A5C0A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i7-9700t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AC758216-672D-4F7B-8CF3-6433B06AA2FE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i7-9700_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5D6E7038-2BFF-4372-8D28-2C72017EADB6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i7-9700:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A6D63DC7-0623-4777-86EC-06697FEBFD10",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i7-9750h_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "80F1B914-F1E3-4B69-BBBD-0F1E9CEF8835",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i7-9750h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "867027D4-9EB4-4BAB-BDCC-FD43A087442F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i7-9850h_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7BB8CB49-D52E-4C92-9CD5-465615916213",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i7-9850h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4D0320CB-05E3-4D5B-BCEF-D862566B0AA2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i7-9700k_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6CCE2EBC-82FE-49AB-857B-403C7ACE5091",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i7-9700k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1FB0C1DA-60C6-4C9E-99D6-7A47696DACD8",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i7-8565u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "50E893B9-92D2-4EA9-BDC6-0E73CA4EE484",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i7-8565u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F41025AC-6EFE-4562-B1D1-BAB004875B06",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i7-8500y_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2495E71F-8DE8-482E-A903-FA00E9A3C697",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i7-8500y:-:*:*:*:*:*:*:*",
"matchCriteriaId": "957F3AC9-D071-4932-B2C9-1643FB78BC7A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i7-8086k_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6A2FFBF5-FA4C-4213-BCBA-D129EC925466",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i7-8086k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0304CBDA-AF3E-4F32-BF45-FD2199D1E025",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i7-8750h_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CBB43D3B-BC91-46F1-840E-F6876095FAB9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i7-8750h:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C9B77426-B579-43C6-9340-F291138ECD7A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i7-8559u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CDE91A3E-B3EF-444F-A518-9027C1D65C01",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i7-8559u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CB6774C8-431B-42AC-8955-02B529222372",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i7\\+8700_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CB6BDE7D-711D-42F6-97EC-5A0E84BEB07F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i7\\+8700:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0EDCD661-394A-431F-84C2-0252ABD6F1B1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i7-8709g_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9EEE5E85-132B-4C11-B2C1-3F1AFEE3BE5D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i7-8709g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "08718840-D468-4E86-8FFF-A2B1841E6BF6",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i7-8809g_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "53180F59-BE75-4A62-99ED-3602C025E388",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i7-8809g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DD0CF1E4-487A-4C61-AF4E-733D7ECBCFCC",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i7-8705g_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "88971837-5ED9-442C-BAF2-1C6C31105EB8",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i7-8705g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D4DDEFAF-EEC8-441D-82EF-ECF20B9496A4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i7-8706g_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9530B87C-B5C7-4EE6-BE29-A559BFE9EC18",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i7-8706g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F423BBE6-327A-40DC-8BCE-BF43600A68D5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i7-8550u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2F4E3B3E-5225-49ED-9159-4503DCDED473",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i7-8550u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1395788D-E23B-433A-B111-745C55018C68",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i7-8650u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2E4EBD70-06C1-4842-AF3E-970218816B18",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i7-8650u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AC82E058-25FE-4B6C-BA3C-AB043CFAB113",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i7-7700t_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "65ABD229-0EF3-44AC-AD87-6C42EF48BF2B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i7-7700t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2FE6AE98-E4D9-4FBF-B90A-2B170A0AF26F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i7-7820hk_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2E88CE3A-812A-4C01-B0D7-D9A154FF2187",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i7-7820hk:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FA47107D-237A-4184-8BA2-601660F7FB5C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i7-7700hq_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4D8BAD9D-7253-492A-87B3-CACCF66A332F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i7-7700hq:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2A13E353-0063-468B-96CD-97BF91C747C9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i7-7660u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EBFC1253-B337-4F9B-855D-14A3F6AE7EDB",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i7-7660u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CEE126ED-B743-4C6D-95FF-04F473A9A008",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i7-7560u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A20E7888-D3A3-4A01-8328-71A81AA0A52A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i7-7560u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6A97ED15-D0C6-4B64-BA08-EE50A6990272",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i7-7700_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "988EDA03-EF3B-402F-B3B4-74BA32A1BCCC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i7-7700:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4D901944-8E2B-41E5-BB82-CF1C97064711",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i7-7567u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "77C3D738-944D-46A1-A542-32C96A021964",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i7-7567u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E6A121D8-0D01-4AA7-A1D9-5E2B9F0D30A6",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i7-7700k_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1D3E61E4-8FE1-47CC-9A9C-1A4F17C11938",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i7-7700k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "913BBEFF-49E7-42AF-A850-B49E5A12AB98",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i7-7920hq_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "80A4E442-8E2C-472B-A9C6-56B58B6B55B0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i7-7920hq:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EE6572E2-5B24-4E21-9F6F-3A7A17A9F098",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i7-7820hq_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "43695191-7897-4028-A8DA-F45D2B4E0C38",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i7-7820hq:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E9862E49-124E-4B7D-941A-CFD2668B6481",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i7-7500u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "45D72230-B7C2-4A9C-928F-328666CA3988",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i7-7500u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0D566CFB-935B-40E4-9F4E-6216A42E7EBA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i7-6970hq_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "37ED0DB6-A589-4CB7-87AD-102FE7490AC8",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i7-6970hq:-:*:*:*:*:*:*:*",
"matchCriteriaId": "49BDD476-E402-408D-9BD6-886AB195704D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i7-6870hq_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "20EE53DA-4639-4714-B956-CC69BBCC6D26",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i7-6870hq:-:*:*:*:*:*:*:*",
"matchCriteriaId": "87B5258B-26E4-4853-9F27-4BB12886CC38",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i7-6770hq_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A5DD0B86-37A4-4927-97C5-86B165590105",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i7-6770hq:-:*:*:*:*:*:*:*",
"matchCriteriaId": "31C57E58-66E3-4FEC-A88F-B82C4B372B2B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i7-6500u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "53B450C9-CDC4-4047-AD77-19A4BC9CB870",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i7-6500u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6CAD248D-0B95-4BE1-917F-E0976447927D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i7-6700hq_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BC8851E2-CD05-4575-83E3-F801C1785A59",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i7-6700hq:-:*:*:*:*:*:*:*",
"matchCriteriaId": "213B09CA-91E9-4D11-AA11-B84F40495E9A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i7-6820hk_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6484B4DA-85FA-4BF9-9B4A-157BC2ED2889",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i7-6820hk:-:*:*:*:*:*:*:*",
"matchCriteriaId": "638549EC-1BB1-4206-B8DC-C0101BBEF8A3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i7-6560u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F72876C5-C084-4DD3-9BC8-894C4BE40C15",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i7-6560u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5726D5D4-F188-4F06-B78A-2C7C694A40E3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i7-6567u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "43CEC4C5-B559-4A48-A1D2-7CDB96381CCB",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i7-6567u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "72467515-7793-479B-BABF-839275CA9AAD",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i7-5850hq_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C36021BE-D024-45E4-BAFA-65763D72A260",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i7-5850hq:-:*:*:*:*:*:*:*",
"matchCriteriaId": "466ECE77-E232-4C03-83A2-FBAC06C82021",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i7-5950hq_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E2F5DC2A-9916-4F01-BE70-AAB9061E51A5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i7-5950hq:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1D98586A-473F-44D7-B299-9480129AE8DA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i7-5775c_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A30C6FFD-0620-4FB4-87CC-083A53121171",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i7-5775c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5ADC848D-C1AF-4FCE-89B4-DD3ABA050202",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i7-5700hq_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9242800F-847D-43CE-8611-DBFBDAFAF79B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i7-5700hq:-:*:*:*:*:*:*:*",
"matchCriteriaId": "91CEC4BC-098C-4B8F-AA4F-25B9211010D6",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i7-5750hq_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F885A622-CC74-43DB-9C05-633EB7693296",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i7-5750hq:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9453959E-FB00-441B-B9B6-4BC75DD534B5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i7-5500u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0ACBF161-3C32-44B2-BD31-5FDBCCCFCF62",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i7-5500u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C34148EB-C6A7-49DE-8139-316F710D57F5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i7-5550u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AC9FDA96-4E83-4038-ABF6-134BAD1359C8",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i7-5550u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0EA33B05-493C-4F55-82D9-5F2C942A603D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i7-5557u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B0B6F4C5-CECA-4D7A-A4F4-A9BD38AB7114",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i7-5557u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7E8D6B87-CA43-4773-B13E-EB07128E5501",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_m3-8100y_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E600C57D-AF4C-44F2-B1FB-E6B7D6CBE58F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_m3-8100y:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E5AFFC8B-3AC1-49B4-9A73-18A3EC928591",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_m3-7y30_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FB4C2ED4-CF69-44D8-859F-9A186FFF27E4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_m3-7y30:-:*:*:*:*:*:*:*",
"matchCriteriaId": "18340F86-5545-4EEF-9F79-6560BB24F277",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_m3-6y54_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "41BA903F-DA6B-4DBB-8DB8-FEC204BB592B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_m3-6y54:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9E10BE6B-C65C-43F9-8973-71F383BC2491",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_m3-6y30_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "95AA95C2-806A-4F8B-BD55-EDCEC16A587C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_m3-6y30:-:*:*:*:*:*:*:*",
"matchCriteriaId": "831048A2-657F-4F2C-83AC-802DF45204A5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_m-5y31_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2DC64A4A-5397-45C8-A9D7-1C6FA8CF0929",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_m-5y31:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BF8CEB91-F0AF-4254-B566-5B69D25CBFBC",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_m-5y51_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5A9E35A1-C36B-4106-9085-1258E8276CA6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_m-5y51:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B0A5C29F-3597-4846-8CEC-74C8C73740C5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_m-5y10c_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "59288E55-4880-42D0-8022-1FAB33E468FC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_m-5y10c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "232B0352-B020-4CAA-A5E3-38E75A157C4C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_m-5y10_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "758AD850-98AE-47F5-ACC3-146BC712ECA3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_m-5y10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "71AF96FE-EB28-474A-B260-EC22B4A334A1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_m-5y10a_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "927FB6B2-68DE-4396-9F11-9DE7FF20C80D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_m-5y10a:-:*:*:*:*:*:*:*",
"matchCriteriaId": "80F61261-1AF5-4B77-8065-25A6B0AFFEEC",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_m-5y71_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7643B75E-E3F4-4D99-9DD4-D26D68D169C8",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_m-5y71:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3F011F80-4FBA-490D-AF5F-F6DDC941CB61",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_m-5y70_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FAA0EBB7-B00B-4E07-AD14-E68B0243F113",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_m-5y70:-:*:*:*:*:*:*:*",
"matchCriteriaId": "091D17D3-213F-4EC7-81C3-CD96AB7BC89C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_m-5y10c_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "59288E55-4880-42D0-8022-1FAB33E468FC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_m-5y10c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "232B0352-B020-4CAA-A5E3-38E75A157C4C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i9-10980xe_firmware:-:*:*:*:extreme:*:*:*",
"matchCriteriaId": "06F38F1F-60D1-404D-84D1-71D2177794FD",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i9-10980xe:-:*:*:*:extreme:*:*:*",
"matchCriteriaId": "AA77EB1A-4DE8-4E4E-88CF-DD61B2B5F856",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i9-10900x_x-series_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AD997296-FA99-4B86-9AB4-F32AC995CF92",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i9-10900x_x-series:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BBEFFBB7-DEE7-47C4-97AA-80B605ABDB2B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i9-10920x_x-series_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8AFF8A3C-A15F-4E36-B1F5-203D5F3676CB",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i9-10920x_x-series:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4A9F7D8B-6F09-45E3-98A5-D2DE96B826CD",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i9-10940x_x-series_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7EE90793-CBD1-4323-919B-56BCE6559BFC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i9-10940x_x-series:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D42F4199-D46D-4684-B8F3-E7DF07AB9BD4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i9-9900x_x-series_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2D6DDF82-F8FF-4726-8DE0-11BC8B052B94",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i9-9900x_x-series:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B921CFEF-E54C-4D19-9065-EB5AF5FFBBB4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i9-9920x_x-series_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "236FFB25-391C-4E91-B689-D255EB972CB1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i9-9920x_x-series:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F20D826D-2F49-444C-B39D-B6724F1C79C2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i9-9960x_x-series_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1E4618A1-012E-4921-A36B-4C3DF55D38DF",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i9-9960x_x-series:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F14A2EAD-9263-4F85-B961-75ABD3C4D7EE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i9-9980xe_firmware:-:*:*:*:extreme:*:*:*",
"matchCriteriaId": "5C281835-B593-4824-A061-F042409D855C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i9-9980xe:-:*:*:*:extreme:*:*:*",
"matchCriteriaId": "CED07547-1A34-4484-8032-CC33B8A24254",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i9-9940x_x-series_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "71EB0AC4-635E-4BF1-8FD5-150BA64BEE62",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i9-9940x_x-series:-:*:*:*:*:*:*:*",
"matchCriteriaId": "91233812-6832-4D68-BF8D-D684800405C5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i9-7960x_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DC956D6E-B4D0-44F0-BE83-6BCCE5ECC480",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i9-7960x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2FBC4FB5-7C2D-4E10-80BB-3951FFA3A6CF",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i9-7940x_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6E89BBE4-2243-4AF5-A63C-4BD45C62C446",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i9-7940x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BAC07903-D4B7-423F-9F79-7DF45E5350BB",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i9-7980xe_firmware:-:*:*:*:extreme:*:*:*",
"matchCriteriaId": "FF762097-B0AA-409F-8AE4-EB1A3E33AD30",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i9-7980xe:-:*:*:*:extreme:*:*:*",
"matchCriteriaId": "DE0858F7-9527-41DF-B6E7-AF0445A6A934",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i9-7920x_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4FED84E6-8E54-4630-9D95-FD2F8EDF4C89",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i9-7920x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "58002875-D63D-4ABD-A8B7-DCAEB7E94AE4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i9-7900x_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9E714DE6-C7C7-44B9-B824-7FF85DA89A86",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i9-7900x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8B97260E-1D7A-45B5-AD86-EBF8CA259FE0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i7-7820x_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2F87618B-A8DF-46B0-880F-422CD2E52826",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i7-7820x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "43756EB8-9F85-4499-99F0-43E69CA3F470",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:core_i7-7800x_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "16DE2C40-E8A3-418A-99B2-DD0D19814071",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i7-7800x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8580A81E-8BDE-4EB5-B830-6AA7550A25C4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:pentium_gold_g5620_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A16C20E0-57F2-422E-ABD6-5BA1E35FC590",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:pentium_gold_g5620:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AF098E89-4979-45DB-AF4C-A5D0F5CE6F67",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:pentium_gold_g5600t_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EF28D26F-9E8E-42EC-B80C-CFA8A33E67BF",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:pentium_gold_g5600t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4861FF06-6720-4E5A-B599-F7F96D7D4FE6",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:pentium_gold_g5600_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "32B73E3E-322B-4BCC-A1AF-AF9F763073F7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:pentium_gold_g5600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FF3F6453-51EF-4509-94CB-24E8ECFBAC5E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:pentium_gold_g5500t_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "11E57CFC-7A4F-42A3-9637-BF296CC7CB22",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:pentium_gold_g5500t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3D6425C6-A338-42A0-B236-12B33147931D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:pentium_gold_g5500_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EB623CE2-3D25-46F6-B7E6-08825275D9E9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:pentium_gold_g5500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6C96A17A-44EE-4FD0-9187-9BB9202AA9C7",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:pentium_gold_g5420t_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DA31DE89-2BE5-4743-9694-A37DFAEC2C36",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:pentium_gold_g5420t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CFB28789-A195-4EB8-AE96-6E1EFEE93E6C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:pentium_gold_g5420_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D9116354-0807-4089-A6C1-9A5DF87D8795",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:pentium_gold_g5420:-:*:*:*:*:*:*:*",
"matchCriteriaId": "64D3350F-8083-4FD3-9432-36C10EE911EB",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:pentium_gold_6405u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "68E166EE-7DF9-442A-874D-4CBB6F54702C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:pentium_gold_6405u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DE118AB2-A2C4-452C-B9AD-DDEF65B5EC67",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:pentium_gold_5405u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9CFD3C92-94FE-44C6-B3CD-F620BC61F292",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:pentium_gold_5405u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0D376C32-99BE-4DF4-A63D-2156D10EEA73",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:pentium_gold_g5400t_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A6FF2583-34CA-4D67-8E8E-3E790EB00DD3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:pentium_gold_g5400t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4EB78854-1E03-48F3-BC86-B0934641B47E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:pentium_gold_g5400_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D12EFB3F-E57A-49AB-83E4-48BFA59D3704",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:pentium_gold_g5400:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5529CD96-F41E-4DD5-A9BE-6BDF84F9A9F7",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:pentium_gold_4425y_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C2F82796-786F-4EB5-9138-29E2668586F7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:pentium_gold_4425y:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C04332C1-9652-44ED-BD97-5A6AD0A4E6B5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:pentium_gold_4417u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EF481FDB-1FF5-4D0C-A537-E22ADAF7913D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:pentium_gold_4417u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "421F0AF2-5F41-4F0C-A909-D76D72AB5FCA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:pentium_gold_4415u_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1C1237FF-E3A8-4491-9FBE-995820495490",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:pentium_gold_4415u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F76BE235-C991-43BB-B145-239D95084BC8",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:pentium_gold_4415y_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B5DE990B-B3E8-4037-8502-8C72575A9BB0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:pentium_gold_4415y:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6748F85C-A99A-4380-B01A-A51DBD43AED9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:pentium_gold_4410y_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "28381986-24F5-48B7-AADC-886D040D037F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:pentium_gold_4410y:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6B485AC9-B986-4100-90CC-E4BC9B1AAFD1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:celeron_g4950_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7512275F-3577-430B-9377-44EA37FBA308",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:celeron_g4950:-:*:*:*:*:*:*:*",
"matchCriteriaId": "22828766-08EF-430F-A0F0-F59E772E38B2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:celeron_g4932e_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7DF7727B-7F22-4B85-87A9-EBBBC783C140",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:celeron_g4932e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "37662BCE-5344-4938-8AE7-2025D9F4D4AA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:celeron_g4930t_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DB2E14AD-3B48-40EF-B07C-675445A73AB0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:celeron_g4930t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B130F009-C77E-496D-9A6C-1140559A54FE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:celeron_g4930e_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D70B1E1B-B170-4C29-AC1D-7A51A0FBC33D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:celeron_g4930e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CCE7313A-56E8-4041-9CF9-9BBA430CD9A8",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:celeron_g4930_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DE8499B5-2CE1-4E17-AD0D-48EBCC464251",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:celeron_g4930:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DA2A4A2A-CB99-4AEC-B0EB-11763E6C0E0F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:celeron_g4920_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1EB95463-05B4-4BCD-894E-3EFA944CB418",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:celeron_g4920:-:*:*:*:*:*:*:*",
"matchCriteriaId": "26E9CDAC-8C63-4F9A-B171-9E5E11E5313E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:celeron_g4900t_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "52ED8318-017D-4941-8D5C-B6CBB89B0B4B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:celeron_g4900t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2129E439-63C1-4CBF-B39D-2941621AB454",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:celeron_g4900_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1B0288C6-F7DD-4D0F-9C3E-0C0835FD5ED3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:celeron_g4900:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7B801EF4-980C-40EF-84A8-4AA2D29CFB06",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:celeron_g3950_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C5CFD725-7C31-4020-B5ED-C47C310717BB",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:celeron_g3950:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AC3B9962-455F-4215-9E0D-4AE380C36DDB",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:celeron_g3930te_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "30C55884-A90F-4FE7-B4C9-772ECD1606F3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:celeron_g3930te:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B9278297-5E4B-40D0-8782-E5AE87E43B7B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:celeron_g3930t_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "891BC1FA-F2D3-40DF-B9C2-760DBA21BFA6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:celeron_g3930t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E5EF6E96-034B-47B0-8B88-5D5EC9B995A5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:celeron_g3930e_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E197F6CD-BB7F-4053-A92C-63D1C0ECB55B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:celeron_g3930e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "226CBC16-EC2A-4498-ADB3-655A0E9CF396",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:celeron_g3930_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "50F2F50E-8D52-41B2-A43A-369D213D826A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:celeron_g3930:-:*:*:*:*:*:*:*",
"matchCriteriaId": "83A9423B-08A0-4721-8868-7E7E3E0ABA4B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:celeron_g3920_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E3BBD0DF-DC34-40A9-B0B3-4A00847AFA2E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:celeron_g3920:-:*:*:*:*:*:*:*",
"matchCriteriaId": "77D7291F-752E-409F-82BE-6060BA5E2559",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:celeron_g3902e_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0C49ECFD-BEE9-4AA1-9341-B29CBB0CA5EE",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:celeron_g3902e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "11A64939-F09B-4FEC-8F1D-FAC34D8E14BC",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:celeron_g3900te_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "74B99121-D844-44E0-99E7-9C4C5CACB138",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:celeron_g3900te:-:*:*:*:*:*:*:*",
"matchCriteriaId": "25BC4638-06F6-41C9-BF0F-74037F24CBEF",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:celeron_g3900e_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3F6DA909-971C-437D-BA18-46C2D8E37E99",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:celeron_g3900e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C02B3D0E-93A7-4DCB-8CE5-7EEEA58FFEF6",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:celeron_g3900t_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3F055D55-7881-4416-AB20-217490A3EB5E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:celeron_g3900t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C5723C9D-E59D-4FA3-893F-D79E726025C3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:celeron_g3900_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C609DC3B-BCC1-48D8-8BDA-5F2C441A96A0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:celeron_g3900:-:*:*:*:*:*:*:*",
"matchCriteriaId": "25847980-2D7B-4D4B-B0F2-C2CAB648182C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:celeron_g1850_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "70AEAA58-AAF4-4051-B32F-EDE7FF0D94CE",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:celeron_g1850:-:*:*:*:*:*:*:*",
"matchCriteriaId": "95826FC7-9E92-4C6A-8F16-9D20B8E41F75",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:celeron_g1840t_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A4E4A59E-E56E-481B-A4FC-AA945FD385CF",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:celeron_g1840t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AAD76063-D9C2-4F41-B7D3-29A32678B527",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:celeron_g1840_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "26096550-52F7-47F8-AB60-0BAD6D027A27",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:celeron_g1840:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B72870A6-E156-46AE-A5C4-B9B8F10C147D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:celeron_g1830_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DEBF308D-57AD-4496-BEB6-2BF8846FD073",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:celeron_g1830:-:*:*:*:*:*:*:*",
"matchCriteriaId": "95101653-A2BF-47F5-A209-097CA98A91F2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:celeron_g1820te_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DE4B0328-4EF4-49AC-88C3-3670FC93742B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:celeron_g1820te:-:*:*:*:*:*:*:*",
"matchCriteriaId": "ABDC4948-B063-4327-890A-C8D9F955C7B9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:celeron_g1820t_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C2A1AAD6-A1D5-4E02-AE56-BAD08E08AFD1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:celeron_g1820t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B950F6FC-2848-45B7-9C28-B0DF46BC442B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:celeron_g1630_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "36E5FDDD-7636-4EFC-BF8B-8547F98384CE",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:celeron_g1630:-:*:*:*:*:*:*:*",
"matchCriteriaId": "06FFA194-E200-4F4D-8E66-60D0134184E2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:celeron_g1820_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "32DADA64-13AA-45F6-92C5-70E9D296F976",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:celeron_g1820:-:*:*:*:*:*:*:*",
"matchCriteriaId": "12FD8D3B-0FC0-4E8A-9476-3092BAE9F15E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:celeron_g1620t_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DE48A4DB-9B6E-4C3F-9AE7-9307A4051314",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:celeron_g1620t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0E4AC5E9-94DB-4970-BE29-747503AE81E4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:celeron_g1620_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EEDDD723-6AE4-4A7D-B328-8AAB2984E0EE",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:celeron_g1620:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B67D44E3-F8E1-4EB9-8D91-5777DC97D497",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:celeron_g1610t_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3ED6B2FB-F92C-477A-B339-40D6BDE7B04B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:celeron_g1610t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FADF19F8-54BB-4BF4-BF1C-515EBBEE2060",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:celeron_g1610_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9B09B21C-23FC-4205-80E3-BC929EB037FA",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:celeron_g1610:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4003B029-36AE-47CD-BFB1-1F06DFEBA0C6",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_platinum_9282_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C1D43F33-6733-49BE-87B2-14936230E5C0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_9282:-:*:*:*:*:*:*:*",
"matchCriteriaId": "89421EC5-52E5-441F-AD3B-5C5E964F836D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_platinum_9242_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3BFDF125-D5BD-40A6-8958-68C8F93C913F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_9242:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6DF8D8C4-29EA-4D09-87AB-A570403BA0E6",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_platinum_9222_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E589B7B4-46E1-4426-A392-561AA0557D7D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_9222:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0A7019D4-58E0-4B73-93B8-D3B0E86BF2D4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_platinum_9221_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9CC474D2-B800-4EA0-A06F-FF69E52FC438",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_9221:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DBC93757-5FD7-403D-B5ED-CC8793002352",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_platinum_8280m_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9E2C6506-97AA-4E82-9678-E98C58D3F4CB",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8280m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4C950976-266D-4258-86CB-8987C093331F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_platinum_8280l_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C3829529-3EC5-4681-8902-AA581D9C2DDC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8280l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E0CAB607-87B2-49F4-9FAB-662D5EA3D11C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_platinum_8280_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BC7F4E55-3AA3-40EC-8686-719F8474B3B1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8280:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0951DB50-AC8E-4C17-A2A9-DD4A198C4DD2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_platinum_8276m_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "71D9A1F6-A5BF-4456-9908-A767CF2FF866",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8276m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "11562A6B-26CD-40A6-9184-7CA128E1F017",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_platinum_8276l_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AE0F5374-5A1A-4F56-BE42-E1D0F79ADD52",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8276l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AB3C00A0-C28A-46EB-853D-DAE3819399D9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_platinum_8276_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C35F1845-F913-43E2-AA05-F64FD0A6A736",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8276:-:*:*:*:*:*:*:*",
"matchCriteriaId": "185E8FBC-9EE9-472E-867B-0B0DEEECA13E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_platinum_8270_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0FC1E633-52B0-48EC-B8C4-3EA396F4CEAC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8270:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2C24951-B3FA-48E6-AFAC-6CA0D2348230",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_platinum_8268_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8F5D6779-B826-418F-812B-D1AD926E2D7F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8268:-:*:*:*:*:*:*:*",
"matchCriteriaId": "74ED727D-B1A9-4F4B-92C7-3F00F3A80013",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_platinum_8260y_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "91BA9357-FDCE-4FE2-ACC1-065E6C0C6994",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8260y:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BC4A437C-6C00-4729-91CC-D27EB3542633",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_platinum_8260m_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "10B8978A-6621-41F4-AEAC-27B3FC5029B7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8260m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3219701A-8CF0-4307-A957-1E31F6A5C195",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_platinum_8260l_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F7F2F3C4-28A2-4C3B-9136-B222797FCB0D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8260l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "955420F9-3A3F-40E0-9940-DD43C5C78D62",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_platinum_8260_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5D076A4C-EBFF-47CD-898C-E3D8595897DC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8260:-:*:*:*:*:*:*:*",
"matchCriteriaId": "28B167F1-63FA-4C86-84AB-836ABF84E6E3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_platinum_8256_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "433CEBA3-2B72-404D-B561-957CEAC0A5B6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8256:-:*:*:*:*:*:*:*",
"matchCriteriaId": "54AF128B-9984-4C91-B7F6-968DE376C3BE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_platinum_8253_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "823AD74E-785B-40C9-BA27-F988F5006263",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_platinum_8253:-:*:*:*:*:*:*:*",
"matchCriteriaId": "94A6DA7A-7C97-40E1-B31A-B92BB658C429",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_6262v_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BA876028-4021-4B58-94C2-89CEBD9CBA23",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6262v:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0B704835-1250-44E1-923C-5DE2F4DD25D0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_6254_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B7AF2819-C873-41A9-94F5-B8B34EBC9633",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6254:-:*:*:*:*:*:*:*",
"matchCriteriaId": "96E2764D-7D6A-4CE0-A628-FFE966A6462F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_6252n_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C9FC9FFD-4D81-431D-BAA9-C112CD0BA3D7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6252n:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3BA58EFB-7672-4902-ABC1-65217AA617AD",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_6252_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "761A4FF6-04FA-4DF4-AD51-58DA0211BA1C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6252:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1BAE2B11-B0F5-415F-BD6B-E285EF9C9095",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_6248_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "24EEECD1-018A-47FB-8CDA-6786864994B8",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6248:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CAD0B5C3-633D-4F2A-8D56-8FA83F1B581C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_6246_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BAC462EF-264D-4365-A965-0BCE9C687496",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6246:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E8C1742C-96CC-4BCA-928E-D6B53ED2DB0E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_6244_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "67B0B7EA-DBC1-4E02-A33E-7180FAB684F6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6244:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BF72F37A-2F28-40E6-A84B-0E1DF63B1812",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_6242_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "262ED175-6056-4FD6-840C-F4523A96677D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6242:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0C8292CC-DACB-489A-BCB2-73DC2C6F944C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_6240y_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "19C76503-5F56-4C2B-8973-A3F94B1345DF",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6240y_:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CD16D252-4D55-4DE2-947D-00778A7D491C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_6240m_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DB3943BF-B43A-4077-B75D-EBE27C3D6A17",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6240m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1E231B13-FC1B-41E3-A47D-4F0FC4F37B33",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_6240l_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7E317001-0126-4B64-85AE-04AEC9954085",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6240l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "02BCB7D2-4B68-4FF8-BFC9-06C39A708C62",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_6240_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "215608D2-0F48-4E32-963A-2DFE74A84557",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6240:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DB72D13B-5880-4CB2-8E80-CB6A39B5A302",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_6238t_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B880E026-665A-4519-87D4-4DCA08977033",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6238t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0E21977E-7085-46C5-8E89-F952C2EBCE04",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_6238m_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8D544957-C9D8-4AC1-A7DE-7E6FE000E2E3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6238m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "352D121E-69C0-470E-AE02-8413DCBE1DC1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_6238l_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "69C5FB6D-C652-4743-84F0-D7BB55F2733F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6238l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EF7B4C84-1258-4F2F-B8A3-55353B3D13BA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_6238_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1B51741B-1976-4998-B5DC-5AE1D62F6864",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6238:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3CD3E45C-1943-42BA-9F6D-EA64D67BF954",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_6234_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "19031868-9913-4170-9F69-C5582CC4C2E0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6234:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F83F8602-6679-4B3C-BBDD-3BDB2B317F70",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_6230t_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7EF270B2-06F6-4726-B01D-867A8F584810",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6230t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0FD24563-9157-4DE1-95ED-D4E3E879219E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_6230n_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C0BF2AEF-5988-416A-B8C3-CB0919562B2B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6230n:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2BBB5A97-EA4F-454C-819C-DE1CE7018E7A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_6230_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4C0E2164-CFCA-4236-A6AD-74484E387639",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6230:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EED0D492-ADAB-41ED-A283-024D3CED441F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_6226_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A19FF1B1-F380-4CE7-8C09-DEFF7ED86571",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6226:-:*:*:*:*:*:*:*",
"matchCriteriaId": "831A7D63-4638-480C-94CB-ED06613BA75C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_6222v_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "938EF635-E09B-448B-A446-48890A209878",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_6222v:-:*:*:*:*:*:*:*",
"matchCriteriaId": "178345A5-9A38-4C8F-B3BB-430276FA4998",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_5222_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8AEC407A-5450-468F-B0CB-3028FF92468F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_5222:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D93CC498-F558-4C2F-9E14-7897060CA9FE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_5220t_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8141C47E-4F0B-498E-8B18-264E90448C3B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_5220t_:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0501346A-62E2-4E7D-89BB-7DB22FD3F44D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_5220s_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "728C0EE8-D4D9-4426-9709-46505AF901D3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_5220s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "067C65E5-5392-4DAF-A6BD-640D78C19CE1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_5220_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7D162F8D-5836-4B52-A98B-EFB0289C1346",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_5220:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A6ACF161-472E-4088-85C2-5940C9C88D45",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_5218t_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2411CF40-9A5F-4138-9111-84087A30050F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_5218t_:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B8649961-BC91-41C7-B082-40A2DF245F24",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_5218n_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F42D02F2-46A7-4359-94BC-7AE15EDE692D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_5218n:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AF8D06DC-6B8A-4B7B-BB3E-778D432CFEF1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_5218b_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "685FCDB3-F3FF-49C0-A26D-BFC081F2B78D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_5218b:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4C375A9D-C7CE-49A6-B08D-9CAB22E16D32",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_5218_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1CE780B7-B5C7-4475-87E8-DCD5AD3CF3DE",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_5218:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9C8F7F6B-847A-479D-B6B1-BBA331D06DE0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_5217_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "28A6461C-C6F0-4A65-A86E-4420B1ACE6DF",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_5217:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9CA49CF7-C6BE-4337-A0A8-A603D8955EE9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_5215m_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "641570F3-6C32-40C6-8486-626FD4899B8C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_5215m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "ADE3148E-2DCE-4CA9-ABE3-43779D06DD42",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_5215l_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B5AB911F-8825-4C97-9454-4F5DC5396E2A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_5215l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "070C20AB-66F2-4EE2-8134-5E40DBB9B9E6",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_gold_5215_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "54686C14-25E6-4B4B-8ABA-FB115F6DDC3D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_gold_5215:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8DA109ED-BC4D-4F70-81B2-3CE0E2B3D9DA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_silver_4216_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "ECEABF4C-68FE-4F14-B19B-0021312264E8",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_silver_4216:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4F50C03E-CBEB-4738-BDF4-DC296CE9DFA7",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_silver_4215_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4DD96F46-FB80-4E43-802B-2918F8650E3B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_silver_4215:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D356D196-8AB0-4387-A644-C5E68174A60C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_silver_4214y_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7F0E4832-F8E5-4718-9358-C2E12049B771",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_silver_4214y:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7305838B-84CA-4BB8-A350-B2D2844F1041",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_silver_4214_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FE33A02E-5A74-4F9B-BEBE-657F311C0387",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_silver_4214:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E1B4F7FE-61A3-417A-BAA9-E686A76F3A94",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_silver_4210_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4784CBB2-276A-4742-92F6-0B5A35818B7B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_silver_4210:-:*:*:*:*:*:*:*",
"matchCriteriaId": "21A62CB9-FB01-45CB-9E10-E72D87C0E1F1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_silver_4209t_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "644C5C4C-4257-4B9F-BE0C-01271B7BE6BD",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_silver_4209t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EBEFB056-0872-434B-9630-28A1AAEAD470",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_silver_4208_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9E4E951A-EFE0-4976-BB67-B3996594C8D9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_silver_4208:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FA909754-B60A-4B30-AF42-4C8734E155AF",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_bronze_3204_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A1F371BC-529E-4787-ABE6-BE7BD937B04F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_bronze_3204:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E687CADE-6E49-4284-BD41-6CA2FDD846FC",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e7-8890_v4_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FCC66FCE-6577-4E79-81D3-C718D1B343E7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e7-8890_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FD8390A9-863C-4687-BEDA-64768191E7C9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e7-8893_v4_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "04B80E35-9D85-4844-8573-37F292FAE300",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e7-8893_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D5AB45CA-5D82-4204-8274-7B0CD0B5C852",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e7-8880_v4_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DBD6D487-A6AA-4752-9CC4-07065F42F043",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e7-8880_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D830FF1B-05A2-47C3-9AA0-06F75F0CF01C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e7-4830_v4_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0CF81E50-8089-4C58-B532-66D482D05E52",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e7-4830_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "97AA9A3F-9ADA-46B6-8CEE-A46564953699",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e7-8860_v4_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3F6DBE50-7BCF-4A81-88CE-113716482740",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e7-8860_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D5B57D26-455B-48D4-BB27-6A8D84C8D5D9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e7-4809_v4_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7D9C8551-D17B-49F4-A3BD-DD393729EA74",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e7-4809_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "376E792F-A029-40B1-83B6-A0C2F40F4B1C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e7-8870_v4_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "240D24BD-A84A-4562-B850-56EB9A47507F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e7-8870_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3D3199C4-C5BA-4FC8-9539-21A6C3C85336",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e7-4820_v4_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C9FE58D0-969D-41E1-802E-39672064AE26",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e7-4820_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7FECF753-354D-40EF-8063-FF93C7FA8B86",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e7-8891_v4_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FAF48C5B-5291-413F-96BB-40A9C2558832",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e7-8891_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "113A641C-D291-4BE5-9643-21BA1FB04101",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e7-8867_v4_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "867D3D4D-D8A4-45C5-9F06-B51989C7151E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e7-8867_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E9C950AF-E109-41ED-8A3D-F7151216F01F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e7-4850_v4_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5FD6BE85-75C2-4C74-BF7C-9B9E34D4BABB",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e7-4850_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2D355937-EE3A-4FE0-B3CB-5B7E19ADE4FF",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e7-8855_v4_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3ED610EE-838C-488F-BF85-2C122CFD4012",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e7-8855_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AA4812F6-8120-4624-BAF6-2AFF8A317302",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e7-8860_v3_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DC2AAC0D-6F45-4E9E-B589-3C12CB891116",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e7-8860_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3866B454-9B4B-4A9F-88ED-F25C57417856",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e7-8867_v3_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6827B430-8BD8-4CBA-9EDD-49B6277C503A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e7-8867_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "269D1DED-2FEC-4C01-9D54-2437A0BFA44E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e7-8870_v3_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E96C09EF-E268-4814-A8A8-A9ABB80D7B71",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e7-8870_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "65131025-AA2C-4672-8E17-1EE403682154",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e7-8880_v3_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B7EE34F2-2CD1-45C2-AE5B-FD767C522C70",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e7-8880_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A5095146-CBD7-4236-B5AF-6CACC8A81B52",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e7-8880l_v3_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2BD071C8-30BB-4881-8CCF-3BD3F4554291",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e7-8880l_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "003F0372-C912-44C2-AD68-323F91D2C7CB",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e7-4809_v3_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "97B0E3F6-925B-4FBA-BC8C-CD908541A8E6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e7-4809_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "700F9DF6-CC2E-4A8D-BB6D-EF9CDA1498E8",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e7-8890_v3_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E079CED0-E785-454F-9062-9D9AFA52B68D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e7-8890_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DAF9BFF4-5F9E-4831-A77A-B53644782A87",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e7-4820_v3_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "680D9B99-C069-4BB2-842B-7EF41ADAF7FE",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e7-4820_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "49B27122-6798-4BC2-AF57-14CBFE9217A9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e7-8891_v3_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F4670684-3336-4862-ACD3-266243008E9E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e7-8891_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EA50F31B-C99B-43F5-95FB-098A21E1DBA4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e7-4830_v3_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7378F1BF-7E2A-45A2-B4C5-FD7D05AA62F6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e7-4830_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4E081E99-0546-403D-9F1E-5CC8D760BB4B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e7-4850_v3_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "736A6065-847D-4891-B108-A3BB42AEC2E7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e7-4850_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FD126CAE-5690-4AA1-B92E-68AC8B86E043",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e7-8893_v3_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1DEB6CB7-F573-4565-9C09-7B70D28E303F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e7-8893_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "925D8160-5941-4F2F-998B-A461ED896171",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e7-4809_v2_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DA0A0D87-E4C9-48DE-A598-40938A5DD4E8",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e7-4809_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7027185E-350A-4EFD-AB43-B15BD845EAB8",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e7-8880l_v2_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "92B6419E-E19F-4A5D-B942-7B3D67288E6E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e7-8880l_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DA201E96-2191-4954-BE93-0F672CFD1F02",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e7-8880_v2_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "053CDA38-15B2-4F34-9EB3-F23E1EBEDF3F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e7-8880_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DC5C4ECB-F8A1-4FEA-BF2A-78580EBE356D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e7-4820_v2_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "62E91A8F-2AD4-4D02-9C86-818375F3E5B3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e7-4820_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E42B8D5E-AE0C-4384-80A9-4CCD9C79E514",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e7-8890_v2_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B12B6A2F-3F53-4409-91C9-39569A0EB0F9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e7-8890_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "43ED17B5-529D-470E-B783-6DFD677D88B7",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e7-8891_v2_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F3224717-024B-4E8B-8F91-3790EB8377C4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e7-8891_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0F4998CB-CA47-4CB4-8969-551121B981FC",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e7-2850_v2_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9A46F320-D186-4C1C-9920-5B849FDA89C0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e7-2850_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B387A4A1-029D-4180-B461-768809298A2D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e7-4830_v2_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D55B8E04-C1CA-44C8-885A-B5AD61C7CE36",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e7-4830_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3F67CF4A-5F75-4597-B5D5-D6E534FD1F71",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e7-8893_v2_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "74C471D3-6343-4EBD-95A1-5258FDFCBA1A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e7-8893_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "41E63869-3A70-463D-B2D9-BDC27E5EB624",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e7-2870_v2_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6939D8D6-7A22-4E73-908D-5D4A3F6611F5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e7-2870_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "77CBB587-ABA9-4346-A267-350A6309F59D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e7-4850_v2_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CCF67619-A64F-4AFA-8445-6F8AC572C653",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e7-4850_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "736CB2A4-3354-47FD-94EB-4F5B0D11051A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e7-2880_v2_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "442492D3-04A8-4659-8F64-2F5844DB9871",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e7-2880_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3195A370-17C8-43D7-B560-D71C76C9066C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e7-2890_v2_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "93E55EFE-6D9B-464D-8162-89F76AA79C7A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e7-2890_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7EB82874-A214-43A2-AB8A-ADA79DBCDB0A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e7-4860_v2_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C4B546B1-F3BA-4EDE-AFA2-6C344BB554DF",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e7-4860_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2BC55215-ADB7-4058-9BAF-257D801A9980",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e7-4870_v2_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BC2660A9-C732-4805-987A-DEFAF8721964",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e7-4870_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "14122E65-8856-42FA-A19B-360373B0DBF0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e7-4890_v2_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "37A1E096-D3C4-4464-93D2-26AA2FC28A1D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e7-4890_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5A46EA87-3A3D-4D8B-BBFE-B04DBB30B798",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e7-8850_v2_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "697E1FD5-6988-4A99-A94A-99103C713822",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e7-8850_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8D1F3D12-5D2C-4FE7-9751-F430BFA0AA7D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e7-8857_v2_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "49A66CF2-DF22-409A-B41F-421D2589C431",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e7-8857_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FE2971F8-9ED5-47EC-A519-08A6CE0F0EA5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e7-8870_v2_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B37A5BAD-08C9-4A68-BBBE-BC5BF7C9C883",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e7-8870_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5C0140D8-60C5-4575-9522-47A4905F2996",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e7-4880_v2_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2BE6206D-499C-4B65-9506-7E3AB9CDD7AA",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e7-4880_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6F7D9F37-80E3-43E0-B5BE-220033C9D6BC",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e7-8895_v2_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5A6AA66A-FAE3-4FC9-8906-35271B08733D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e7-8895_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CF842E7E-780F-48F1-AC70-641B3AF12A79",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-2699a_v4_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E5B053DE-AF7F-4A0F-A78D-72AE6E144761",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-2699a_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "124DF9B2-F703-42BF-9737-1777A51D05D9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-4627_v4_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "84877243-152D-4E02-A18E-850BE2755CF2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-4627_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A8C3809F-F701-4969-A27A-294D0ACB9CF7",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-4610a_v4_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0729DA0B-88B3-4A7F-8F43-63BED1271071",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-4610a_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DB9443C5-0EF3-473A-9674-7FE3DD01601C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-4620_v4_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "942E5B7A-FC4E-4645-9D66-44BD3D46A1F7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-4620_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EE8104B9-EA92-4AFB-829A-35FDF9E1FE4F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-4628l_v4_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "897A798F-BBA4-4412-849E-E8055C310338",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-4628l_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C96C9EBB-4585-425D-81CC-9A2B0C1CF9BE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-4660_v4_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1395D579-1812-4F1B-A3F1-B38CDA7ADBD8",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-4660_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "160A9F6E-18A6-4181-A63C-5F8A13985869",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-4640_v4_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EECBA2DA-44F9-4393-BD50-A13AFFC4CA06",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-4640_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7A55CAE1-0334-469F-9230-35D607A42DA3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-4669_v4_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3E541F97-BE7B-433A-A073-F0DC2551D95D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-4669_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EC478F61-883E-46BB-A4F9-5833A6DDE6C3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-4667_v4_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "99160243-440E-44F5-A36C-C9507823E9AF",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-4667_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C1420874-49D0-4E69-BD67-26E6C9FC873E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-4655_v4_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "23278D55-861D-4BED-A378-E5AC28D64E26",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-4655_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BC5D11E3-FEDE-4453-B89D-78505BD03326",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-4650_v4_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2AACF7B5-E2B4-4F05-827E-7DC74FC0BFD3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-4650_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DD7C804C-BFAA-4886-9621-C255F2F867B5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-1660_v4_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "77FEA398-7001-4FF3-89F5-FE6709FDDD76",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-1660_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "19A506EE-01BE-41E1-BDC9-67CA676B8638",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-1630_v4_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C2B22D1E-6EDE-4E13-8B52-E532A548B522",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-1630_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DB2A5EA2-10A9-4C53-BD0E-1026D5F51B6E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-1620_v4_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "12142C64-3833-4422-AF21-4C6D3489B2FD",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-1620_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4FF717C4-6E91-4A86-87E4-D97F70E0936E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-1680_v4_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "768DA6C1-6491-4197-94C9-9B9EFC46B1D7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-1680_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BE60C16D-B9F7-4EAA-B240-92202B11F6A6",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-1650_v4_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "60BF382C-DF60-492F-B119-8659929079F7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-1650_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E0B83717-B20B-4EF9-9750-5C628DE8DA6C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-2687w_v4_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "87B2CBF6-53F4-4603-B96A-795E06F903E0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-2687w_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "953C8F85-28B4-4458-A4F0-2D55336FE34C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-2695_v4_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "628DC30A-538E-4A38-9AB9-6C6EF1224E46",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-2695_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "29A3A2F8-3908-4083-AB72-301A825FBD1A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-2690_v4_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "568E0211-9975-4C64-AE69-22BF38145889",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-2690_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BD63CDF0-0EF3-4370-9F9D-FE3DF07E39AC",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-2699_v4_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6C1AC5A5-F7B7-4FD1-B598-A8D074690DDB",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-2699_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C830F688-BCE6-4A86-9C58-DB34505EC366",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-2650l_v4_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "47EE4C7B-FFBA-4BC2-A0B0-BD7DD28105F0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-2650l_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BE67577F-3B63-4995-9E51-19647F4EBB3A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-2658_v4_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DA569BAD-9592-4D0F-9522-CB1C05D830C5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-2658_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A081C35C-0D19-4025-AFDE-C3E4C4462124",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-2698_v4_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4209A314-97AE-467E-B9A7-21CD5FE531C3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-2698_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D0DAE24C-19F7-46CF-AC3F-E38066FCE0CC",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-2660_v4_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D04C6752-81A8-4828-8865-8977C0343635",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-2660_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B7571BE1-C7C8-4FA4-81B3-9F0F7BED5840",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-2680_v4_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "13B2A639-66B6-473F-A505-4ACC70D283D8",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-2680_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EAC3D549-9EF3-436A-B672-693CB1D5C14B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-2697_v4_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8FFFA1F0-B260-4534-893A-D85546D198BD",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-2697_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9203112A-2E5C-4EF5-B34F-74E66838BE3E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-2683_v4_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8470B7D3-384E-4E14-9E22-EF867E99B39C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-2683_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DA406873-E126-402A-BBD8-46BC22AC4756",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-2628l_v4_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "89023F97-9135-434E-A078-D1337401634C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-2628l_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F826234A-2C49-4E02-B586-5CD038A90799",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-2650_v4_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "461C01B3-31DE-49ED-8DEB-C5A4F75276B8",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-2650_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A738A2D0-FF0B-4E75-90F7-E0E39D937C5E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-2697a_v4_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3CAA3389-2F0A-4CDB-9A9F-AB11314192DC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-2697a_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5E995666-F7F9-42AB-83DA-AE4202B59A90",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-2648l_v4_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0EACDE0A-40CC-43F4-B636-44AEE2F7DB71",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-2648l_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "963AD924-07BB-4E68-B817-AC2A82A5C7C4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-2620_v4_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D32C775C-5470-4C35-BC9C-5660B71354F6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-2620_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "396B0F7F-3BF1-49BF-9304-285049FBA318",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-2630l_v4_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DD73511B-5C0F-4ABE-B9AB-96756CF135CB",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-2630l_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3833A360-9D9E-4CFE-9CAC-DC9F0CDA0C52",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-2608l_v4_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7602F46C-4BC8-4826-8C2A-CAC75CF588C6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-2608l_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "284FF890-627A-4FAC-A8F4-A9B44E3DA397",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-2667_v4_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2D941351-4BEC-40A0-9B17-6D5544B9C97E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-2667_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "72781DBF-E6D4-4BDB-BD6E-9B86EB0224A6",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-2643_v4_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1089B3DC-934A-4A76-92CA-CACF68DDDDB3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-2643_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "209DE5F9-D191-4720-A53E-1F39BC6567DC",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-2623_v4_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AB4F7078-8C0C-4690-AD8B-36EC49B6145F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-2623_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A28FD72F-F1CF-4076-9523-E355C20CEED8",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-2609_v4_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B9B14CB7-E892-400E-B795-60207B554EAC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-2609_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E0F4E301-BF06-44E1-8F15-37FF5B31CB19",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-2630_v4_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AC8C5BBE-2911-4F56-B48F-B076CD3BF748",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-2630_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EC204334-6964-4DCA-A62B-BB71FFA5D4EA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-2618l_v4_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4328D1DB-7F30-4CA9-ACA9-460E14FE20D4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-2618l_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "522F7CBA-7480-43D8-A31A-B52872600ED2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-2637_v4_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FFED5267-3BA8-4B62-9F18-4ACEE09BF9DD",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-2637_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6A85ED1D-D2B1-46FB-90A4-0B47EB1EED8E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-2603_v4_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D45C3021-428A-470F-9D38-242E2BC03CA3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-2603_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FB17C45E-9401-4A21-B537-0432744403AC",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-2640_v4_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "525FC69B-A75F-48CD-A46E-1872E8A138D4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-2640_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7E1EECC4-C82D-4871-A554-61A15A496E90",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-4640_v3_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A052B17F-069C-422C-A9E0-F33AC4E57C93",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-4640_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "11621F63-45AF-470B-B3DB-75D5DAB53985",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-4650_v3_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "04560FE6-7E70-4DEC-B9BC-3F5511A2AB87",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-4650_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8AD51E71-3AC1-4130-8FCC-847A42E54DE8",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-4655_v3_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7C7DBD8E-137B-43E7-974B-157B232AF3F9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-4655_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8B118810-DB63-4CBE-870E-BCDEE722F446",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-4660_v3_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "69FE58FD-97CB-4EB9-AE29-9E2A1C261D81",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-4660_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9AAD6DC7-50F1-4F37-AC8F-39DE1ABED619",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-4667_v3_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CC283CEE-2F7D-4FD0-9906-5441798E4CB7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-4667_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9FF54142-6EBD-4460-9BA0-6D530FFC9997",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-4669_v3_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DD4EC710-2117-4222-A2DB-277617AD3B6F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-4669_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E2085B85-EE5E-4292-AD0B-9B83F9884EE0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-4610_v3_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "233A8074-2FB2-4C0D-8AB4-F1D6C575B131",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-4610_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "83311344-22A3-4F0A-B9C5-79DDD6D0575E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-4620_v3_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "18BE9398-4DF7-424B-82E0-C9A9FEFBC01D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-4620_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D2397DC1-2F80-4C14-B853-5866541C1599",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-4627_v3_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3C42B000-047E-4954-8D33-7892090AAD56",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-4627_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9144C66B-9838-4F13-86F0-E7CD30F1754A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-2695_v3_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "71F5C8AB-169E-448B-90F4-A5AF973CA655",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-2695_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "54F6F82C-1960-4178-9B50-B881C57ABA86",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-2697_v3_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A675E158-E9D2-4CC4-8015-4B60E9FD61E6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-2697_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "52DCEE26-2A9B-430D-9FF8-E08ECE03327F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-2698_v3_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E0ACFCD6-0029-4060-96C7-4C0CDF7E0FF0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-2698_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1D3471A8-01D0-46D6-AD28-F56D28672DDB",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-2699_v3_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9AD68B01-16AD-4A3A-9244-06EF8326EAFC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-2699_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "09C896D1-EF28-422D-8215-504E6F22A4FD",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-2683_v3_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4BF2D045-4033-4223-9B78-D933DD0E0594",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-2683_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BA56AFF2-32F1-4153-A89F-F86C0A2479DA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-2690_v3_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A06CBDC5-D6C5-4AA2-A837-00A0F648166C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-2690_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F64B80DD-888A-41E7-939A-FD76097B62FE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-2650_v3_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C1DB99CE-3CE6-4115-8298-A51390AA832B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-2650_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5D7C0BC0-0735-4B74-BDEF-209276A1C355",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-2660_v3_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "573A3B19-C29F-4B3E-BEBB-4F83FBA1AD0F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-2660_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "659BCA41-19B3-4C72-A4AA-05B02B02F491",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-2680_v3_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BBDBF517-436C-40CB-AD63-5C27BA0ADF04",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-2680_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "02904FD2-A03D-4332-8AC6-BA371E43D4A9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-2670_v3_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "20E7F66D-F577-405D-AB01-040D3AA654E8",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-2670_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7B0E8EC3-F041-4AF2-9401-A848845D691D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-1630_v3_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2E651367-23EC-496E-8D9D-2ED432CC511F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-1630_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9CF1837A-E1F1-494B-84E7-017DB5F64D6D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-1650_v3_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "44437C86-9B54-4790-93A1-EB52C3A2B2F6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-1650_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C6EB2911-50F8-4D96-83A1-BD9CC3FDDE87",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-2687w_v3_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1F79DE37-9BE6-4FB3-B22C-F737784DEB04",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-2687w_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "220D6074-7F5E-4ACC-AB83-919E6B96D29D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-2643_v3_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1DE9E706-1115-43A5-BE44-FB514A9E4AFE",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-2643_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0D1FCB01-384E-48CD-B2BA-689EE3F6392F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-1660_v3_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FE97A2D1-F42C-4411-863B-E5FE0A0A67B5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-1660_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0B54BEBF-3663-4D87-8F9D-6BF1A355A089",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-1680_v3_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1AABCC2F-1CC0-462C-B6F5-82D12EF15977",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-1680_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5577CD1E-E032-4AC2-81A6-B90DE9B4100F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-2650l_v3_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A853EE15-03EB-47AB-B4D6-777B52FEEB35",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-2650l_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BEBA2D48-60D1-418C-8433-0159F2BBB9E4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-2620_v3_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8327D783-9F85-4093-B6C9-5FEC4FFB7646",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-2620_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DBB8DBD2-6B19-4D44-861C-1B39D8D6849A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-2623_v3_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F444FC9E-FB26-4114-8EF1-229F67C742A3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-2623_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "95D11ED7-2F2B-4035-9B16-6217CD712671",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-1620_v3_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F53BB0D7-F212-43CA-80BE-766A2AE03479",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-1620_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6E6629A2-D63B-45B5-BA50-FB5A1EEA2801",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-2630_v3_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F8DE35B0-28CF-4762-AEDA-2062AB1FD5F3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-2630_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "397C37D9-C510-43F4-A71D-464EC1A30981",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-2630l_v3_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0C77308C-FFB3-4ECA-9C35-DAD229493BE5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-2630l_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "672563CA-755C-4FBE-AD8C-D2347BCA94A0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-2637_v3_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "79BC4A4F-0BC8-40CB-B6EA-5D61D5A4350A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-2637_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F6C74009-8116-4BB4-BFA8-F76C2462DA07",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-2640_v3_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "89BBC9D4-C17C-472B-932B-9A537A12D268",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-2640_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AAD95EF4-3CE6-44B7-800D-DF6653EE1EA9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-2603_v3_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "090551FD-DEDC-45AC-B4D4-B80CD1A6964E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-2603_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EC006C18-852A-4539-8D2B-98F4A28432F1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-2667_v3_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3E50D27E-83AB-476A-AEC3-25C64AAE49A2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-2667_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A128BADC-97D1-4781-BDA2-31F5655EE91A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-4640_v2_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "182E48F9-890A-4280-B389-65544E97B3D7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-4640_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BA0D99A2-2E71-46AE-B242-ED7C148A9F0D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-4650_v2_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "25408A87-8D85-4E50-882A-20E0C631EA89",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-4650_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "74C3477A-2E20-4A63-908A-0FFA327124C1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-4657l_v2_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3C684485-063C-4F65-8030-C413532C3076",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-4657l_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F7E29E4D-5FB6-41E7-9D12-163A45801966",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-4607_v2_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BD753924-2652-41E1-BD12-567D3231D1D5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-4607_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "516686D3-6A43-457E-AF17-3BDCEED3E3AC",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-4610_v2_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A6695685-EBA5-44D3-A570-D2697B83F1B8",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-4610_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "41C97868-53C3-4D87-AB78-8DB48B5E254B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-4620_v2_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "520AF867-E1AA-409D-B276-587E06A40CFE",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-4620_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C451DE46-2CF5-48EF-8A08-8266F5A61C40",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-4657l_v2_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3C684485-063C-4F65-8030-C413532C3076",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-4657l_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F7E29E4D-5FB6-41E7-9D12-163A45801966",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-4627_v2_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7A4C866E-7E30-4BBC-B6A9-83AE0ADA8E50",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-4627_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B43A7F44-115A-4236-97F2-77DBBC6B0217",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-4603_v2_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A787B375-99BD-43A4-AC29-468914C997B4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-4603_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "281AC544-ED68-4152-B9AB-8F4EF33FD276",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-2420_v2_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EE8A4467-704E-4FD3-A762-D067E2AEA1B9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-2420_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8174E7CD-0D66-4C89-A673-44B10ED9A70E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-2440_v2_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FBF7A852-B758-4F3F-B008-3F3C4388AF30",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-2440_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FDD77B31-3CFE-45F7-BC7A-EA03301F4D66",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-2403_v2_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "22B318F0-FFCD-4B53-9964-8E4981B95EB3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-2403_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AC101CB6-65EC-431A-9133-9D1981C460DF",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-2430_v2_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "161D039A-CB25-400C-BA82-5E4BFF0BCA46",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-2430_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "85238D83-94C7-4384-8C4C-9176591BA237",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-2450_v2_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9C4171A7-9974-4D5E-A2EB-03B06B0866A4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-2450_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A632B747-3B71-461C-9DD7-6538F3FEC2B4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-2430l_v2_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "87E0EF5B-E8D1-4A1E-BBDE-800D64E4A821",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-2430l_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0FAE8BD8-66AF-4942-B390-FB59E2A9B8BD",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-2450l_v2_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BBC076CF-59CC-453D-AB43-1C1B9C28E474",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-2450l_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4BDC7E84-F495-49FB-98E2-BBC0832000E4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-2470_v2_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "69D674B9-9DB0-47D0-8D49-84A36E59126A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-2470_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3693FF48-DA07-4670-88E0-050E85B821D5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-2407_v2_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7738DD92-8A95-4A95-B454-EF499962B6B3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-2407_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "823D8FEE-BEB5-4FBE-AB82-C058F93E988E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-2640_v2_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "888993DB-656C-471F-8999-F58CCD9BA5F3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-2640_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3987463F-F64F-439D-AA8C-8D3B46BE8E60",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-2680_v2_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2597133C-1F04-4877-8B1E-F52DF4F633FC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-2680_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "160E63F8-488E-4CD6-84D8-7DBE0FD36971",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-2690_v2_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5B8B0E82-EA2C-4DA0-8736-0611CBE96E90",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-2690_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "334BC263-6CCC-4AEF-9761-D67CF90B3C9E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-2643_v2_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3211B2C8-41B7-4580-BAFE-F2381588CA85",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-2643_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CD6B50D5-22D7-406F-8F26-586089EBDB68",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-2650_v2_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "20AB008E-66AA-46C7-9D81-056BD17C3B26",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-2650_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BE153EF2-559B-49E0-8E3D-1D7BCB5C461F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-2650l_v2_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8B022989-08F0-4E92-B0BC-03A176FE3A45",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-2650l_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6841AB88-332D-4418-B53D-7A5251240416",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-2695_v2_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3DB98515-0DF8-4ED9-B267-77326D3C14FE",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-2695_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "676C27DE-5F07-4985-ADBB-884B73D70F42",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-2660_v2_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9A905F50-A637-4EDF-842A-9B1ED386C2BC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-2660_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "739F82CF-A365-40F5-95DC-98DC227AD926",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-2667_v2_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "34D70451-86B2-40CC-B3E1-F51EE7A6C910",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-2667_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8AE6F341-B5E7-4A4A-ACB8-03849F3D4BCC",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-2697_v2_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D842AF74-CFEC-4156-A92C-37A34750484B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-2697_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "30B00FC0-D8A9-4F21-99A4-4995B8569642",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-2603_v2_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8AD04416-8E36-4A75-8308-60BD3C8CEEB5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-2603_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1F8CD5FD-5A75-4EA6-810F-E595D9D80009",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-2670_v2_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A84D8758-5625-4F48-9AE9-C24979876DDD",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-2670_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "05C212EF-D43D-47C0-9A97-1CA33289E818",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-2609_v2_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "81AFF272-AE34-498C-BBDB-6D1DF5314122",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-2609_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9E1B3DBF-C692-44E5-9E83-7F781075FDD5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-1620_v2_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D18C85F6-D85F-476B-B6B4-A01CAE2ECB1B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-1620_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CE91D2DD-BBA2-4800-BB9B-86C5BA6C89A5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-2687w_v2_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5F2782B2-B152-4E86-905F-5C352B384030",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-2687w_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1746736B-37AC-4AB1-91B6-FF46C2141AE4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-1650_v2_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4A2DC8B0-30DE-4FB8-8C63-9ED939DD323B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-1650_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F51A2316-9CEA-4212-AF6D-032E2FDEADDC",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-2620_v2_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9E2EA82F-17CD-4459-92A7-EF1AC90C7B09",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-2620_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "70101486-9324-41AC-86AF-1B9A1D953308",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-1660_v2_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F7A1C868-DD04-4349-A14F-674B792B474A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-1660_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "562B8D42-F750-46AC-8EF3-8E564CAC6AFB",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-2630_v2_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "922D7A51-FE0F-4CB3-94D3-DC289C13002D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-2630_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DDFD74D9-ABC9-4F7B-A022-E55C8C57BBFD",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-2630l_v2_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1BE0F10F-709F-4E6A-932A-B14205985E02",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-2630l_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AE8530E0-CEC4-4BE4-BF78-DB7A51D3E819",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5-2637_v2_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "96CC7E9A-C569-4059-A00C-470540C6C651",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5-2637_v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F9CDB49F-D364-4394-BE90-BA1B67722ED2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e3-1230_v6_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3214D779-E335-4141-882F-CBB3A3317CDE",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e3-1230_v6:-:*:*:*:*:*:*:*",
"matchCriteriaId": "49C57129-0A27-4142-BF6E-68A558773573",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e3-1280_v6_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "049600BA-A3FE-43FE-AEBE-CA1D0CFA33F5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e3-1280_v6:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A32F3CD6-6BA6-40E7-9580-3C1A455B3C99",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e3-1225_v6_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6C3714C5-F0F4-42F4-9F88-F8C6AD2DD68A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e3-1225_v6:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8E031BE7-87C6-4E4B-8988-020221ECAEE7",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e3-1240_v6_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "22B02BC8-A29C-48B9-B66C-2BD9C241DFD2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e3-1240_v6:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D5EFEF14-4ECB-45C9-8911-01FD7B115D7B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e3-1275_v6_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6185880A-E648-46C3-B14E-42DB61113C59",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e3-1275_v6:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7BC9CEA2-C621-4DCF-B64C-5495D3208DB4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e3-1220_v6_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F9A393CA-35AB-4F8D-9A33-9693905DA445",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e3-1220_v6:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EFD11A3F-A2D4-4B09-84D2-548F97268805",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e3-1270_v6_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "65F8523D-BA5F-4BD8-A15F-A49B12001986",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e3-1270_v6:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7F2476F2-6A8B-442F-B054-738F36613CE2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e3-1245_v6_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BAE98CB9-14D8-4297-807B-33F9B376D37B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e3-1245_v6:-:*:*:*:*:*:*:*",
"matchCriteriaId": "333364EE-BF57-4217-9517-2C1B95B826CC",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e3-1535m_v6_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C5111864-B660-4603-BC03-94A719C8D2EA",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e3-1535m_v6:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5FA12E60-4B0A-4723-8A02-3115494CD1DE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e3-1505m_v6_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7EE48BFF-CCB4-423D-968C-013060E447E3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e3-1505m_v6:-:*:*:*:*:*:*:*",
"matchCriteriaId": "542BC61B-1EA3-4C42-BB99-C9C67EE82F7D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e3-1565l_v5_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "666DC282-15F9-4FA1-AD5F-2C75D5C0EFF6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e3-1565l_v5:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BCC32129-C5DC-4D26-96D5-219F5291D6F2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e3-1585l_v5_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E35FCE26-90AE-4D68-AEA3-8C0F0E9C6917",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e3-1585l_v5:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D3C578D9-8973-4F36-8BA4-9F4F3A8E0AE6",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e3-1585_v5_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "216DE05B-001E-47FE-B35A-55319B095853",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e3-1585_v5:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D86C0CFB-72A3-4446-9601-2C956C9A71F4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e3-1558l_v5_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DEA4F635-86BE-409A-A619-9EEA4C4B4FBA",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e3-1558l_v5:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2CC6592D-743B-4656-B1C0-247F36ABE5CA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e3-1545m_v5_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F981A8EE-13BB-42C2-91D0-631247A03CB6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e3-1545m_v5:-:*:*:*:*:*:*:*",
"matchCriteriaId": "29CC9B92-CF59-4121-9638-F4D4521952D3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e3-1575m_v5_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D19BB027-D927-4D06-A580-6C6E3E077B7F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e3-1575m_v5:-:*:*:*:*:*:*:*",
"matchCriteriaId": "81F4426C-970C-49DB-950B-3F5ED17E682A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e3-1515m_v5_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FB8F7DCA-3FA7-4943-9458-13695F529BBA",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e3-1515m_v5:-:*:*:*:*:*:*:*",
"matchCriteriaId": "13B5BF22-5E95-46A4-AF05-450CFD1312C1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e3-1240l_v5_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5919FA36-0AB9-4D42-B33F-7795BD7601BA",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e3-1240l_v5:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C8BD1F0B-7B75-4A5A-A708-BDE56D237354",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e3-1235l_v5_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F7ABA76A-91AE-4524-9013-2BF843FFB5DB",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e3-1235l_v5:-:*:*:*:*:*:*:*",
"matchCriteriaId": "15DB4F8D-E42C-4119-83BD-44D6AB9319B0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e3-1280_v5_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "077BFDB3-CACE-4600-8ABE-DE079EDA8D6E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e3-1280_v5:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E6A99895-6A48-4A44-B0F7-7BED55C677FC",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e3-1220_v5_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "030F2C9A-E9F8-4B29-857A-B6A895C54A61",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e3-1220_v5:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4E629CF7-A706-4DD3-B3EB-A1F9711B0372",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e3-1230_v5_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "47759461-35C3-4F77-9D96-B4929075CC17",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e3-1230_v5:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1CC1EDA9-6CB8-4643-AC65-76B892319879",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e3-1245_v5_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E257946A-458F-4F27-8387-9CF4DB8193FB",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e3-1245_v5:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DE01A935-4048-4578-8FBA-1D12A95654D1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e3-1270_v5_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F8925FB8-D645-4DE0-A37A-4BCAEA1EBE08",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e3-1270_v5:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FA74EB5E-3D7D-4E5A-8D7D-AF902F8BCF8C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e3-1225_v5_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3760BA20-5E0D-460C-BDD5-6E456646D814",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e3-1225_v5:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E1BCDBDF-A902-43A8-94A8-13541FB8CB32",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e3-1260l_v5_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "28E61222-34B1-47AB-806F-DAAA4B41BD45",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e3-1260l_v5:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2D45FCBB-CC03-40A8-ADCE-7AE0A7AA05A4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e3-1240_v5_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1746995D-CCA1-4858-87C5-8E2DC51FDA75",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e3-1240_v5:-:*:*:*:*:*:*:*",
"matchCriteriaId": "51E0227B-8F2B-48B3-97BC-73BA1BACEED8",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e3-1275_v5_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A49E7867-14E6-4DB4-93D8-A108996F7B75",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e3-1275_v5:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F2A10975-3375-4FB3-A008-56EB2ACD2737",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e3-1268l_v5_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6CE1171D-9B4E-4134-8489-F44B2912E310",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e3-1268l_v5:-:*:*:*:*:*:*:*",
"matchCriteriaId": "28D7D164-E631-4D49-B87A-0B7885148790",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e3-1505m_v5_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4ECFB4D6-CDF8-4FE7-9B9A-41935C0431AC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e3-1505m_v5:-:*:*:*:*:*:*:*",
"matchCriteriaId": "84A77114-92C8-48C4-9D12-3ACC3030D5A3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e3-1535m_v5_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B4A3CE35-5572-4355-B063-08DA49917126",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e3-1535m_v5:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9490F926-AD57-40F3-A523-61D67486DCB0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e3-1265l_v4_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "90C7C994-C2F3-4875-BEE3-A6D082E5DB36",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e3-1265l_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2F3FD78E-7790-4CFD-88F2-46889CBE1BF4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e3-1285l_v4_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "86886117-2279-46D6-B62C-FBB85DA1319C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e3-1285l_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "51A00AA2-7D3D-45DE-9215-19CE6122DD4A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e3-1285_v4_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B76A5B9B-CEE1-4FF0-8A1C-5A39B2026F6F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e3-1285_v4:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A656CC1F-943D-4B35-931C-CFBF8F3110B5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e3-1241_v3_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B17DCB1A-730D-41F0-87DC-7CCBD1509A1B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e3-1241_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5BE15F08-0B49-486A-808F-5B647142F093",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e3-1231_v3_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B2F2A883-D83A-48AF-90E1-2FC535E6AA4E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e3-1231_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DE531899-3AB8-4540-9099-BE4A0FB75EAF",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e3-1240l_v3_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4AA49374-D24B-42E2-8189-6D8CC159B070",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e3-1240l_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F6A3E845-3883-4034-B90B-3ABB61BBD1D0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e3-1276_v3_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "97A85E3B-BD7D-460B-B96B-8C9579399302",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e3-1276_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5516A1EB-1A09-4248-A1E0-6438751DA0AF",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e3-1281_v3_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CB6806A1-022C-4B64-A4C1-C29BDF11C699",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e3-1281_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8FC720A2-BD40-4FF7-ADE3-52430B263AD4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e3-1246_v3_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "18D02D79-7C51-4AF5-9A39-AF709C5EB15D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e3-1246_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CB7C3F31-16F9-4177-B7F2-B865010A6EDB",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e3-1271_v3_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D2D4B63F-A096-4FD5-88F9-2527C1B0F895",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e3-1271_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "95F1E851-0C83-466B-A89D-03486BD90CC0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e3-1226_v3_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BCEF041E-8CBD-4DD2-A634-9FF0887E8BD7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e3-1226_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "58BEE344-48BE-4D5E-B5BE-9391255C8550",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e3-1220l_v3_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5CA73CC3-6CA3-484F-88F4-1C3B37EFB816",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e3-1220l_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EF9C696B-FA4E-419C-B036-76DCBBD9022C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e3-1220_v3_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BDD77FA3-8E42-4338-BD10-D3BEE47C62F4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e3-1220_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0493CF98-1A11-41D2-B719-6D94583232E8",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e3-1230l_v3_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "83B3CBDB-DFE4-46D5-B4C7-5199953FE499",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e3-1230l_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "73B301CD-6105-448E-B013-52F894D8106E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e3-1225_v3_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8D443B82-565B-45A3-8D16-368679215E1B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e3-1225_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "771E2F3E-3FC2-462E-93C4-12301660E6C4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e3-1265l_v3_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "ACB140D8-9E3B-474D-ACF9-A828469D433B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e3-1265l_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CCBB36F8-2022-48AA-8428-73877B98645D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e3-1275_v3_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8BB33D4D-1D42-4239-9EED-43270159B364",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e3-1275_v3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "98FA6E45-B945-4923-84FD-B34F2CAA15C1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e-2226g_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "08DFA1D1-C133-4152-A66A-C70800905E17",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e-2226g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B278081F-F900-4581-9D10-B5A2ACD2E2C1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e-2234_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "56A0FA18-C2C0-4DA1-B7A4-6BA3B822DDE3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e-2234:-:*:*:*:*:*:*:*",
"matchCriteriaId": "45689B37-5085-41B3-BA9D-F05FD07DF1FC",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e-2236_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F40D7630-3069-4AF7-B2B9-9AFF96A43AC8",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e-2236:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A7186EA5-448F-473A-8FC8-058FC823ACC5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e-2244g_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F222C991-CA9F-48FB-AC22-D8F6B837F8D1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e-2244g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C12F0C71-8F25-4C77-A3F3-1231AC53C0CA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e-2274g_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EF1AC701-DF74-457B-8CB6-FA35E0E78F29",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e-2274g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FAD38AEA-979D-484B-82F0-0161BA39E9F5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e-2246g_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C1A528C2-662C-40B1-8C71-A5A4134A6314",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e-2246g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EB179A6F-FED8-45FB-89C7-3B17D6F5EB21",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e-2224_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9C9C4CE2-F65F-41FE-947C-16AD1558D03B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e-2224:-:*:*:*:*:*:*:*",
"matchCriteriaId": "79214F8B-1090-4DCD-B1F4-0FF78FC29C4A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e-2224g_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BE808573-A9E6-4DFE-82E1-08546F5BF451",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e-2224g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DD176FB0-7427-4F2E-A969-72062BB3EF98",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e-2288g_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3540784A-1B0B-41EE-AB66-A293AC400C39",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e-2288g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5EA930BC-EF68-4AD5-AA1B-0659358028D5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e-2278g_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7C02909B-E06F-4786-ABB9-ACF5D9C5E4D0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e-2278g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "63650DBF-4DBD-4655-AE93-5CBE53F8E0FB",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e-2286g_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6C562AA0-3A76-4223-A5E4-13B2898FBC43",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e-2286g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "320597E9-6A2B-47E6-A33C-6B31A81902EA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e-2276g_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "98D6031F-201E-4FF2-A233-BF4C96ECF4B3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e-2276g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "780AB9F4-0C87-4528-B53A-69FBC4D87ADB",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e-2124g_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1A7C6423-2E99-41D6-AD38-17658F1B1D21",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e-2124g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "342E0783-288A-4DB0-A657-29937903927C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e-2146g_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B46B1D60-3FFC-4CE7-9AD0-F78B0D5D1DFB",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e-2146g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0866F1A3-8B9C-4B5A-B30D-71B3465EC80A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e-2176g_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "87C478AE-F05C-42B4-BCB6-2F0A7FE4AC88",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e-2176g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AE638E59-DF75-43B1-A6DC-10A838B05B00",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e-2136_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1490C2DA-4627-4BAC-A505-E434A81FBDC6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e-2136:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C4797D2E-1270-447B-BFE4-CC96D9F10D5B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e-2134_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1F005ED6-B7F6-45FE-8694-A09F0D1CB2E8",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e-2134:-:*:*:*:*:*:*:*",
"matchCriteriaId": "23CA9365-B1C4-4188-A9BF-19215AFF58A0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e-2144g_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A73DA92B-919E-4F75-A4A7-54E7F892BB24",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e-2144g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2CA77EB3-6F11-43BC-8B59-84217AA73205",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e-2174g_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FA4ABBE1-EE80-4FED-BBA7-A552BE31A826",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e-2174g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "331B8F10-3A20-46A8-B960-3546271CF701",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e-2104g_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E7DFFCB0-360D-4805-8472-16391178164D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e-2104g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "921B163F-7696-4C47-8FD5-1E2897471C22",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e-2186g_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A9EB59BF-2708-4C3C-BA60-F621E067D824",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e-2186g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A67B3834-E59E-47AF-A806-13A990E812B3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e-2126g_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B263A8AF-03E7-4B05-888B-3395A2B10BF4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e-2126g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D4C40F91-138F-4396-9A6B-B969F6AC30B8",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e-2124_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DA1C21E5-81FF-45EE-836B-E809C8F34440",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e-2124:-:*:*:*:*:*:*:*",
"matchCriteriaId": "43126A13-5931-4989-BEFD-E1A096F98D94",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_d-1602_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "786C8BA5-A74D-46FD-8241-12934B6C26B5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_d-1602:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1F4B6C48-261B-4B0E-BA2A-7E3060D01F93",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_d-1653n_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "394270FA-3A62-4778-9E38-70CF88B430DD",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_d-1653n:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0BE4E4AC-4E1D-4F86-A8E8-8053EE1B974E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_d-1622_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2A905368-740B-48FB-8949-D212D637E5E5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_d-1622:-:*:*:*:*:*:*:*",
"matchCriteriaId": "41FC8B26-7611-45B6-A37D-DF7025E2E92D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_d-1623n_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5A0297E3-3D66-4174-97EE-832F5E1DC708",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_d-1623n:-:*:*:*:*:*:*:*",
"matchCriteriaId": "543DB437-425F-4FF7-BDBD-FB5CC17E0056",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_d-1627_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C0D72C6B-6F57-4D37-9363-E741E2931B8D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_d-1627:-:*:*:*:*:*:*:*",
"matchCriteriaId": "97E8DD28-EC33-489F-A71C-2AEACFB16FC9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_d-1637_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8B94CF0F-0A7B-42D1-90AF-28A893DA85D2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_d-1637:-:*:*:*:*:*:*:*",
"matchCriteriaId": "10FD9FEF-2186-4416-93B7-B743657412A1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_d-1633n_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1FAC3989-A0CA-465A-9DB9-3C29D617C8AE",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_d-1633n:-:*:*:*:*:*:*:*",
"matchCriteriaId": "84B97F2B-A3D1-48A3-9FB7-755191FDD720",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_d-1649n_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "37012AFD-094E-4742-972F-AEEDDEE4105C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_d-1649n:-:*:*:*:*:*:*:*",
"matchCriteriaId": "38161238-5D40-485F-B0D2-D7621EC317D6",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_d-2141i_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "81D4C607-D5EA-43C3-AE74-301BF0BA929F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_d-2141i:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6FB59E56-9FBE-4D10-AFC0-03E0ED0A4120",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_d-2177nt_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2F8B39E8-26E8-4ACE-88D6-0AAF4E2515C3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_d-2177nt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F3757F7B-4283-4ABF-974B-59E4E2358035",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_d-2161i_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3B1F65EA-5A27-4700-98F1-B82DAAB3CCF4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_d-2161i:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F0327393-DB2A-455B-8E20-3EDB3766CDA6",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_d-2143it_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7A06D956-804A-47DE-85D2-26BEE9B3E313",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_d-2143it:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2B10FCF1-F496-4166-9162-41012C4D2B16",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_d-2146nt_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "35DE5D2A-7DCF-4398-8514-9BB88DC81B77",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_d-2146nt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FCADFB25-DCBB-4901-9E4D-132ED49C7F26",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_d-2145nt_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "440D381D-D093-474C-8D22-AD610DEAB775",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_d-2145nt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "ACAAD0F0-9182-46EF-8399-C04FB472BE6F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_d-2123it_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BA657873-A9B1-4513-8C60-29FAEC1E22F2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_d-2123it:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B804174C-53DB-4641-BD26-3ECDD9FBD638",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_d-2173it_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "93409D2B-67E1-4410-9013-28E80B2525C1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_d-2173it:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4925D0EA-D524-432F-8417-892BB8C3DDFA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_d-2191_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9976EF5C-1AFA-4FED-8248-B6638D75743A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_d-2191:-:*:*:*:*:*:*:*",
"matchCriteriaId": "14DFFCEF-09F5-4228-AB7F-F042C4D5CE2A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_d-2187nt_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "811D3C20-42DC-4EAA-8B3F-A9B52CA79DF1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_d-2187nt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "122BD094-E815-4081-B674-B71AC193BE0F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_d-2142it_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C2DF49A2-ED2E-44C3-8F0A-65E94807A4F5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_d-2142it:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B3930A6D-64DC-4953-AD7E-EED0C48B048E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_d-2163it_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "61643FC4-4D2C-42A8-ADDB-1866A6F638DF",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_d-2163it:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C2E00698-8A08-433F-8852-8EDC422A53D8",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_d-2183it_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CBE8D02A-E569-499C-8EEB-273FE003364E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_d-2183it:-:*:*:*:*:*:*:*",
"matchCriteriaId": "93D86199-5CF3-4E7A-8295-50F958EA4B4C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_d-2166nt_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "505E8798-0795-48A9-A55F-88CFF761843D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_d-2166nt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2A25BD7C-F01B-49F6-8DB0-2F8B976AC9E4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_d-1533n_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E45CD9C5-73E5-4D79-8E7C-D1A6FEA2EA9D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_d-1533n:-:*:*:*:*:*:*:*",
"matchCriteriaId": "74F2A5C9-C593-4C42-A47E-F563C4696137",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_d-1513n_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A869936B-3C49-4E13-A467-28CBA4178F40",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_d-1513n:-:*:*:*:*:*:*:*",
"matchCriteriaId": "404409CA-326B-425D-A4E5-1A3C8CC45344",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_d-1543n_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2577C819-3541-4AF5-87C1-C5ABA32AA709",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_d-1543n:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AC6E2595-D9E7-46D6-99C8-336DEB1B4020",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_d-1523n_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "712B36F5-6217-48BE-BA59-55F4AD9EACDB",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_d-1523n:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D99D4F6F-5874-4F5D-91FD-E265DCE86667",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_d-1553n_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5FBCEF54-FC1D-4AE6-BD29-D7EE7F401180",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_d-1553n:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5A84814F-B070-45B0-ABC2-1BAAA212EFD2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_d-1539_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9C57B1AE-7C36-4991-9835-8BA292598B51",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_d-1539:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EDA12CAD-F622-4F14-8847-AFD8DC250B40",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_d-1529_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B5872F0A-E0E2-419A-91B4-7A57268CCB25",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_d-1529:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BD387ADD-02CA-4154-BF86-0DBE664FE5F5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_d-1559_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3ECFE5B6-CD41-4DA1-BA61-2ED51BFE7F6A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_d-1559:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B897D23E-1BC1-4FBB-AD00-422413C1749C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_d-1557_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FB5F33C5-18B0-43B4-A478-DB0478019E6D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_d-1557:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C9BD8917-5BEA-491C-B6E8-486FF957A876",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_d-1567_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CF024983-AAB6-4A1B-BB04-DA015D59F9DA",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_d-1567:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E5C50FBC-6933-4E98-82B9-A70B1C836ED8",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_d-1577_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "540F4FFD-174C-4183-B208-9F7BA81E10A1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_d-1577:-:*:*:*:*:*:*:*",
"matchCriteriaId": "971C6442-6546-440B-AD74-44A5BB527D11",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_d-1571_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3BF2C02E-7C0D-4FB8-9D74-7CD9FAD32D2B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_d-1571:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8F8AD4D2-D48B-4F53-A0BA-A90E5A970832",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_d-1528_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FC4D8719-A1B6-4641-9116-B3530AE77DEA",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_d-1528:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4FA0A03C-21BB-4C5D-85B3-FF579F34E82C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_d-1541_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5A3B14F2-3FE9-4435-A463-55C0DDF867B0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_d-1541:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BCCDD79D-80C4-4A52-94F6-F30237AE0C53",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_d-1518_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F54775F7-3AFF-4675-A686-A2EC357FEB85",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_d-1518:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AA5E65D0-6DB9-41D2-9721-8F1232D8155F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_d-1521_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FF812F0E-DC8B-404D-ACE3-EA55FA189615",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_d-1521:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E4BAE58B-C0D2-466A-88C1-47D2A81E9D7A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_d-1531_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FE2F3B48-F432-473C-B7AA-881350F4ABC4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_d-1531:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CAB6FBF0-14B5-4DDC-BEC2-16535679B0C7",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_d-1548_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "243FB5C6-FA42-4148-AA32-8DA43D2A1669",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_d-1548:-:*:*:*:*:*:*:*",
"matchCriteriaId": "829702E9-C0EB-4E4B-A979-41A2235B182B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_d-1527_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "63259ADB-12AC-43B8-8399-0AD7A4CCF31C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_d-1527:-:*:*:*:*:*:*:*",
"matchCriteriaId": "47DB082B-E169-4BE0-81DC-B2A7219C4DA3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_d-1537_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "104244E0-C4D7-46A7-999C-07180274E8D8",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_d-1537:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EA7576BD-43FE-44D2-A665-F78BDA4D964D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_d-1520_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A442CBEF-77FC-4D2C-99D7-EE8FA558D1AB",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_d-1520:-:*:*:*:*:*:*:*",
"matchCriteriaId": "46066C5B-DB48-4B83-9E5E-3809D3F7FED2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_d-1540_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1B2DE391-0FFA-4F9E-8349-6E41267F74C1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_d-1540:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BA062554-DBBC-4215-9705-1ADA545B5887",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_w-2275_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "21189344-DC9C-4DAD-A33A-C0A9004BFD4F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_w-2275:-:*:*:*:*:*:*:*",
"matchCriteriaId": "750A77C5-1367-4E04-9ABF-1AB2D46C29C6",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_w-2295_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "87F3E569-3A87-4D31-B80A-E0FD74B25AFE",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_w-2295:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D1340A29-3428-4FAD-AA07-7F625915E34D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_w-2265_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8EF592A6-20F6-4220-8A9C-282F21EBCBF7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_w-2265:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C6D23470-A702-426D-A63C-4F7BAC158762",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_w-2255_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3D0A0072-4ECD-4F88-8BA5-8BDB026F95B2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_w-2255:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2ADF328B-D286-4C36-9F21-11A58D55D03A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_w-2223_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2D44FD82-EEBB-4388-B346-EB29B852F2EA",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_w-2223:-:*:*:*:*:*:*:*",
"matchCriteriaId": "708D6E00-A2E5-4B08-88E7-C872ACFC341D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_w-2245_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "42A4C795-500D-4B83-8DC5-327E011BA7E5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_w-2245:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D132291B-AADD-49E3-ADD6-333E1F1D8DFE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_w-2225_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "32D47430-800D-43F5-AA6E-8852969BEFAB",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_w-2225:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0CD8EE0E-2BA3-49DD-91D1-81AB67F16475",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_w-2235_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5E8852E4-C6AF-41D1-AF12-646B06C99600",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_w-2235:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AC75E5CF-4241-45A8-AD45-1F7F077CEEA1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_w-3265m_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6E23B39A-513F-4388-8F28-C711414E2BF6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_w-3265m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "020B6FED-EAE2-478C-8FF4-CB75F24E9A9D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_w-3245m_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "93849DA1-D6A5-4FA2-99F1-D8AD3B4DE8CE",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_w-3245m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "35380FB9-90FF-405F-8E2E-01C1DD209540",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_w-3275_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "25CC3D78-CE53-4ADF-9D6B-73255508FCDA",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_w-3275:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AE519C62-F5BB-461C-91EF-2979CD506C63",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_w-3245_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A054F0CE-BD0C-4E56-9EBA-79A113FCA659",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_w-3245:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DF9E723E-1095-424E-A90D-380CA0D2795E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_w-3275m_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2550330E-3A54-45BD-8B2F-8CD8D5561DA1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_w-3275m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F693457C-3529-4E62-A672-1B862F235D0F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_w-3223_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8F619828-436D-4A0B-84F6-968893B96710",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_w-3223:-:*:*:*:*:*:*:*",
"matchCriteriaId": "ADA1FA19-A836-4D6A-8C2D-718ECE6866D2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_w-3265_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "97A8F5B9-B820-4E84-9863-FF734DE45B9E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_w-3265:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2215D655-0EA9-4530-AB68-7B1C7360D692",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_w-3225_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D53DDDB1-DA94-4BC2-A934-4FFE55F0D1E7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_w-3225:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3ECEBDB0-2E0A-416B-9737-82C1FC65A06C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_w-3175x_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "639D3795-0A1B-4CC7-BD9F-B75118B4A45F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_w-3175x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E50CC669-9555-45E9-A43B-05A21FB040E1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_w-2175_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D364DCDC-2A19-402A-8285-57E5E216374B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_w-2175:-:*:*:*:*:*:*:*",
"matchCriteriaId": "15B85362-44E5-4107-AC8A-29DEE2A7EEDD",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_w-2133_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8FF3665E-34AC-43A5-BC48-3365880097D6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_w-2133:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A6F5DF76-FC10-4562-9AD9-6675F3D6CF3C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_w-2155_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B137CE46-56D3-484B-AD4B-E57C903DDEFE",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_w-2155:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7B1C36BE-D4DC-4965-8106-EDA77BDB64DB",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_w-2123_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2CCF73F8-7B2E-4B92-AEE4-F59ED8CDD187",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_w-2123:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3BA7061E-E26C-4905-AB41-18267DD32821",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_w-2145_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A7BAC9F6-35CE-4045-9F28-EE5A66C70282",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_w-2145:-:*:*:*:*:*:*:*",
"matchCriteriaId": "739731E7-F1BF-4D12-B103-E7F85B35307E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_w-2125_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A8A62225-DD72-4BDD-9BEA-0DE3577D6743",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_w-2125:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8AFC055D-B249-4EB4-8A9F-BE4391A27505",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_w-2135_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D231E6E8-6848-4914-B79F-FD44962FED2D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_w-2135:-:*:*:*:*:*:*:*",
"matchCriteriaId": "72F91FC3-CF90-450D-9E71-4A301A997921",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_w-2195_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "965674C3-2816-498F-A2B8-E02847BB6CEB",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_w-2195:-:*:*:*:*:*:*:*",
"matchCriteriaId": "63293B85-A014-4F23-97EE-6CE3467FCB06",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_x7560_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8D3C2B08-28D7-4267-8E69-D0AF625292F0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_x7560:-:*:*:*:*:*:*:*",
"matchCriteriaId": "25422B17-D407-4822-8DBC-4BA9359DEDA1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_l7555_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B8CAE085-F960-470D-83C0-F2EDF15FFA47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_l7555:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CDF1663B-29A1-43CB-B275-AAB6E2E49673",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_x7550_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C0D1EA80-57EE-434C-A600-0F945D239946",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_x7550:-:*:*:*:*:*:*:*",
"matchCriteriaId": "52043F53-97A1-4A91-A4D1-FE1C5F6B1F27",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_l7545_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9D8AB0C4-A342-4115-9B35-D1BB4E2C2CB2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_l7545:-:*:*:*:*:*:*:*",
"matchCriteriaId": "82EAFB16-FA77-4991-B341-E60A28B5A2A4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_x7542_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8036F8AF-DE82-4139-B613-77A3B0D44812",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_x7542:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C2E4D488-C448-4F3E-B9AF-19379988396C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e7540_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0151C5C7-A3BA-4448-91F3-4EF7D7C3E310",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e7540:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D6C48C2C-AE97-479B-AC3F-1354AADC46ED",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e7530_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7050699A-58F6-4914-AA24-C7FFAA976778",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e7530:-:*:*:*:*:*:*:*",
"matchCriteriaId": "00805072-515B-431A-A5A1-002484BE150B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e7520_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FE96C25F-74DC-4749-9392-6228EB949290",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e7520:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C3B4EDF0-1133-4BD2-B1DC-4028611AE62A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_x7460_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0766AAD2-8C85-4A47-B5FC-0064D7FEAD62",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_x7460:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9E56D4C8-50EA-43C5-9169-906D908DB164",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e7450_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FDFF9B9F-CEDC-4AD5-BB5D-EDDBFEABB772",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e7450:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7693B062-FCCF-4022-9EC4-DE8E38C3EF73",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_l7455_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F1C9ADAC-D05D-428F-85AC-47342654EC5D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_l7455:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D4DEEF68-3BA5-40EC-B071-30C7692D5D9B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_l7445_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0B4C3270-A6D4-4DCC-AF11-EC2CB3179B0E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_l7445:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A5793F3F-77C8-475A-B5C0-5E7A1DEF6C17",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e7440_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0169C260-81EA-4685-B72D-6FC0FAD00FA0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e7440:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8C2794E5-B463-41A5-8344-BEF354B3AC10",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e7430_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CFC82B3C-61B0-4CFE-ACF5-98AA72B41987",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e7430:-:*:*:*:*:*:*:*",
"matchCriteriaId": "845DDD2E-E8BF-42F9-982C-4BC5CBF62416",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e7420_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E020142A-390D-49AE-A65C-4DFB4AE124A1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e7420:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A5E5D43C-26BB-4E5E-9255-93BFB5EB0640",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_x7350_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DEE99082-6C63-4B71-B5A0-0CF750304413",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_x7350:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2084AA96-BD82-4FEF-9D9C-8792DC052C9A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_l7345_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "28AF53BF-962D-419A-830C-AF9E99B5BB9F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_l7345:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2E090E5E-BB45-431E-A7C6-9828E2C8912B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e7340_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0E8D0A7C-5C0C-46F9-B8AC-4D0420F5BA56",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e7340:-:*:*:*:*:*:*:*",
"matchCriteriaId": "76C660AB-9030-42E0-ABCC-4CFC7F7DA3FD",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e7330_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "913D8917-B1FF-4B58-895E-E4D80405AA1F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e7330:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0E813D3F-CD2E-445E-B60B-F87C9511763C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e7320_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "57FB7247-5827-4AEE-B2D3-52B9BDAD97DB",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e7320:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EABA3C4F-A6DF-4258-B331-B0630B6414F1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e7310_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A46E68AA-0C97-43DD-94F5-A012F62A9FDF",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e7310:-:*:*:*:*:*:*:*",
"matchCriteriaId": "67900C2E-E429-4B0D-A0A8-75D3B60ADB85",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e7220_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "44C8C57C-A381-46EB-BA92-C234F3EBC5D6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e7220:-:*:*:*:*:*:*:*",
"matchCriteriaId": "79367ABB-1484-4889-9456-867264B3A44E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e7210_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5B271BE4-CA32-445B-804D-C13064EF2DFB",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e7210:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E8F6A922-1204-4E11-BEED-E25448286DD7",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_7150n_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D62AE32E-8F7D-413C-A55A-9859CA37F0E7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_7150n:-:*:*:*:*:*:*:*",
"matchCriteriaId": "88348CEF-3629-40AB-AF21-623D7971C954",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_7140n_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6D6ACA76-8588-459F-A9C5-3EE84B367B2B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_7140n:-:*:*:*:*:*:*:*",
"matchCriteriaId": "42D974E5-A80F-410B-856C-91EA78001047",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_7140m_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EA81D1F5-0EC5-4015-A13F-4998817A0648",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_7140m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B3F3D433-BB13-4927-8191-2E9AD09A7A04",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_7130n_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1C6DA26C-5DDD-41D4-B4FE-F07808754FA6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_7130n:-:*:*:*:*:*:*:*",
"matchCriteriaId": "72B33E31-074D-4717-83E6-071FEC68D0EE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_7130m_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1CA60532-8431-4418-BFFA-8A3AFEA9F493",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_7130m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8FD33C55-661C-4E90-9BB6-141CDCBBD1C6",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_7120n_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F49B47E2-3302-4ED2-A7AC-0B8B8F7E6D83",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_7120n:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C25B4FCF-0815-47F2-9FC4-E520E4E46FE4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_7120m_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2721961E-88A2-4F08-948D-FBF0560BC0D1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_7120m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BBE75AA1-59BB-49CD-9997-F9339B0ED23A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_7110n_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6376E5AB-E6B3-4135-9243-B49BC47A6105",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_7110n:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8ED78C17-10D2-49F3-B4F8-CFCE151EEE93",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_7110m_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4988C7AF-B1C0-4072-BAC1-49F5172739C3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_7110m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0DA8F18F-CD91-414C-ABDF-069CAA55E1D1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_7041_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "66142D49-EE41-4AF6-BFE3-9E4845D56FD2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_7041:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1BDE253F-37D4-4006-A7AF-FCCD35C8156D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_7040_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FAC30AD7-4E5F-4653-B963-178126630238",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_7040:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1D0E4DAD-516F-40F7-8534-E0F40C4C6004",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_7020_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "531F12C2-3469-4462-BF6D-71965EC27486",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_7020:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2B986CE1-1E60-4DA6-A84A-9465DBA0BB2C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_7030_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9C3DABE1-774F-4CC5-9082-3B39C475D93C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_7030:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EDB0C578-2FFF-4006-BF2A-938E12600B32",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_x6550_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "43C91477-40D6-4326-AD52-23469571C05A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_x6550:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B3B3BAEA-2765-4676-AAAC-02100005129F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e6540_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E68DC0C2-21DE-4BC7-994A-06BA650C2224",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e6540:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8D12E9CE-C425-4E3B-907A-69C7FCA3F33D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e6510_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "30158673-6526-4C7C-B8FC-14F6DE0A04B2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e6510:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CAED8FAB-99C6-417B-8BE3-D623C434ED2A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_x5690_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "27F476C7-DE96-46B8-8076-C4591881E61D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_x5690:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1209B765-0F4E-4E5C-9BA0-164BA287F0FA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_x5687_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BF85428D-DC13-46C2-8FC7-A72B366F6BE9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_x5687:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B832C0B3-1FDD-460F-B2FC-8AD77168A77F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_x5680_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DA4E9461-D020-490A-86D2-FF3CA98F01E7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_x5680:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7AFE8B4F-1B0D-402C-995C-6B433AB35E2B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_x5677_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A650AA88-6A33-4E71-B42B-6949900B0799",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_x5677:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D8598977-1284-4AEC-BD23-B05FB38088BD",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_x5675_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5ABF0978-B0D0-4F8A-B252-D9107E75C75E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_x5675:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D805C862-DAA4-41CA-BDE0-AFB201F4DCA4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_x5672_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B9DB5CF3-1EBC-478B-89CD-FFE087FCD6D3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_x5672:-:*:*:*:*:*:*:*",
"matchCriteriaId": "279EA585-4860-488E-946E-F9A025DF3721",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_x5670_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "60CC69CD-ABB0-4A7D-AE58-0877786851BC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_x5670:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FF7672A0-9ACA-4B42-A93E-5E4AF6D4AC42",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_x5667_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2839AC05-0429-40CC-8410-69F21CDDFD2A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_x5667:-:*:*:*:*:*:*:*",
"matchCriteriaId": "992614B6-A737-4964-BD00-AC8A14798AEA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_x5660_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DBAB2C6C-1DD8-4BD4-9214-9136D0BA597D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_x5660:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2AD36064-4A58-4AAE-836D-456AEED414F7",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_x5650_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "78E03417-EA00-471B-A899-00612AD6FBC0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_x5650:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C3BE3E9B-73C1-47D0-9669-C2F9C73A27BF",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5649_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AE0F267D-1A03-4DFA-835B-BFB597DCCFA7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5649:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5F9B74AF-4A6B-479F-B2A4-2C2F42943862",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_x5647_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6273A630-5225-43DA-9D84-13AD3CC13664",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_x5647:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F8B42C18-FB38-443F-9DDD-C912F039FF56",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5645_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CCBAECEC-C678-4491-9A89-2C3DCC4B8AC3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5645:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4ED9F23C-F74D-47EC-8276-EE66DBAFF951",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_l5640_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A26BE7D9-2169-431B-A296-545B9B0EA31A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_l5640:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FD06BCF5-FF83-468E-AAF2-AFAE366AE063",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5640_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "38CB12DD-EA1C-4FCA-B3E9-887BA11F8B55",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5640:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F1369DB1-B0B8-4648-8C44-233721AF9171",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_l5638_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6C76E140-4A1C-4896-AE54-A80E26E45DD3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_l5638:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3E1F312F-19FB-46B6-BBC3-00C5231F484E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_l5630_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8533B995-A5DD-477E-9D58-F16FFD93618E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_l5630:-:*:*:*:*:*:*:*",
"matchCriteriaId": "639586F8-A41D-4015-AB44-D5FA8DD5F650",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5630_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3A22923D-C325-46AC-9C40-03125867A013",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5630:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2BB51976-3226-4057-8EB0-2906698D28C7",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5620_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "50D7B89B-FBF9-4642-BFD5-7FBB209CBD8C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5620:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6AEAF848-B223-47F0-ABFD-9EECB3351F7D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_l5618_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2FBA50EE-4399-462A-AA63-ECEBD37E5ADA",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_l5618:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CCC98F60-DF54-4DC0-8690-F74E886DDE65",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_l5609_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EEBB130C-89FA-403B-A298-679D13AA5E9D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_l5609:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B67F6D8C-59B0-46D6-8EA6-0639FD26DCF7",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5607_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7FE17B02-613A-4A5F-8C1A-55E7D61E101F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5607:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F6898B47-7493-488D-8973-E3F66602348D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5606_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1395B700-BDD4-4778-946E-A1725F83C4C5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5606:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9C9940B4-F1F2-4750-AEC9-C1C3A4A5B12C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5506_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "415D174C-D6A9-4A16-AFBE-A5B041547B5A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5506:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C05BFAA4-45D5-4338-B553-E58D8DA1060B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5603_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0C6F208F-5DC0-437A-BFB0-544680AF6DC2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5603:-:*:*:*:*:*:*:*",
"matchCriteriaId": "33725A6E-244D-46C1-8D82-FDF56587B378",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_w5590_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "886BD78E-4F3D-4DC9-87EC-C670E7ED434A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_w5590:-:*:*:*:*:*:*:*",
"matchCriteriaId": "72A7E73F-9AB1-47DE-94D3-495FEFFAAFC6",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_w5580_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "80D9813E-E69D-4DB5-A051-1855B1079000",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_w5580:-:*:*:*:*:*:*:*",
"matchCriteriaId": "80417550-98E1-40C5-A55C-89FC80C8D0A6",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_x5570_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1DDA5314-BD19-4035-B916-D7C40C986514",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_x5570:-:*:*:*:*:*:*:*",
"matchCriteriaId": "58015E3C-FB32-40B5-B72E-8423B1A295AA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_x5560_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "156A4EA7-6825-4F9B-9452-6F9A68607106",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_x5560:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3AF86D70-91E5-47F7-8148-B3DE928C3FE9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_x5550_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4E183E81-1325-4128-B924-77EFBF3A9A77",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_x5550:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B2CA3EBA-7EC4-4823-B3E9-536FA64E4B2B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_ec5549_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "77351F56-E3DE-4A31-A487-3A67C7818F50",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_ec5549:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6EFF6B9B-20C0-4173-BF60-78BE59866626",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5540_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9D075388-5370-4A07-B3CA-6A7E827861B6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5540:-:*:*:*:*:*:*:*",
"matchCriteriaId": "256A7B0C-0B08-4004-9A8C-767B3F26F12D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_ec5539_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "904FE35D-61E7-45FB-9B09-BB49486A1FBD",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_ec5539:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8C5D5675-4EFD-4DEA-8763-94C2ACC24E3D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_l5530_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F388909D-4890-44EE-ADFC-7CB61BA2E21D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_l5530:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F5E8684D-FE70-4221-A13E-434417E30B25",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5530_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "09B9747E-0DF8-4FC1-8CDE-7EBA7DBEC686",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5530:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CD0C904C-4B14-4CC4-AAA7-18C90F3624F9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_lc5528_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "02E8A08B-F6D1-4EBF-8790-42496AD15A3D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_lc5528:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F73BB54D-0BC2-4D46-AEC8-C11A6CDC7352",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_l5520_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "500A2DCF-D16E-486B-9DF5-55956A4A12DD",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_l5520:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BA403F18-1A0F-4402-BF11-46E523A68BB8",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5520_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E5BDCD70-DD57-4B9B-AA3C-F91C161B590D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5520:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C720ECB3-91F7-421E-89BF-FE486ED7E555",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_lc5518_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8A6AD06D-A507-4E38-94C4-B32225F11DCD",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_lc5518:-:*:*:*:*:*:*:*",
"matchCriteriaId": "63F4EFC0-C404-4EF3-8925-F0BF14C19678",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_l5518_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7E54BC56-B6B0-44F6-A009-E3A61F49E59B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_l5518:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6320B57E-7CE6-47F3-8CCA-F90789EC0791",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_ec5509_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3AAA7621-028E-4BA2-8CD0-5374B405D0B2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_ec5509:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1C48F702-FD91-4DF0-8CF1-62A64F403209",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_l5508_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9E36B39E-83F3-465F-B0E2-DACFE2B6DD3C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_l5508:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F127C80C-C8EF-43EF-BAC2-19946067A15E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5507_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C395ABF8-AFA9-449F-8DE6-39F4F1BA91F6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5507:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DC6711D1-D6CE-4236-81C6-6A95A15B2728",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_l5506_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DDCA869D-0BDE-43BD-BF62-95438005FCD8",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_l5506:-:*:*:*:*:*:*:*",
"matchCriteriaId": "11AEC71F-0B98-4433-B236-15EFE2452EA2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5504_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C5E3A414-36FE-41CD-86D8-3302DB16D4E1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5504:-:*:*:*:*:*:*:*",
"matchCriteriaId": "72D1EE1B-D09B-443D-9369-49CF3F00079D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5503_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EC6F41FE-DE04-451B-9FEB-88C5BBEF910E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5503:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F7C838E5-6F7C-4929-A838-913F2951ACCF",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5502_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "31D9DE6D-C5CA-432D-B09B-78AE940757E5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5502:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A3F5B2D4-BB4B-4A41-8FF5-A39C9914F5B0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_x5492_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "00CD0BD8-3932-4248-B2F3-989BF523DFC5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_x5492:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2E1EEB10-E431-4DED-9F18-18F69B70CF23",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_x5482_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9B3C3537-3B27-4B79-8017-B9C445214D5B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_x5482:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5333DC59-2AF2-412D-91CD-2442796FBE50",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_x5472_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AB126EEA-9535-4965-B5CA-E2E327262599",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_x5472:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6F8B3088-DFD1-461B-82C3-FBB17154FBC8",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5472_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4E382188-CC29-4F75-9958-355F2314833A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5472:-:*:*:*:*:*:*:*",
"matchCriteriaId": "28E72955-A3D6-4C0B-B8DA-7686B9A8A2A5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_x5470_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3D533E86-D8DB-43FF-8115-1C6D8A44B9D6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_x5470:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5B7020A0-0E3A-41C4-A5B1-58EEEDB10DBA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5462_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C9ABE07A-2721-4B7B-8D6D-7CF9E8F652CA",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5462:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1C013F65-D157-4BC1-94E7-9DCA705C628D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_x5460_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "96BAE2C0-B90E-47ED-9408-6DC1E6F33B15",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_x5460:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0719F5BB-DC65-436E-918A-E56A417FD3E4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_x5450_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F199D023-F26F-421F-B609-901A3F34C82E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_x5450:-:*:*:*:*:*:*:*",
"matchCriteriaId": "025472A5-DF3A-47FF-83E9-80F979C799A3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5450_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "89F904A5-24AC-469C-BEB4-105A634D28CF",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5450:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FCFBAA77-EAEC-4C4D-8385-4CE2F5B57E01",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5440_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "20A43920-9CA2-4931-B04C-DFE9485CDCA5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5440:-:*:*:*:*:*:*:*",
"matchCriteriaId": "892E0559-D2EE-45CF-9AF2-8F266AF3F864",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_l5430_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D11041AA-B78E-4A82-9455-9AC85D96B602",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_l5430:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D9D810F4-3A71-4ADA-92D1-F561277C6359",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5430_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "56ADCCA1-FCFA-4DED-A7FA-BAAE5D62E49D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5430:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8F7360B5-81D1-432A-A5CD-8B053676CE39",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_l5420_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C4A712C7-3F85-4ED8-A2CC-C26ED478A99B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_l5420:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8AFB7F7F-FEE4-42C6-9008-13EDF47DB331",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5420_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B932321A-244D-4986-9DD4-54449107D6F2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5420:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A818E86A-339B-40EC-AD33-1AE7B95A929D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_l5410_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "858056FB-F8E8-473E-9FAD-AFA29CB20170",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_l5410:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6EFE5419-34E9-4C62-B1CF-C12D9E50A2F5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5410_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7437AB9F-EFF4-48A7-AE84-FC22EF82B0A3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5410:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0FA2E6C6-7672-4020-B844-DA46B564EE43",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_l5408_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D15E5196-5EDC-4422-A3F3-E36092BD69F3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_l5408:-:*:*:*:*:*:*:*",
"matchCriteriaId": "16B59960-F783-413B-B4A6-3D855D936132",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5405_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "620F1DA2-056C-4D23-BBEB-5D9B4EBB4502",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5405:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CBD21DE0-6FB7-44F2-80A1-4DE048C606C2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_x5365_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "861586A1-4832-47DB-9EC9-8AC1B1610885",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_x5365:-:*:*:*:*:*:*:*",
"matchCriteriaId": "69B934A5-4ADB-4216-B6B1-329CA339BDE4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_x5355_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1188E260-E566-48EA-B4B3-C1D9B0A931D0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_x5355:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F323FB03-5A19-465B-8D2B-A8245CAD92EF",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5345_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BC22452C-053A-4FF7-85C1-B6CD27F5C26E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5345:-:*:*:*:*:*:*:*",
"matchCriteriaId": "676E6F5D-F108-4C0E-AE06-A0000557A30F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_l5335_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "338AD78A-7F5D-48D1-890C-26157BFE4D33",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_l5335:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C1E976F9-EA03-40A7-ACE7-256E20C81DEA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5335_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "84AB34EF-35C3-45DE-A6A8-4A838691EE43",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5335:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2147FB11-B866-4A1A-AE9F-880CA8D75323",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_l5320_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "61CBC212-86C3-41E6-B671-B66214C4358F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_l5320:-:*:*:*:*:*:*:*",
"matchCriteriaId": "204EB141-9D5F-4D0C-A40A-DF51E1BE8828",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5320_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7CA94BF0-B5CE-4005-B041-C8B17BBD3456",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5320:-:*:*:*:*:*:*:*",
"matchCriteriaId": "53773A88-7138-4E43-8CB4-589326A5EA1D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_l5318_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0912E636-A129-44DB-9AEF-A9DD89B7B8E3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_l5318:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2951C3F5-B250-4D8E-8B94-3C50DF78C7BE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_l5310_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "69C2CD5E-6C7D-4912-98A2-BD939D40D516",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_l5310:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6E7F1C9C-BCD9-43B1-A2D1-AC54C86DB4EE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5310_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7C6F3253-ABA9-4560-BE41-D5AA7FCF8C4C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5310:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2B579425-F1E8-41C0-98A3-7DC5D475583E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_x5272_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "625A870B-A31D-46EB-B076-10AF50B8DA6A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_x5272:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9B2C925F-0568-4A00-9A16-211EB91438EF",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_x5270_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "36145C75-756A-4F53-AE03-CB5C50E78643",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_x5270:-:*:*:*:*:*:*:*",
"matchCriteriaId": "33C90437-98F8-4C02-84C7-EBAAA90E22D5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_x5260_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F1C10B7F-31DA-499E-9618-D00444863976",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_x5260:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4C991D2A-A979-42A6-9BB3-4138260D5BFD",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_l5240_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7F231A45-CD2F-408F-A55A-6BA30FA479F0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_l5240:-:*:*:*:*:*:*:*",
"matchCriteriaId": "55E29850-9836-4B89-9CF9-4FE9B0F65361",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5240_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1D9D555B-D331-44F6-A300-2C57B6E65341",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5240:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2ADDD658-DDA3-41F5-95EE-F823E052E862",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_l5238_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7EC4DAE0-6A62-48AA-9200-DA10F0BBA5B8",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_l5238:-:*:*:*:*:*:*:*",
"matchCriteriaId": "89697554-FE7C-453A-A39C-C00C28F2054A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5220_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CD74DFCC-6A47-416C-B853-A435622AD60A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5220:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8BF6FD58-7123-4FDD-951A-166DB7E036DD",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_l5215_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8E443223-7B9A-410F-9415-2C9B07163B05",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_l5215:-:*:*:*:*:*:*:*",
"matchCriteriaId": "077D95D7-483E-4446-9DC3-75BEF9798A2C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e5205_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A3D822DF-5804-4EEF-9D0A-72B1B0516CC7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e5205:-:*:*:*:*:*:*:*",
"matchCriteriaId": "966753DA-2ED4-4EC4-B38A-B7472CEC464F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_5160_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "11A48A8F-B840-45EF-B695-D26B601A2D70",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_5160:-:*:*:*:*:*:*:*",
"matchCriteriaId": "663A16BF-D89F-4047-A589-76DF9BD92977",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_5150_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CFB1DB18-C7C8-4AA4-9DB2-EC1DEC2B9461",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_5150:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6FC71AE5-B4E9-4A3E-8984-69CBFA0101FF",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_lv_5148_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "63BC75D3-01CF-4CFB-938A-A8771635503F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_lv_5148:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E87D7452-49C8-4E45-9521-4AF1978C28C8",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_5140_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0069EF88-48B8-4CDB-97AB-E2DC5FF1F5E7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_5140:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6BDC8310-DF67-4A29-8329-1D6282898A48",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_lv_5138_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EFEA4790-BC8E-47D5-9A03-E4D4CE0EB90B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_lv_5138:-:*:*:*:*:*:*:*",
"matchCriteriaId": "25E31628-3953-4C93-86C3-3B7196ED3F4C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_lv_5133_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F1B1BFE7-B0DC-45A9-ACA8-2A822D52FBA6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_lv_5133:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5F107359-074F-4889-890F-6AC19A33E840",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_5130_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9A710E52-BD43-4168-924F-6328931648B4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_5130:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B553B4D9-6FDF-4BF8-BE11-659D7DE9263D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_lv_5128_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E7956622-0EE6-4141-9E56-4FDFE13B4D63",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_lv_5128:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5110089E-818A-498E-8677-1662ED44DCCD",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_5120_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9B6B2817-3923-4614-8ACD-2570DF3936B9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_5120:-:*:*:*:*:*:*:*",
"matchCriteriaId": "31ACA3B7-70AF-4085-A80B-1154AB636EE5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_lv_5113_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F7C25D81-8CA9-4A21-B7D2-79A30522C48C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_lv_5113:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9F33683C-BE13-46BD-8232-80E807BD201A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_5110_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1980AD66-D377-4928-ABD8-3A826D3E89FD",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_5110:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CA819ABC-13B1-45BF-A5AD-DDC292AD6618",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_5080_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C2E07C62-CD92-48D3-BCA1-44374F83F891",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_5080:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4EF05BC3-5506-4301-9967-AA44701374C6",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_5070_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0DE197A9-7529-4E83-8D75-56680E0949C0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_5070:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C19FE94A-2B26-4253-8E60-5C055AB201D1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_5063_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C7644127-0B63-4F40-ABB0-FAF31E777691",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_5063:-:*:*:*:*:*:*:*",
"matchCriteriaId": "863704D0-31C6-4A41-8788-4DDA56E39170",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_5060_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CEFD7C84-C41F-43DC-9FEC-58A483295EE8",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_5060:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AAA43015-3ED8-485E-A9D9-218A943C6467",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_5050_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "57450FAC-7ED4-4CCD-A8E2-172025053FA3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_5050:-:*:*:*:*:*:*:*",
"matchCriteriaId": "728E8547-9CE5-4EFF-8F1C-6224B613A2B5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_5040_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2E0FE4D-D3E8-4B8C-8241-108840CF82C8",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_5040:-:*:*:*:*:*:*:*",
"matchCriteriaId": "56E7319E-96BC-437B-9952-BE4F3AEC4A4C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_5030_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E7AC138C-D4D7-4E91-8F16-15222BF37D2A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_5030:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F7059F67-776A-416A-A6B5-78D72E3A0A28",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_w3690_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "150E9655-CFE6-4246-BC56-98EAEC112AFD",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_w3690:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1DAC9062-8376-45CC-89D2-98436B281411",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_w3680_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1E4A14A9-8A64-400D-A3FD-C20BC46BDD8B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_w3680:-:*:*:*:*:*:*:*",
"matchCriteriaId": "ADDEE4FD-0B25-4DA5-B34E-22B2A825E230",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_w3670_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "80FAF2EE-A018-43A4-84C7-4BB0F991604D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_w3670:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3814B3E5-A040-41EE-B051-D77C72B7EC25",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_w3580_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DFA9F9FB-A0A4-47CB-9882-DEA22AA0EA0D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_w3580:-:*:*:*:*:*:*:*",
"matchCriteriaId": "16E19618-4714-4E73-ADBF-9FA650572272",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_w3570_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "333DA821-75F8-4F0E-B8E9-6243107AF12F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_w3570:-:*:*:*:*:*:*:*",
"matchCriteriaId": "10733521-E4BA-407B-97E7-1174CE853945",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_w3565_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FC409D09-5A7D-4E06-96C1-34509FD2F3B8",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_w3565:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B8185700-56AC-4970-B98B-E81D4C598C69",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_w3550_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A32BD44F-E6BB-44BB-9510-731E7D7F7B7A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_w3550:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1C669F43-6DD3-4E91-B28F-5ECDD0C04ACD",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_w3540_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2E7FE96A-7EFC-4D92-A7D2-EF36453EABED",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_w3540:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4715158B-FE00-451F-B8A0-461D57AC1469",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_ec3539_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C607E866-397A-4CF9-9901-51E427099074",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_ec3539:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C7BC9E29-93A6-4558-A814-A28A2FC4AD7B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_w3530_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A93B65A5-6209-454B-9D42-FDB8A90F5ACD",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_w3530:-:*:*:*:*:*:*:*",
"matchCriteriaId": "15DFE09E-43FC-4530-9E15-171C70B6B15C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_lc3528_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BDEBEF74-D5CF-4AFA-A5C6-5177DCF62713",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_lc3528:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2B041AF4-DDE7-4BF5-BC57-D3CC5DB2F5ED",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_w3520_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "12DE5923-85D4-4C20-875E-8F460F59BB7B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_w3520:-:*:*:*:*:*:*:*",
"matchCriteriaId": "194A960C-080F-4CC1-97E4-ADCEABA00769",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_lc3518_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "33663BFF-F518-41B8-B307-DF145A33DF87",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_lc3518:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0A93BF69-1A70-4FBD-9022-DEDCD5BB3E9D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_x3480_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "11B4D5E2-03B5-4FBF-843D-270A3766F893",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_x3480:-:*:*:*:*:*:*:*",
"matchCriteriaId": "084FC9F9-025D-4824-88DD-2C762D1876AD",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_x3470_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BAD13B77-235B-419D-815F-C4F0294709A9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_x3470:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E5E5BE29-F875-4C6F-94F7-8A8E17C04F20",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_x3460_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "71683A22-C33B-40FA-9B19-1E1AF1634A4C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_x3460:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F7E23A8A-C3FD-4C5F-A36A-0ACB2AE426CE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_x3450_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "44033644-BEC9-4410-BD2C-4F106E04D0F2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_x3450:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5DB27BDD-3FED-488C-B45F-FCA3CC693246",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_x3440_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DE2E2840-4282-4234-9121-18D234D9DD67",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_x3440:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C45F78B1-A235-4005-BF05-7F30B0A8AF3E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_x3430_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E3A0FB64-7EE7-4C37-BCF6-1E3A49E3E5CB",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_x3430:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2C983A16-FB96-4C94-B9F1-570007E169BD",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_l3426_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "38E4EE1A-57D8-4EE2-BE32-0420B0BBC755",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_l3426:-:*:*:*:*:*:*:*",
"matchCriteriaId": "545895F7-FFF6-4250-9803-D42CD015E6CA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_l3406_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F3C72F0C-3DDE-4E66-8E6B-606E6693F036",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_l3406:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0F5B3F28-463F-4970-9AEA-F874B86A1206",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_x3380_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F0B15853-F27D-4BD3-98BE-C60D3F3A6BC7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_x3380:-:*:*:*:*:*:*:*",
"matchCriteriaId": "378F08C8-20FC-4774-A8DA-19662164A3D6",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_x3370_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D55A542A-D2CE-4D5A-9840-2E3BA4D96750",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_x3370:-:*:*:*:*:*:*:*",
"matchCriteriaId": "10669E11-2C2F-41A1-AB0F-282465C71414",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_x3360_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C3729542-8A5B-4AA7-A7E1-ECAB6CD6A160",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_x3360:-:*:*:*:*:*:*:*",
"matchCriteriaId": "69C857C3-F9A4-4D21-ACA7-9F6BD62E6F19",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_l3360_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2115B52A-4C45-4B42-892B-06680F0E8F85",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_l3360:-:*:*:*:*:*:*:*",
"matchCriteriaId": "33F6FB58-2408-4903-AEF7-01E4B0CF48AA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_x3350_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DB96CF33-B8E4-4F47-9442-0CC081DF883C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_x3350:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9432D75C-A0D1-4320-BFB9-0DAAFAAF545F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_x3330_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D63EE6E4-E4A0-4976-BC44-F6D0E849B760",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_x3330:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2359015E-95BB-40AC-97E1-56C64AEA70F9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_x3320_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "118126F4-F2D0-4466-B0B5-7B2AA26F6200",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_x3320:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B54937F8-197E-4908-84E7-ED03304BE3B3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_x3230_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "860EDE2E-5E4F-4AAA-A09A-0065AA0DBF07",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_x3230:-:*:*:*:*:*:*:*",
"matchCriteriaId": "92F7D323-FAED-4072-8A27-07FDFD9004A8",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_x3220_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EF75D0C7-3CE8-4B3C-B2D3-0FD058BD164B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_x3220:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B5F05936-B59D-4040-8A4D-0D76C20D0401",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_x3210_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "168AC32A-0F04-48FC-B9D1-B60A5C7161BB",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_x3210:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4B282F08-5281-4EB2-9AAE-27DE22557D3D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e3120_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4AA87AA9-321E-42E7-8B81-C1824E3061C1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e3120:-:*:*:*:*:*:*:*",
"matchCriteriaId": "71EBB77A-EB72-4318-AAC3-725BE5B93FD4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_l3110_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CAFD11AE-B0E9-4DE5-B9D9-2AA9BB46195D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_l3110:-:*:*:*:*:*:*:*",
"matchCriteriaId": "48E25499-1DA4-4F05-8906-B8B8127E1BAB",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_e3110_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "ADBBA844-857C-42D9-8CA5-439E729EDEC3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_e3110:-:*:*:*:*:*:*:*",
"matchCriteriaId": "682A627D-BE25-4DDE-9E27-4376328E77CC",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_3070_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CC981425-098C-4AAC-B1D1-460FB50E2720",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_3070:-:*:*:*:*:*:*:*",
"matchCriteriaId": "417DE194-83E2-47A6-B782-D47265BB963E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_3065_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2D7D699F-4BD1-4BDE-BB3A-AB50F0088914",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_3065:-:*:*:*:*:*:*:*",
"matchCriteriaId": "39F90F81-5326-433C-A1FE-64FFA04CFB29",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_3060_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7C0B3BD7-76BA-468C-A318-45253A704C31",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_3060:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3179176E-748E-47BD-A9D7-C0DBE3F6BA5F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_3050_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2283AAB6-EB1B-41AE-B5D1-097FD6825D33",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_3050:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CB6E8FAB-41D2-4DE8-831D-46F21756AF4C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_3040_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BCB9FA4B-F870-44AC-9968-379663A08774",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_3040:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E37A6A35-ED46-4B04-B5CF-7BD8C75A3A8D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:xeon_l3014_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "19B2D02B-F690-423D-BF92-A090DC9F3313",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:xeon_l3014:-:*:*:*:*:*:*:*",
"matchCriteriaId": "27C0242D-9732-453F-926A-364BFC7E3A12",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B620311B-34A3-48A6-82DF-6F078D7A4493",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
"matchCriteriaId": "97A4B8DF-58DA-4AB6-A1F9-331B36409BA3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
"matchCriteriaId": "80F0FA5D-8D3B-4C0E-81E2-87998286AF33",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*",
"matchCriteriaId": "815D70A8-47D3-459C-A32C-9FEACA0659D1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "85EE39BF-86AA-498B-BF51-EDCD7BD01376",
"versionEndIncluding": "11.6.5",
"versionStartIncluding": "11.5.2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6C3B5688-0235-4D4F-A26C-440FF24A1B43",
"versionEndIncluding": "12.1.5",
"versionStartIncluding": "12.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6FCB6C17-33AC-4E5E-8633-7490058CA51F",
"versionEndIncluding": "13.1.3",
"versionStartIncluding": "13.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C8D4FBBA-1D87-4CCB-ADB3-42514FB0CF45",
"versionEndIncluding": "14.1.2",
"versionStartIncluding": "14.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D6A53E3C-3E09-4100-8D5A-10AD4973C230",
"versionEndIncluding": "15.0.1",
"versionStartIncluding": "15.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C6917369-D3C2-42EB-B73B-F86CE2F17401",
"versionEndIncluding": "11.6.5",
"versionStartIncluding": "11.5.2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "151ED6D1-AA85-4213-8F3A-8167CBEC4721",
"versionEndIncluding": "12.1.5",
"versionStartIncluding": "12.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6F1C68BC-A3EF-4205-AD00-68CB3A8C65AF",
"versionEndIncluding": "13.1.3",
"versionStartIncluding": "13.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D8BBC028-03DD-4412-9180-883E4252E132",
"versionEndIncluding": "14.1.2",
"versionStartIncluding": "14.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FCAE28C2-0ADD-4FD0-A520-EFB764164DD8",
"versionEndIncluding": "15.0.1",
"versionStartIncluding": "15.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
"matchCriteriaId": "596A35D8-3644-4C45-99AC-4D201F170B83",
"versionEndIncluding": "11.6.5",
"versionStartIncluding": "11.5.2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5D5AA99B-08E7-4959-A3B4-41AA527B4B22",
"versionEndIncluding": "12.1.5",
"versionStartIncluding": "12.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4AC8FD5C-AE1A-4484-BB6F-EBB6A48D21F8",
"versionEndIncluding": "13.1.3",
"versionStartIncluding": "13.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EC15881B-9C49-4E77-9FB6-A6E60D0BCAD3",
"versionEndIncluding": "14.1.2",
"versionStartIncluding": "14.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
"matchCriteriaId": "36A213C6-D6E4-4F38-989D-81D3DFC11829",
"versionEndIncluding": "15.0.1",
"versionStartIncluding": "15.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AB5A624E-40A1-4F75-8B9A-FA56510C19EE",
"versionEndIncluding": "11.6.5",
"versionStartIncluding": "11.5.2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9DC86A5F-C793-4848-901F-04BFB57A07F6",
"versionEndIncluding": "12.1.5",
"versionStartIncluding": "12.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0772A366-87B9-40EC-9F63-AE0FF0EF5002",
"versionEndIncluding": "13.1.3",
"versionStartIncluding": "13.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3D4B5A46-AA7B-416F-BA97-76A0BA232C6F",
"versionEndIncluding": "14.1.2",
"versionStartIncluding": "14.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "59D9F39B-206B-4E76-A811-1CAA705A60EE",
"versionEndIncluding": "15.0.1",
"versionStartIncluding": "15.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9BD61B6A-4E98-4D2C-92BC-FED15CEE39A6",
"versionEndIncluding": "11.6.5",
"versionStartIncluding": "11.5.2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2E5552A3-91CD-4B97-AD33-4F1FB4C8827A",
"versionEndIncluding": "12.1.5",
"versionStartIncluding": "12.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8A53C692-D353-42E3-9148-F850DA11884F",
"versionEndIncluding": "13.1.3",
"versionStartIncluding": "13.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "05106312-E60D-4CF1-B4C8-6F1EF5AF8D75",
"versionEndIncluding": "14.1.2",
"versionStartIncluding": "14.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "70099A38-3B84-4C40-8590-BE6C8F7C21A7",
"versionEndIncluding": "15.0.1",
"versionStartIncluding": "15.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A9A8A5C3-0C38-4F46-8F98-DC3B9C58D660",
"versionEndIncluding": "11.6.5",
"versionStartIncluding": "11.5.2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
"matchCriteriaId": "55C2EC23-E78F-4447-BACF-21FC36ABF155",
"versionEndIncluding": "12.1.5",
"versionStartIncluding": "12.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A35AC237-573B-4309-87EF-3945FA2449BF",
"versionEndIncluding": "13.1.3",
"versionStartIncluding": "13.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
"matchCriteriaId": "27ABD6A3-5D67-4543-BB90-602F17A98B52",
"versionEndIncluding": "14.1.2",
"versionStartIncluding": "14.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1DE40473-ABAE-4D91-8EBB-FB5719E107F6",
"versionEndIncluding": "15.0.1",
"versionStartIncluding": "15.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
"matchCriteriaId": "96E945EE-A623-4775-83B9-4CF81B7EA70F",
"versionEndIncluding": "11.6.5",
"versionStartIncluding": "11.5.2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
"matchCriteriaId": "945A19E8-51EB-42FE-9BF1-12DAC78B5286",
"versionEndIncluding": "12.1.5",
"versionStartIncluding": "12.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0B6C3F50-BD60-4A8C-8DBB-680DA4D6BE6D",
"versionEndIncluding": "13.1.3",
"versionStartIncluding": "13.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B1B2D963-4E55-45B5-80E0-BC6FFB2122F7",
"versionEndIncluding": "14.1.2",
"versionStartIncluding": "14.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
"matchCriteriaId": "18B5A918-F9AA-4889-94A7-33E6E54CF383",
"versionEndIncluding": "15.0.1",
"versionStartIncluding": "15.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "92484170-2E91-45F6-9789-B0DF3F5E6260",
"versionEndIncluding": "11.6.5",
"versionStartIncluding": "11.5.2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EB5007D0-BBDB-4D74-9C88-98FBA74757D1",
"versionEndIncluding": "12.1.5",
"versionStartIncluding": "12.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FB07E847-6083-4CC8-8A62-6B9744B87088",
"versionEndIncluding": "13.1.3",
"versionStartIncluding": "13.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D8BBD637-148A-4E1A-B2DC-129BCD121C1E",
"versionEndIncluding": "14.1.2",
"versionStartIncluding": "14.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EF606356-8191-478D-AF60-D48A408CD9ED",
"versionEndIncluding": "15.0.1",
"versionStartIncluding": "15.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0A16FE69-A466-4FA6-BDDA-794C9F2B36FD",
"versionEndIncluding": "11.6.5",
"versionStartIncluding": "11.5.2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B7725810-66D2-4460-A174-9F3BFAD966F2",
"versionEndIncluding": "12.1.5",
"versionStartIncluding": "12.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0620AA57-83D1-41E6-8ABB-99F3FABB10F0",
"versionEndIncluding": "13.1.3",
"versionStartIncluding": "13.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A93AAEB9-556E-4F94-ADEC-D9C294B7F37E",
"versionEndIncluding": "14.1.2",
"versionStartIncluding": "14.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FA3E37E6-64B9-4668-AC01-933711E1C934",
"versionEndIncluding": "15.0.1",
"versionStartIncluding": "15.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "039E73A1-9F90-46A4-BFEE-5E97BAF3FAA6",
"versionEndIncluding": "11.6.5",
"versionStartIncluding": "11.5.2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EFD760FE-4347-4D36-B5C6-4009398060F2",
"versionEndIncluding": "12.1.5",
"versionStartIncluding": "12.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BF552D91-612A-43E1-B2D6-02E2515FEA22",
"versionEndIncluding": "13.1.3",
"versionStartIncluding": "13.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7C8D0EF7-9C65-4491-B358-DB1AAB0EA1FF",
"versionEndIncluding": "14.1.2",
"versionStartIncluding": "14.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8CCD3CF9-EA9D-43FF-8ADA-713B4B5C468E",
"versionEndIncluding": "15.0.1",
"versionStartIncluding": "15.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "43581457-5C55-4B31-BEFA-4B59B2744BB8",
"versionEndIncluding": "11.6.5",
"versionStartIncluding": "11.5.2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "65B76F53-7D8B-477E-8B6E-91AC0A9009FF",
"versionEndIncluding": "12.1.5",
"versionStartIncluding": "12.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6704F0A6-16E2-4C2D-B5BD-EDDEAD5C153C",
"versionEndIncluding": "13.1.3",
"versionStartIncluding": "13.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "79B0C4C9-FCA9-4108-B349-2EFBB4A1153B",
"versionEndIncluding": "14.1.2",
"versionStartIncluding": "14.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EC6612AB-E46B-4A8B-9B3E-C711D8C27962",
"versionEndIncluding": "15.0.1",
"versionStartIncluding": "15.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-iq_centralized_management:*:*:*:*:*:*:*:*",
"matchCriteriaId": "14A4E46D-F0DB-4201-9102-EC89FACBE780",
"versionEndIncluding": "5.4.0",
"versionStartIncluding": "5.2.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-iq_centralized_management:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F37D18F2-8C6A-4557-85DC-2A751595423C",
"versionEndIncluding": "6.1.0",
"versionStartIncluding": "6.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-iq_centralized_management:7.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "2B589C35-55F2-4D40-B5A6-8267EE20D627",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:enterprise_manager:3.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D5F5FEE7-059A-4A9B-BCCD-18F0AA435040",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:redhat:openshift_container_platform:4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "064E7BDD-4EF0-4A0D-A38D-8C75BAFEDCEF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:openshift_container_platform:4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "4C85A84D-A70F-4B02-9E5D-CD9660ABF048",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "51EF4996-72F4-4FA4-814F-F5991E7A8318",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
"matchCriteriaId": "B353CE99-D57C-465B-AAB0-73EF581127D1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*",
"matchCriteriaId": "7431ABC1-9252-419E-8CC1-311B41360078",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*",
"matchCriteriaId": "BF77CDCF-B9C9-427D-B2BF-36650FB2148C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.7:*:*:*:*:*:*:*",
"matchCriteriaId": "21690BAC-2129-4A33-9B48-1F3BF30072A9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_eus:8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "F2FF6D89-9361-45B9-ABCC-1A5E600BD63C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*",
"matchCriteriaId": "B76AA310-FEC7-497F-AF04-C3EC1E76C4CC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*",
"matchCriteriaId": "17F256A9-D3B9-4C72-B013-4EFD878BFEA8",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:oracle:solaris:11:*:*:*:*:*:*:*",
"matchCriteriaId": "8E8C192B-8044-4BF9-9F1F-57371FC0E8FD",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper invalidation for page table updates by a virtual guest operating system for multiple Intel(R) Processors may allow an authenticated user to potentially enable denial of service of the host system via local access."
},
{
"lang": "es",
"value": "Una invalidaci\u00f3n inapropiada de las actualizaciones de la tabla de p\u00e1ginas por parte de un sistema operativo invitado virtual para m\u00faltiples procesadores Intel\u00ae puede habilitar a un usuario autenticado para permitir potencialmente una denegaci\u00f3n de servicio del sistema host por medio de un acceso local."
}
],
"id": "CVE-2018-12207",
"lastModified": "2024-11-21T03:44:45.313",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 4.9,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.0,
"impactScore": 4.0,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2019-11-14T20:15:11.133",
"references": [
{
"source": "secure@intel.com",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00042.html"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2019:3916"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2019:3936"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2019:3941"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2020:0026"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2020:0028"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2020:0204"
},
{
"source": "secure@intel.com",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I5WWPW4BSZDDW7VHU427XTVXV7ROOFFW/"
},
{
"source": "secure@intel.com",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IZYATWNUGHRBG6I3TC24YHP5Y3J7I6KH/"
},
{
"source": "secure@intel.com",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://seclists.org/bugtraq/2020/Jan/21"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://security.gentoo.org/glsa/202003-56"
},
{
"source": "secure@intel.com",
"url": "https://support.f5.com/csp/article/K17269881?utm_source=f5support\u0026amp%3Butm_medium=RSS"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/4186-2/"
},
{
"source": "secure@intel.com",
"tags": [
"Third Party Advisory"
],
"url": "https://www.debian.org/security/2020/dsa-4602"
},
{
"source": "secure@intel.com",
"tags": [
"Vendor Advisory"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html"
},
{
"source": "secure@intel.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://www.oracle.com/security-alerts/cpujul2020.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00042.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2019:3916"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2019:3936"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2019:3941"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2020:0026"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2020:0028"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2020:0204"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I5WWPW4BSZDDW7VHU427XTVXV7ROOFFW/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IZYATWNUGHRBG6I3TC24YHP5Y3J7I6KH/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://seclists.org/bugtraq/2020/Jan/21"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://security.gentoo.org/glsa/202003-56"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://support.f5.com/csp/article/K17269881?utm_source=f5support\u0026amp%3Butm_medium=RSS"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/4186-2/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://www.debian.org/security/2020/dsa-4602"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://www.oracle.com/security-alerts/cpujul2020.html"
}
],
"sourceIdentifier": "secure@intel.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-20"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
gsd-2018-12207
Vulnerability from gsd
{
"GSD": {
"alias": "CVE-2018-12207",
"description": "Improper invalidation for page table updates by a virtual guest operating system for multiple Intel(R) Processors may allow an authenticated user to potentially enable denial of service of the host system via local access.",
"id": "GSD-2018-12207",
"references": [
"https://www.suse.com/security/cve/CVE-2018-12207.html",
"https://www.debian.org/security/2020/dsa-4602",
"https://www.debian.org/security/2019/dsa-4564",
"https://access.redhat.com/errata/RHSA-2020:0204",
"https://access.redhat.com/errata/RHSA-2020:0028",
"https://access.redhat.com/errata/RHSA-2020:0026",
"https://access.redhat.com/errata/RHSA-2019:3941",
"https://access.redhat.com/errata/RHSA-2019:3936",
"https://access.redhat.com/errata/RHSA-2019:3916",
"https://access.redhat.com/errata/RHSA-2019:3860",
"https://access.redhat.com/errata/RHSA-2019:3844",
"https://access.redhat.com/errata/RHSA-2019:3843",
"https://access.redhat.com/errata/RHSA-2019:3842",
"https://access.redhat.com/errata/RHSA-2019:3841",
"https://access.redhat.com/errata/RHSA-2019:3840",
"https://access.redhat.com/errata/RHSA-2019:3839",
"https://access.redhat.com/errata/RHSA-2019:3838",
"https://access.redhat.com/errata/RHSA-2019:3837",
"https://access.redhat.com/errata/RHSA-2019:3836",
"https://access.redhat.com/errata/RHSA-2019:3835",
"https://access.redhat.com/errata/RHSA-2019:3834",
"https://access.redhat.com/errata/RHSA-2019:3833",
"https://access.redhat.com/errata/RHSA-2019:3832",
"https://ubuntu.com/security/CVE-2018-12207",
"https://advisories.mageia.org/CVE-2018-12207.html",
"https://alas.aws.amazon.com/cve/html/CVE-2018-12207.html",
"https://linux.oracle.com/cve/CVE-2018-12207.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2018-12207"
],
"details": "Improper invalidation for page table updates by a virtual guest operating system for multiple Intel(R) Processors may allow an authenticated user to potentially enable denial of service of the host system via local access.",
"id": "GSD-2018-12207",
"modified": "2023-12-13T01:22:30.511889Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "secure@intel.com",
"ID": "CVE-2018-12207",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "2019.2 IPU \u2013 Intel(R) Processor Machine Check Error",
"version": {
"version_data": [
{
"version_value": "See provided reference"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Improper invalidation for page table updates by a virtual guest operating system for multiple Intel(R) Processors may allow an authenticated user to potentially enable denial of service of the host system via local access."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Denial of Service"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "FEDORA-2019-376ec5c107",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I5WWPW4BSZDDW7VHU427XTVXV7ROOFFW/"
},
{
"name": "RHSA-2019:3916",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2019:3916"
},
{
"name": "RHSA-2019:3936",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2019:3936"
},
{
"name": "RHSA-2019:3941",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2019:3941"
},
{
"name": "USN-4186-2",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/4186-2/"
},
{
"name": "FEDORA-2019-cbb732f760",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IZYATWNUGHRBG6I3TC24YHP5Y3J7I6KH/"
},
{
"name": "openSUSE-SU-2019:2710",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00042.html"
},
{
"name": "RHSA-2020:0026",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2020:0026"
},
{
"name": "RHSA-2020:0028",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2020:0028"
},
{
"name": "DSA-4602",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2020/dsa-4602"
},
{
"name": "20200114 [SECURITY] [DSA 4602-1] xen security update",
"refsource": "BUGTRAQ",
"url": "https://seclists.org/bugtraq/2020/Jan/21"
},
{
"name": "RHSA-2020:0204",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2020:0204"
},
{
"name": "GLSA-202003-56",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/202003-56"
},
{
"name": "https://www.oracle.com/security-alerts/cpujul2020.html",
"refsource": "MISC",
"url": "https://www.oracle.com/security-alerts/cpujul2020.html"
},
{
"name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html",
"refsource": "MISC",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html"
},
{
"name": "https://support.f5.com/csp/article/K17269881?utm_source=f5support\u0026amp;utm_medium=RSS",
"refsource": "CONFIRM",
"url": "https://support.f5.com/csp/article/K17269881?utm_source=f5support\u0026amp;utm_medium=RSS"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i3-10110u_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3-10110u:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i3-10110y_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3-10110y:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i3-1005g1_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3-1005g1:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i3-9300t_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3-9300t:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i3-9300_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3-9300:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i3-9100_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3-9100:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i3-9100t_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3-9100t:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i3-9350k_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3-9350k:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i3-9320_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3-9320:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i3-8145u_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3-8145u:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i3-8300_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3-8300:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i3-8100t_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3-8100t:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i3-8300t_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3-8300t:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i3-8109u_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3-8109u:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i3-8130u_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3-8130u:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i3-8100_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3-8100:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i3-8350k_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3-8350k:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i3-7100_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3-7100:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i3-7350k_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3-7350k:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i3-7300t_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3-7300t:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i3-7167u_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3-7167u:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i3-7300_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3-7300:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i3-7100h_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3-7100h:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i3-7320_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3-7320:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i3-7100t_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3-7100t:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i3-7100u_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3-7100u:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i3-6100u_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3-6100u:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i3-6100h_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3-6100h:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i3-6167u_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3-6167u:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i3-6100_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3-6100:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i3-5015u_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3-5015u:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i3-5020u_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3-5020u:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i3-5005u_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3-5005u:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i3-5010u_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3-5010u:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i3-5157u_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3-5157u:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i5-10210u_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5-10210u:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i5-10310y_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5-10310y:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i5-10210y_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5-10210y:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i5-1035g4_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5-1035g4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i5-1035g7_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5-1035g7:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i5-1035g1_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5-1035g1:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i5-9500_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5-9500:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i5-9600_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5-9600:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i5-9400t_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5-9400t:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i5-9600t_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5-9600t:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i5-9500t_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5-9500t:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i5-9300h_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5-9300h:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i5-9400h_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5-9400h:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i5-9400_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5-9400:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i5-9600k_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5-9600k:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i5-8265u_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5-8265u:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i5-8200y_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5-8200y:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i5-8400t_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5-8400t:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i5-8300h_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5-8300h:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i5-8259u_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5-8259u:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i5-8269u_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5-8269u:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i5-8700b_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5-8700b:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i5-8400b_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5-8400b:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i5-8500b_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5-8500b:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i5\\+8500_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5\\+8500:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i5\\+8400_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5\\+8400:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i5-8305g_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5-8305g:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i5-8400_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5-8400:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i5-8250u_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5-8250u:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i5-8350u_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5-8350u:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i5-7400_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5-7400:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i5-7500t_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5-7500t:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i5-7600t_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5-7600t:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i5-7400t_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5-7400t:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i5-7600_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5-7600:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i5-7500_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5-7500:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i5-7300hq_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5-7300hq:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i5-7267u_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5-7267u:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i5-7600k_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5-7600k:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i5-7260u_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5-7260u:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i5-7440hq_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5-7440hq:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i5-7287u_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5-7287u:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i5-7360u_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5-7360u:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i5-7200u_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5-7200u:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i5-7y54_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5-7y54:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i5-6350hq_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5-6350hq:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i5-6200u_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5-6200u:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i5-6300hq_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5-6300hq:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i5-6287u_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5-6287u:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i5-6267u_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5-6267u:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i5-6260u_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5-6260u:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i5-5350h_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5-5350h:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i5-5200u_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5-5200u:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i5-5287u_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5-5287u:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i5-5250u_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5-5250u:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i5-5257u_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5-5257u:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i7-10510u_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7-10510u:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i7-10510y_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7-10510y:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i7-10710u_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7-10710u:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i7-1065g7_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7-1065g7:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i7-9700t_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7-9700t:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i7-9700_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7-9700:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i7-9750h_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7-9750h:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i7-9850h_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7-9850h:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i7-9700k_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7-9700k:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i7-8565u_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7-8565u:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i7-8500y_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7-8500y:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i7-8086k_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7-8086k:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i7-8750h_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7-8750h:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i7-8559u_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7-8559u:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i7\\+8700_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7\\+8700:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i7-8709g_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7-8709g:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i7-8809g_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7-8809g:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i7-8705g_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7-8705g:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i7-8706g_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7-8706g:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i7-8550u_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7-8550u:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i7-8650u_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7-8650u:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i7-7700t_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7-7700t:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i7-7820hk_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7-7820hk:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i7-7700hq_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7-7700hq:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i7-7660u_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7-7660u:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i7-7560u_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7-7560u:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i7-7700_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7-7700:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i7-7567u_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7-7567u:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i7-7700k_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7-7700k:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i7-7920hq_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7-7920hq:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i7-7820hq_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7-7820hq:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i7-7500u_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7-7500u:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i7-6970hq_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7-6970hq:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i7-6870hq_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7-6870hq:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i7-6770hq_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7-6770hq:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i7-6500u_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7-6500u:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i7-6700hq_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7-6700hq:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i7-6820hk_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7-6820hk:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i7-6560u_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7-6560u:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i7-6567u_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7-6567u:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i7-5850hq_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7-5850hq:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i7-5950hq_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7-5950hq:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i7-5775c_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7-5775c:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i7-5700hq_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7-5700hq:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i7-5750hq_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7-5750hq:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i7-5500u_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7-5500u:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i7-5550u_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7-5550u:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i7-5557u_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7-5557u:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_m3-8100y_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_m3-8100y:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_m3-7y30_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_m3-7y30:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_m3-6y54_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_m3-6y54:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_m3-6y30_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_m3-6y30:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_m-5y31_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_m-5y31:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_m-5y51_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_m-5y51:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_m-5y10c_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_m-5y10c:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_m-5y10_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_m-5y10:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_m-5y10a_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_m-5y10a:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_m-5y71_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_m-5y71:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_m-5y70_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_m-5y70:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_m-5y10c_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_m-5y10c:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i9-10980xe_firmware:-:*:*:*:extreme:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i9-10980xe:-:*:*:*:extreme:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i9-10900x_x-series_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i9-10900x_x-series:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i9-10920x_x-series_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i9-10920x_x-series:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i9-10940x_x-series_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i9-10940x_x-series:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i9-9900x_x-series_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i9-9900x_x-series:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i9-9920x_x-series_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i9-9920x_x-series:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i9-9960x_x-series_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i9-9960x_x-series:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i9-9980xe_firmware:-:*:*:*:extreme:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i9-9980xe:-:*:*:*:extreme:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i9-9940x_x-series_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i9-9940x_x-series:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i9-7960x_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i9-7960x:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i9-7940x_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i9-7940x:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i9-7980xe_firmware:-:*:*:*:extreme:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i9-7980xe:-:*:*:*:extreme:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i9-7920x_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i9-7920x:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i9-7900x_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i9-7900x:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i7-7820x_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7-7820x:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:core_i7-7800x_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7-7800x:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:pentium_gold_g5620_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:pentium_gold_g5620:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:pentium_gold_g5600t_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:pentium_gold_g5600t:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:pentium_gold_g5600_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:pentium_gold_g5600:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:pentium_gold_g5500t_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:pentium_gold_g5500t:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:pentium_gold_g5500_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:pentium_gold_g5500:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:pentium_gold_g5420t_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:pentium_gold_g5420t:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:pentium_gold_g5420_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:pentium_gold_g5420:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:pentium_gold_6405u_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:pentium_gold_6405u:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:pentium_gold_5405u_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:pentium_gold_5405u:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:pentium_gold_g5400t_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:pentium_gold_g5400t:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:pentium_gold_g5400_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:pentium_gold_g5400:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:pentium_gold_4425y_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:pentium_gold_4425y:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:pentium_gold_4417u_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:pentium_gold_4417u:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:pentium_gold_4415u_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:pentium_gold_4415u:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:pentium_gold_4415y_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:pentium_gold_4415y:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:pentium_gold_4410y_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:pentium_gold_4410y:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:celeron_g4950_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:celeron_g4950:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:celeron_g4932e_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:celeron_g4932e:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:celeron_g4930t_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:celeron_g4930t:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:celeron_g4930e_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:celeron_g4930e:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:celeron_g4930_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:celeron_g4930:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:celeron_g4920_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:celeron_g4920:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:celeron_g4900t_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:celeron_g4900t:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:celeron_g4900_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:celeron_g4900:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:celeron_g3950_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:celeron_g3950:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:celeron_g3930te_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:celeron_g3930te:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:celeron_g3930t_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:celeron_g3930t:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:celeron_g3930e_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:celeron_g3930e:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:celeron_g3930_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:celeron_g3930:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:celeron_g3920_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:celeron_g3920:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:celeron_g3902e_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:celeron_g3902e:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:celeron_g3900te_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:celeron_g3900te:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:celeron_g3900e_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:celeron_g3900e:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:celeron_g3900t_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:celeron_g3900t:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:celeron_g3900_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:celeron_g3900:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:celeron_g1850_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:celeron_g1850:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:celeron_g1840t_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:celeron_g1840t:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:celeron_g1840_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:celeron_g1840:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:celeron_g1830_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:celeron_g1830:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:celeron_g1820te_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:celeron_g1820te:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:celeron_g1820t_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:celeron_g1820t:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:celeron_g1630_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:celeron_g1630:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:celeron_g1820_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:celeron_g1820:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:celeron_g1620t_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:celeron_g1620t:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:celeron_g1620_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:celeron_g1620:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:celeron_g1610t_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:celeron_g1610t:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:celeron_g1610_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:celeron_g1610:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_platinum_9282_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_9282:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_platinum_9242_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_9242:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_platinum_9222_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_9222:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_platinum_9221_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_9221:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_platinum_8280m_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_8280m:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_platinum_8280l_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_8280l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_platinum_8280_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_8280:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_platinum_8276m_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_8276m:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_platinum_8276l_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_8276l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_platinum_8276_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_8276:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_platinum_8270_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_8270:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_platinum_8268_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_8268:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_platinum_8260y_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_8260y:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_platinum_8260m_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_8260m:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_platinum_8260l_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_8260l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_platinum_8260_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_8260:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_platinum_8256_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_8256:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_platinum_8253_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_platinum_8253:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_6262v_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6262v:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_6254_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6254:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_6252n_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6252n:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_6252_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6252:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_6248_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6248:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_6246_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6246:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_6244_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6244:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_6242_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6242:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_6240y_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6240y_:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_6240m_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6240m:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_6240l_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6240l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_6240_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6240:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_6238t_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6238t:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_6238m_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6238m:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_6238l_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6238l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_6238_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6238:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_6234_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6234:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_6230t_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6230t:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_6230n_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6230n:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_6230_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6230:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_6226_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6226:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_6222v_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_6222v:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_5222_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_5222:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_5220t_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_5220t_:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_5220s_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_5220s:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_5220_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_5220:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_5218t_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_5218t_:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_5218n_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_5218n:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_5218b_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_5218b:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_5218_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_5218:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_5217_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_5217:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_5215m_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_5215m:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_5215l_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_5215l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_gold_5215_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_gold_5215:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_silver_4216_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_silver_4216:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_silver_4215_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_silver_4215:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_silver_4214y_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_silver_4214y:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_silver_4214_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_silver_4214:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_silver_4210_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_silver_4210:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_silver_4209t_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_silver_4209t:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_silver_4208_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_silver_4208:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_bronze_3204_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_bronze_3204:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e7-8890_v4_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7-8890_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e7-8893_v4_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7-8893_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e7-8880_v4_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7-8880_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e7-4830_v4_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7-4830_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e7-8860_v4_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7-8860_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e7-4809_v4_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7-4809_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e7-8870_v4_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7-8870_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e7-4820_v4_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7-4820_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e7-8891_v4_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7-8891_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e7-8867_v4_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7-8867_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e7-4850_v4_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7-4850_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e7-8855_v4_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7-8855_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e7-8860_v3_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7-8860_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e7-8867_v3_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7-8867_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e7-8870_v3_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7-8870_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e7-8880_v3_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7-8880_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e7-8880l_v3_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7-8880l_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e7-4809_v3_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7-4809_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e7-8890_v3_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7-8890_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e7-4820_v3_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7-4820_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e7-8891_v3_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7-8891_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e7-4830_v3_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7-4830_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e7-4850_v3_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7-4850_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e7-8893_v3_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7-8893_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e7-4809_v2_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7-4809_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e7-8880l_v2_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7-8880l_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e7-8880_v2_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7-8880_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e7-4820_v2_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7-4820_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e7-8890_v2_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7-8890_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e7-8891_v2_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7-8891_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e7-2850_v2_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7-2850_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e7-4830_v2_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7-4830_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e7-8893_v2_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7-8893_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e7-2870_v2_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7-2870_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e7-4850_v2_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7-4850_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e7-2880_v2_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7-2880_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e7-2890_v2_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7-2890_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e7-4860_v2_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7-4860_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e7-4870_v2_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7-4870_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e7-4890_v2_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7-4890_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e7-8850_v2_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7-8850_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e7-8857_v2_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7-8857_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e7-8870_v2_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7-8870_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e7-4880_v2_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7-4880_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e7-8895_v2_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7-8895_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-2699a_v4_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-2699a_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-4627_v4_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-4627_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-4610a_v4_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-4610a_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-4620_v4_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-4620_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-4628l_v4_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-4628l_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-4660_v4_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-4660_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-4640_v4_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-4640_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-4669_v4_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-4669_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-4667_v4_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-4667_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-4655_v4_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-4655_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-4650_v4_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-4650_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-1660_v4_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-1660_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-1630_v4_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-1630_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-1620_v4_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-1620_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-1680_v4_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-1680_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-1650_v4_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-1650_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-2687w_v4_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-2687w_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-2695_v4_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-2695_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-2690_v4_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-2690_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-2699_v4_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-2699_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-2650l_v4_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-2650l_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-2658_v4_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-2658_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-2698_v4_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-2698_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-2660_v4_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-2660_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-2680_v4_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-2680_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-2697_v4_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-2697_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-2683_v4_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-2683_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-2628l_v4_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-2628l_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-2650_v4_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-2650_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-2697a_v4_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-2697a_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-2648l_v4_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-2648l_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-2620_v4_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-2620_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-2630l_v4_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-2630l_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-2608l_v4_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-2608l_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-2667_v4_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-2667_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-2643_v4_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-2643_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-2623_v4_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-2623_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-2609_v4_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-2609_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-2630_v4_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-2630_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-2618l_v4_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-2618l_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-2637_v4_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-2637_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-2603_v4_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-2603_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-2640_v4_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-2640_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-4640_v3_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-4640_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-4650_v3_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-4650_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-4655_v3_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-4655_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-4660_v3_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-4660_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-4667_v3_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-4667_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-4669_v3_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-4669_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-4610_v3_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-4610_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-4620_v3_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-4620_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-4627_v3_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-4627_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-2695_v3_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-2695_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-2697_v3_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-2697_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-2698_v3_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-2698_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-2699_v3_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-2699_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-2683_v3_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-2683_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-2690_v3_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-2690_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-2650_v3_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-2650_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-2660_v3_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-2660_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-2680_v3_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-2680_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-2670_v3_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-2670_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-1630_v3_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-1630_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-1650_v3_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-1650_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-2687w_v3_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-2687w_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-2643_v3_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-2643_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-1660_v3_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-1660_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-1680_v3_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-1680_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-2650l_v3_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-2650l_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-2620_v3_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-2620_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-2623_v3_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-2623_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-1620_v3_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-1620_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-2630_v3_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-2630_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-2630l_v3_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-2630l_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-2637_v3_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-2637_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-2640_v3_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-2640_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-2603_v3_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-2603_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-2667_v3_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-2667_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-4640_v2_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-4640_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-4650_v2_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-4650_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-4657l_v2_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-4657l_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-4607_v2_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-4607_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-4610_v2_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-4610_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-4620_v2_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-4620_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-4657l_v2_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-4657l_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-4627_v2_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-4627_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-4603_v2_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-4603_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-2420_v2_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-2420_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-2440_v2_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-2440_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-2403_v2_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-2403_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-2430_v2_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-2430_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-2450_v2_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-2450_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-2430l_v2_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-2430l_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-2450l_v2_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-2450l_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-2470_v2_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-2470_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-2407_v2_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-2407_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-2640_v2_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-2640_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-2680_v2_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-2680_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-2690_v2_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-2690_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-2643_v2_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-2643_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-2650_v2_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-2650_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-2650l_v2_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-2650l_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-2695_v2_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-2695_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-2660_v2_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-2660_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-2667_v2_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-2667_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-2697_v2_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-2697_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-2603_v2_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-2603_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-2670_v2_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-2670_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-2609_v2_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-2609_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-1620_v2_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-1620_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-2687w_v2_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-2687w_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-1650_v2_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-1650_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-2620_v2_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-2620_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-1660_v2_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-1660_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-2630_v2_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-2630_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-2630l_v2_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-2630l_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5-2637_v2_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5-2637_v2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e3-1230_v6_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1230_v6:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e3-1280_v6_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1280_v6:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e3-1225_v6_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1225_v6:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e3-1240_v6_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1240_v6:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e3-1275_v6_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1275_v6:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e3-1220_v6_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1220_v6:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e3-1270_v6_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1270_v6:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e3-1245_v6_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1245_v6:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e3-1535m_v6_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1535m_v6:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e3-1505m_v6_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1505m_v6:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e3-1565l_v5_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1565l_v5:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e3-1585l_v5_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1585l_v5:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e3-1585_v5_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1585_v5:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e3-1558l_v5_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1558l_v5:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e3-1545m_v5_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1545m_v5:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e3-1575m_v5_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1575m_v5:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e3-1515m_v5_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1515m_v5:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e3-1240l_v5_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1240l_v5:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e3-1235l_v5_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1235l_v5:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e3-1280_v5_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1280_v5:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e3-1220_v5_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1220_v5:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e3-1230_v5_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1230_v5:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e3-1245_v5_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1245_v5:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e3-1270_v5_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1270_v5:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e3-1225_v5_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1225_v5:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e3-1260l_v5_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1260l_v5:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e3-1240_v5_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1240_v5:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e3-1275_v5_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1275_v5:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e3-1268l_v5_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1268l_v5:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e3-1505m_v5_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1505m_v5:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e3-1535m_v5_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1535m_v5:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e3-1265l_v4_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1265l_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e3-1285l_v4_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1285l_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e3-1285_v4_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1285_v4:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e3-1241_v3_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1241_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e3-1231_v3_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1231_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e3-1240l_v3_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1240l_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e3-1276_v3_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1276_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e3-1281_v3_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1281_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e3-1246_v3_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1246_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e3-1271_v3_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1271_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e3-1226_v3_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1226_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e3-1220l_v3_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1220l_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e3-1220_v3_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1220_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e3-1230l_v3_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1230l_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e3-1225_v3_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1225_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e3-1265l_v3_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1265l_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e3-1275_v3_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3-1275_v3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e-2226g_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e-2226g:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e-2234_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e-2234:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e-2236_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e-2236:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e-2244g_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e-2244g:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e-2274g_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e-2274g:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e-2246g_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e-2246g:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e-2224_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e-2224:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e-2224g_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e-2224g:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e-2288g_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e-2288g:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e-2278g_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e-2278g:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e-2286g_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e-2286g:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e-2276g_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e-2276g:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e-2124g_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e-2124g:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e-2146g_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e-2146g:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e-2176g_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e-2176g:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e-2136_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e-2136:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e-2134_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e-2134:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e-2144g_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e-2144g:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e-2174g_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e-2174g:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e-2104g_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e-2104g:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e-2186g_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e-2186g:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e-2126g_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e-2126g:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e-2124_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e-2124:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_d-1602_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_d-1602:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_d-1653n_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_d-1653n:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_d-1622_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_d-1622:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_d-1623n_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_d-1623n:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_d-1627_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_d-1627:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_d-1637_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_d-1637:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_d-1633n_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_d-1633n:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_d-1649n_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_d-1649n:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_d-2141i_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_d-2141i:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_d-2177nt_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_d-2177nt:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_d-2161i_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_d-2161i:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_d-2143it_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_d-2143it:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_d-2146nt_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_d-2146nt:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_d-2145nt_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_d-2145nt:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_d-2123it_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_d-2123it:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_d-2173it_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_d-2173it:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_d-2191_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_d-2191:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_d-2187nt_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_d-2187nt:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_d-2142it_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_d-2142it:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_d-2163it_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_d-2163it:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_d-2183it_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_d-2183it:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_d-2166nt_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_d-2166nt:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_d-1533n_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_d-1533n:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_d-1513n_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_d-1513n:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_d-1543n_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_d-1543n:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_d-1523n_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_d-1523n:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_d-1553n_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_d-1553n:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_d-1539_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_d-1539:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_d-1529_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_d-1529:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_d-1559_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_d-1559:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_d-1557_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_d-1557:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_d-1567_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_d-1567:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_d-1577_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_d-1577:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_d-1571_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_d-1571:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_d-1528_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_d-1528:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_d-1541_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_d-1541:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_d-1518_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_d-1518:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_d-1521_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_d-1521:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_d-1531_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_d-1531:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_d-1548_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_d-1548:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_d-1527_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_d-1527:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_d-1537_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_d-1537:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_d-1520_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_d-1520:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_d-1540_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_d-1540:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_w-2275_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_w-2275:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_w-2295_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_w-2295:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_w-2265_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_w-2265:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_w-2255_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_w-2255:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_w-2223_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_w-2223:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_w-2245_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_w-2245:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_w-2225_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_w-2225:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_w-2235_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_w-2235:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_w-3265m_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_w-3265m:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_w-3245m_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_w-3245m:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_w-3275_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_w-3275:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_w-3245_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_w-3245:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_w-3275m_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_w-3275m:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_w-3223_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_w-3223:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_w-3265_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_w-3265:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_w-3225_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_w-3225:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_w-3175x_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_w-3175x:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_w-2175_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_w-2175:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_w-2133_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_w-2133:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_w-2155_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_w-2155:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_w-2123_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_w-2123:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_w-2145_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_w-2145:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_w-2125_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_w-2125:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_w-2135_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_w-2135:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_w-2195_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_w-2195:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_x7560_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_x7560:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_l7555_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_l7555:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_x7550_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_x7550:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_l7545_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_l7545:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_x7542_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_x7542:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e7540_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7540:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e7530_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7530:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e7520_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7520:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_x7460_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_x7460:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e7450_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7450:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_l7455_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_l7455:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_l7445_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_l7445:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e7440_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7440:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e7430_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7430:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e7420_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7420:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_x7350_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_x7350:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_l7345_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_l7345:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e7340_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7340:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e7330_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7330:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e7320_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7320:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e7310_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7310:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e7220_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7220:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e7210_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e7210:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_7150n_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_7150n:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_7140n_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_7140n:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_7140m_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_7140m:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_7130n_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_7130n:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_7130m_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_7130m:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_7120n_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_7120n:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_7120m_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_7120m:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_7110n_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_7110n:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_7110m_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_7110m:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_7041_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_7041:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_7040_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_7040:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_7020_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_7020:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_7030_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_7030:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_x6550_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_x6550:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e6540_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e6540:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e6510_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e6510:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_x5690_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_x5690:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_x5687_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_x5687:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_x5680_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_x5680:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_x5677_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_x5677:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_x5675_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_x5675:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_x5672_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_x5672:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_x5670_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_x5670:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_x5667_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_x5667:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_x5660_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_x5660:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_x5650_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_x5650:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5649_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5649:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_x5647_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_x5647:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5645_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5645:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_l5640_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_l5640:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5640_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5640:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_l5638_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_l5638:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_l5630_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_l5630:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5630_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5630:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5620_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5620:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_l5618_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_l5618:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_l5609_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_l5609:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5607_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5607:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5606_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5606:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5506_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5506:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5603_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5603:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_w5590_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_w5590:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_w5580_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_w5580:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_x5570_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_x5570:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_x5560_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_x5560:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_x5550_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_x5550:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_ec5549_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_ec5549:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5540_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5540:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_ec5539_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_ec5539:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_l5530_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_l5530:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5530_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5530:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_lc5528_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_lc5528:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_l5520_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_l5520:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5520_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5520:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_lc5518_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_lc5518:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_l5518_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_l5518:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_ec5509_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_ec5509:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_l5508_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_l5508:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5507_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5507:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_l5506_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_l5506:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5504_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5504:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5503_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5503:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5502_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5502:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_x5492_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_x5492:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_x5482_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_x5482:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_x5472_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_x5472:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5472_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5472:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_x5470_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_x5470:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5462_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5462:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_x5460_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_x5460:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_x5450_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_x5450:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5450_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5450:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5440_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5440:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_l5430_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_l5430:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5430_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5430:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_l5420_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_l5420:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5420_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5420:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_l5410_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_l5410:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5410_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5410:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_l5408_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_l5408:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5405_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5405:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_x5365_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_x5365:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_x5355_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_x5355:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5345_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5345:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_l5335_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_l5335:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5335_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5335:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_l5320_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_l5320:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5320_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5320:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_l5318_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_l5318:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_l5310_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_l5310:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5310_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5310:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_x5272_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_x5272:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_x5270_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_x5270:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_x5260_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_x5260:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_l5240_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_l5240:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5240_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5240:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_l5238_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_l5238:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5220_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5220:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_l5215_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_l5215:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e5205_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e5205:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_5160_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_5160:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_5150_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_5150:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_lv_5148_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_lv_5148:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_5140_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_5140:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_lv_5138_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_lv_5138:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_lv_5133_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_lv_5133:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_5130_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_5130:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_lv_5128_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_lv_5128:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_5120_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_5120:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_lv_5113_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_lv_5113:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_5110_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_5110:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_5080_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_5080:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_5070_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_5070:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_5063_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_5063:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_5060_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_5060:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_5050_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_5050:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_5040_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_5040:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_5030_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_5030:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_w3690_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_w3690:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_w3680_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_w3680:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_w3670_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_w3670:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_w3580_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_w3580:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_w3570_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_w3570:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_w3565_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_w3565:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_w3550_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_w3550:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_w3540_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_w3540:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_ec3539_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_ec3539:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_w3530_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_w3530:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_lc3528_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_lc3528:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_w3520_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_w3520:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_lc3518_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_lc3518:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_x3480_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_x3480:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_x3470_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_x3470:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_x3460_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_x3460:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_x3450_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_x3450:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_x3440_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_x3440:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_x3430_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_x3430:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_l3426_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_l3426:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_l3406_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_l3406:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_x3380_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_x3380:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_x3370_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_x3370:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_x3360_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_x3360:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_l3360_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_l3360:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_x3350_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_x3350:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_x3330_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_x3330:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_x3320_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_x3320:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_x3230_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_x3230:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_x3220_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_x3220:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_x3210_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_x3210:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e3120_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3120:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_l3110_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_l3110:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_e3110_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_e3110:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_3070_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_3070:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_3065_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_3065:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_3060_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_3060:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_3050_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_3050:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_3040_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_3040:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:xeon_l3014_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:xeon_l3014:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:f5:enterprise_manager:3.1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-iq_centralized_management:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "6.1.0",
"versionStartIncluding": "6.0.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-iq_centralized_management:7.0.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-iq_centralized_management:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "5.4.0",
"versionStartIncluding": "5.2.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "12.1.5",
"versionStartIncluding": "12.1.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "12.1.5",
"versionStartIncluding": "12.1.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "12.1.5",
"versionStartIncluding": "12.1.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "12.1.5",
"versionStartIncluding": "12.1.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "12.1.5",
"versionStartIncluding": "12.1.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "12.1.5",
"versionStartIncluding": "12.1.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "12.1.5",
"versionStartIncluding": "12.1.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "12.1.5",
"versionStartIncluding": "12.1.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "12.1.5",
"versionStartIncluding": "12.1.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "12.1.5",
"versionStartIncluding": "12.1.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "12.1.5",
"versionStartIncluding": "12.1.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "15.0.1",
"versionStartIncluding": "15.0.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "11.6.5",
"versionStartIncluding": "11.5.2",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "11.6.5",
"versionStartIncluding": "11.5.2",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "11.6.5",
"versionStartIncluding": "11.5.2",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "11.6.5",
"versionStartIncluding": "11.5.2",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "11.6.5",
"versionStartIncluding": "11.5.2",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "11.6.5",
"versionStartIncluding": "11.5.2",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "11.6.5",
"versionStartIncluding": "11.5.2",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "11.6.5",
"versionStartIncluding": "11.5.2",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "11.6.5",
"versionStartIncluding": "11.5.2",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "11.6.5",
"versionStartIncluding": "11.5.2",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "11.6.5",
"versionStartIncluding": "11.5.2",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "13.1.3",
"versionStartIncluding": "13.1.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "15.0.1",
"versionStartIncluding": "15.0.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "13.1.3",
"versionStartIncluding": "13.1.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "13.1.3",
"versionStartIncluding": "13.1.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "13.1.3",
"versionStartIncluding": "13.1.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "13.1.3",
"versionStartIncluding": "13.1.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "13.1.3",
"versionStartIncluding": "13.1.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "13.1.3",
"versionStartIncluding": "13.1.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "13.1.3",
"versionStartIncluding": "13.1.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "13.1.3",
"versionStartIncluding": "13.1.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "13.1.3",
"versionStartIncluding": "13.1.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "13.1.3",
"versionStartIncluding": "13.1.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "15.0.1",
"versionStartIncluding": "15.0.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "15.0.1",
"versionStartIncluding": "15.0.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "15.0.1",
"versionStartIncluding": "15.0.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "15.0.1",
"versionStartIncluding": "15.0.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "15.0.1",
"versionStartIncluding": "15.0.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "15.0.1",
"versionStartIncluding": "15.0.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "15.0.1",
"versionStartIncluding": "15.0.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "15.0.1",
"versionStartIncluding": "15.0.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "15.0.1",
"versionStartIncluding": "15.0.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "14.1.2",
"versionStartIncluding": "14.1.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "14.1.2",
"versionStartIncluding": "14.1.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "14.1.2",
"versionStartIncluding": "14.1.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "14.1.2",
"versionStartIncluding": "14.1.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "14.1.2",
"versionStartIncluding": "14.1.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "14.1.2",
"versionStartIncluding": "14.1.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "14.1.2",
"versionStartIncluding": "14.1.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "14.1.2",
"versionStartIncluding": "14.1.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "14.1.2",
"versionStartIncluding": "14.1.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "14.1.2",
"versionStartIncluding": "14.1.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "14.1.2",
"versionStartIncluding": "14.1.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:redhat:openshift_container_platform:4.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:redhat:openshift_container_platform:4.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_eus:8.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:oracle:solaris:11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "secure@intel.com",
"ID": "CVE-2018-12207"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "Improper invalidation for page table updates by a virtual guest operating system for multiple Intel(R) Processors may allow an authenticated user to potentially enable denial of service of the host system via local access."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html",
"refsource": "MISC",
"tags": [
"Vendor Advisory"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html"
},
{
"name": "FEDORA-2019-376ec5c107",
"refsource": "FEDORA",
"tags": [
"Third Party Advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I5WWPW4BSZDDW7VHU427XTVXV7ROOFFW/"
},
{
"name": "RHSA-2019:3916",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2019:3916"
},
{
"name": "RHSA-2019:3936",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2019:3936"
},
{
"name": "RHSA-2019:3941",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2019:3941"
},
{
"name": "USN-4186-2",
"refsource": "UBUNTU",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/4186-2/"
},
{
"name": "FEDORA-2019-cbb732f760",
"refsource": "FEDORA",
"tags": [
"Third Party Advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IZYATWNUGHRBG6I3TC24YHP5Y3J7I6KH/"
},
{
"name": "https://support.f5.com/csp/article/K17269881?utm_source=f5support\u0026amp;utm_medium=RSS",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "https://support.f5.com/csp/article/K17269881?utm_source=f5support\u0026amp;utm_medium=RSS"
},
{
"name": "openSUSE-SU-2019:2710",
"refsource": "SUSE",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00042.html"
},
{
"name": "RHSA-2020:0028",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2020:0028"
},
{
"name": "RHSA-2020:0026",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2020:0026"
},
{
"name": "DSA-4602",
"refsource": "DEBIAN",
"tags": [
"Third Party Advisory"
],
"url": "https://www.debian.org/security/2020/dsa-4602"
},
{
"name": "20200114 [SECURITY] [DSA 4602-1] xen security update",
"refsource": "BUGTRAQ",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://seclists.org/bugtraq/2020/Jan/21"
},
{
"name": "RHSA-2020:0204",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2020:0204"
},
{
"name": "GLSA-202003-56",
"refsource": "GENTOO",
"tags": [
"Third Party Advisory"
],
"url": "https://security.gentoo.org/glsa/202003-56"
},
{
"name": "https://www.oracle.com/security-alerts/cpujul2020.html",
"refsource": "MISC",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://www.oracle.com/security-alerts/cpujul2020.html"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 4.9,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.0,
"impactScore": 4.0
}
},
"lastModifiedDate": "2023-09-27T20:51Z",
"publishedDate": "2019-11-14T20:15Z"
}
}
}
cnvd-2019-42433
Vulnerability from cnvd
厂商已发布了漏洞修复程序,请及时关注更新: https://portal.msrc.microsoft.com/zh-CN/security-guidance/advisory/CVE-2018-12207
| Name | ['Microsoft Windows Server 2008 R2 SP1', 'Microsoft Windows 7 SP1', 'Microsoft Windows Windows Server 2012', 'Microsoft Windows 8.1', 'Microsoft Windows RT 8.1 SP0', 'Microsoft Windows Server 2012 R2', 'Microsoft Windows 10', 'Microsoft Windows 10 1607', 'Microsoft Windows Server 2016', 'Microsoft Windows Server 1803', 'Microsoft Windows Server 2019', 'Microsoft Windows Server 1903', 'Microsoft Windows 10 1709', 'Microsoft Windows 10 1803', 'Microsoft Windows 10 1809', 'Microsoft Windows 10 1903'] |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2018-12207"
}
},
"description": "Microsoft Windows\u548cMicrosoft Windows Server\u90fd\u662f\u7f8e\u56fd\u5fae\u8f6f\uff08Microsoft\uff09\u516c\u53f8\u7684\u4ea7\u54c1\u3002Microsoft Windows\u662f\u4e00\u5957\u4e2a\u4eba\u8bbe\u5907\u4f7f\u7528\u7684\u64cd\u4f5c\u7cfb\u7edf\u3002Microsoft Windows Server\u662f\u4e00\u5957\u670d\u52a1\u5668\u64cd\u4f5c\u7cfb\u7edf\u3002\n\nMicrosoft Windows\u548cWindows Server\u4e2d\u5b58\u5728\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u7a0b\u5e8f\u672a\u80fd\u6b63\u786e\u5904\u7406\u5185\u5b58\u4e2d\u7684\u5bf9\u8c61\uff0c\u653b\u51fb\u8005\u53ef\u901a\u8fc7\u767b\u5f55\u5230\u53d7\u5f71\u54cd\u7684\u7cfb\u7edf\u5e76\u8fd0\u884c\u7ecf\u7279\u6b8a\u8bbe\u8ba1\u7684\u5e94\u7528\u7a0b\u5e8f\u5229\u7528\u8be5\u6f0f\u6d1e\u9020\u6210\u76ee\u6807\u7cfb\u7edf\u505c\u6b62\u54cd\u5e94\u3002",
"formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u4e86\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://portal.msrc.microsoft.com/zh-CN/security-guidance/advisory/CVE-2018-12207",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2019-42433",
"openTime": "2019-11-27",
"patchDescription": "Microsoft Windows\u548cMicrosoft Windows Server\u90fd\u662f\u7f8e\u56fd\u5fae\u8f6f\uff08Microsoft\uff09\u516c\u53f8\u7684\u4ea7\u54c1\u3002Microsoft Windows\u662f\u4e00\u5957\u4e2a\u4eba\u8bbe\u5907\u4f7f\u7528\u7684\u64cd\u4f5c\u7cfb\u7edf\u3002Microsoft Windows Server\u662f\u4e00\u5957\u670d\u52a1\u5668\u64cd\u4f5c\u7cfb\u7edf\u3002\r\n\r\nMicrosoft Windows\u548cWindows Server\u4e2d\u5b58\u5728\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u7a0b\u5e8f\u672a\u80fd\u6b63\u786e\u5904\u7406\u5185\u5b58\u4e2d\u7684\u5bf9\u8c61\uff0c\u653b\u51fb\u8005\u53ef\u901a\u8fc7\u767b\u5f55\u5230\u53d7\u5f71\u54cd\u7684\u7cfb\u7edf\u5e76\u8fd0\u884c\u7ecf\u7279\u6b8a\u8bbe\u8ba1\u7684\u5e94\u7528\u7a0b\u5e8f\u5229\u7528\u8be5\u6f0f\u6d1e\u9020\u6210\u76ee\u6807\u7cfb\u7edf\u505c\u6b62\u54cd\u5e94\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "Microsoft Windows\u548cMicrosoft Windows Server\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e\u7684\u8865\u4e01",
"products": {
"product": [
"Microsoft Windows Server 2008 R2 SP1",
"Microsoft Windows 7 SP1",
"Microsoft Windows Windows Server 2012",
"Microsoft Windows 8.1",
"Microsoft Windows RT 8.1 SP0",
"Microsoft Windows Server 2012 R2",
"Microsoft Windows 10",
"Microsoft Windows 10 1607",
"Microsoft Windows Server 2016",
"Microsoft Windows Server 1803",
"Microsoft Windows Server 2019",
"Microsoft Windows Server 1903",
"Microsoft Windows 10 1709",
"Microsoft Windows 10 1803",
"Microsoft Windows 10 1809",
"Microsoft Windows 10 1903"
]
},
"referenceLink": "https://access.redhat.com/errata/RHSA-2019:3844\r\nhttps://packetstormsecurity.com/files/155294/Red-Hat-Security-Advisory-2019-3839-01.html",
"serverity": "\u4f4e",
"submitTime": "2019-11-13",
"title": "Microsoft Windows\u548cMicrosoft Windows Server\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e"
}
var-201911-1619
Vulnerability from variot
Improper invalidation for page table updates by a virtual guest operating system for multiple Intel(R) Processors may allow an authenticated user to potentially enable denial of service of the host system via local access. Both Microsoft Windows and Microsoft Windows Server are products of Microsoft Corporation. Microsoft Windows is an operating system for personal devices. Microsoft Windows Server is a server operating system. A denial of service vulnerability exists in Microsoft Windows and Windows Server due to the program's improper handling of objects in memory. An attacker could exploit this vulnerability by logging on to an affected system and running a specially crafted application to cause the targeted system to become unresponsive. The following products and versions are affected: Microsoft Windows 10, Windows 10 Version 1607, Windows 10 Version 1709, Windows 10 Version 1803, Windows 10 Version 1809, Windows 10 Version 1903, Windows 7 SP1, Windows 8.1, Windows RT 8.1, Windows Server 2008 R2 SP1, Windows Server 2012, Windows Server 2012 R2, Windows Server 2016, Windows Server 2019, Windows Server version 1803, Windows Server version 1903.
Bug Fix(es):
-
Backport TCP follow-up for small buffers (BZ#1739184)
-
TCP performance regression after CVE-2019-11478 bug fix (BZ#1743170)
-
RHEL8.0 - bnx2x link down, caused by transmit timeouts during load test (Marvell/Cavium/QLogic) (L3:) (BZ#1743548)
-
block: blk-mq improvement (BZ#1780567)
-
RHEL8.0 - Regression to RHEL7.6 by changing force_latency found during RHEL8.0 validation for SAP HANA on POWER (BZ#1781111)
-
blk-mq: overwirte performance drops on real MQ device (BZ#1782183)
-
RHEL8: creating vport takes lot of memory i.e 2GB per vport which leads to drain out system memory quickly. (BZ#1782705)
-
========================================================================== Ubuntu Security Notice USN-4184-2 November 13, 2019
linux, linux-hwe, linux-oem-osp1 vulnerability and regression
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 19.04
- Ubuntu 18.04 LTS
Summary:
Several issues were fixed in the Linux kernel.
Software Description: - linux: Linux kernel - linux-hwe: Linux hardware enablement (HWE) kernel - linux-oem-osp1: Linux kernel for OEM processors
Details:
USN-4184-1 fixed vulnerabilities in the Linux kernel. It was discovered that the kernel fix for CVE-2019-0155 (i915 missing Blitter Command Streamer check) was incomplete on 64-bit Intel x86 systems. Also, the update introduced a regression that broke KVM guests where extended page tables (EPT) are disabled or not supported. This update addresses both issues.
We apologize for the inconvenience.
Original advisory details:
Stephan van Schaik, Alyssa Milburn, Sebastian \xd6sterlund, Pietro Frigo, Kaveh Razavi, Herbert Bos, Cristiano Giuffrida, Giorgi Maisuradze, Moritz Lipp, Michael Schwarz, Daniel Gruss, and Jo Van Bulck discovered that Intel processors using Transactional Synchronization Extensions (TSX) could expose memory contents previously stored in microarchitectural buffers to a malicious process that is executing on the same CPU core. A local attacker could use this to expose sensitive information. (CVE-2019-11135)
It was discovered that the Intel i915 graphics chipsets allowed userspace to modify page table entries via writes to MMIO from the Blitter Command Streamer and expose kernel memory information. A local attacker could use this to expose sensitive information or possibly elevate privileges. A local attacker in a guest VM could use this to cause a denial of service (host system crash). (CVE-2018-12207)
It was discovered that the Intel i915 graphics chipsets could cause a system hang when userspace performed a read from GT memory mapped input output (MMIO) when the product is in certain low power states. A local attacker could use this to cause a denial of service. (CVE-2019-0154)
Hui Peng discovered that the Atheros AR6004 USB Wi-Fi device driver for the Linux kernel did not properly validate endpoint descriptors returned by the device. A physically proximate attacker could use this to cause a denial of service (system crash). (CVE-2019-15098)
Jann Horn discovered a reference count underflow in the shiftfs implementation in the Linux kernel. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2019-15791)
Jann Horn discovered a type confusion vulnerability in the shiftfs implementation in the Linux kernel. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2019-15792)
Jann Horn discovered that the shiftfs implementation in the Linux kernel did not use the correct file system uid/gid when the user namespace of a lower file system is not in the init user namespace. A local attacker could use this to possibly bypass DAC permissions or have some other unspecified impact. (CVE-2019-15793)
Ori Nimron discovered that the AX25 network protocol implementation in the Linux kernel did not properly perform permissions checks. A local attacker could use this to create a raw socket. (CVE-2019-17052)
Ori Nimron discovered that the IEEE 802.15.4 Low-Rate Wireless network protocol implementation in the Linux kernel did not properly perform permissions checks. A local attacker could use this to create a raw socket. (CVE-2019-17053)
Ori Nimron discovered that the Appletalk network protocol implementation in the Linux kernel did not properly perform permissions checks. A local attacker could use this to create a raw socket. (CVE-2019-17054)
Ori Nimron discovered that the modular ISDN network protocol implementation in the Linux kernel did not properly perform permissions checks. A local attacker could use this to create a raw socket. (CVE-2019-17055)
Ori Nimron discovered that the Near field Communication (NFC) network protocol implementation in the Linux kernel did not properly perform permissions checks. A local attacker could use this to create a raw socket. (CVE-2019-17056)
Nico Waisman discovered that a buffer overflow existed in the Realtek Wi-Fi driver for the Linux kernel when handling Notice of Absence frames. A physically proximate attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2019-17666)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 19.04: linux-image-5.0.0-36-generic 5.0.0-36.39 linux-image-5.0.0-36-generic-lpae 5.0.0-36.39 linux-image-5.0.0-36-lowlatency 5.0.0-36.39 linux-image-generic 5.0.0.36.38 linux-image-generic-lpae 5.0.0.36.38 linux-image-lowlatency 5.0.0.36.38 linux-image-virtual 5.0.0.36.38
Ubuntu 18.04 LTS: linux-image-5.0.0-1028-oem-osp1 5.0.0-1028.32 linux-image-5.0.0-36-generic 5.0.0-36.39~18.04.1 linux-image-5.0.0-36-generic-lpae 5.0.0-36.39~18.04.1 linux-image-5.0.0-36-lowlatency 5.0.0-36.39~18.04.1 linux-image-generic-hwe-18.04 5.0.0.36.94 linux-image-generic-lpae-hwe-18.04 5.0.0.36.94 linux-image-lowlatency-hwe-18.04 5.0.0.36.94 linux-image-oem-osp1 5.0.0.1028.32 linux-image-virtual-hwe-18.04 5.0.0.36.94
Please note that mitigating the TSX (CVE-2019-11135) and i915 (CVE-2019-0154) issues requires corresponding microcode and graphics firmware updates respectively.
After a standard system update you need to reboot your computer to make all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well.
References: https://usn.ubuntu.com/4184-2 https://usn.ubuntu.com/4184-1 CVE-2019-0155, https://bugs.launchpad.net/bugs/1851709, https://bugs.launchpad.net/bugs/1852141
Package Information: https://launchpad.net/ubuntu/+source/linux/5.0.0-36.39 https://launchpad.net/ubuntu/+source/linux-hwe/5.0.0-36.39~18.04.1 https://launchpad.net/ubuntu/+source/linux-oem-osp1/5.0.0-1028.32 . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
===================================================================== Red Hat Security Advisory
Synopsis: Important: kernel security and bug fix update Advisory ID: RHSA-2019:3836-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2019:3836 Issue date: 2019-11-12 CVE Names: CVE-2018-12207 CVE-2019-0154 CVE-2019-3900 CVE-2019-11135 =====================================================================
- Summary:
An update for kernel is now available for Red Hat Enterprise Linux 6.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
- Relevant releases/architectures:
Red Hat Enterprise Linux Desktop (v. 6) - i386, noarch, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - noarch, x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, noarch, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, noarch, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64
Security Fix(es):
-
hw: Machine Check Error on Page Size Change (IFU) (CVE-2018-12207)
-
hw: TSX Transaction Asynchronous Abort (TAA) (CVE-2019-11135)
-
Kernel: vhost_net: infinite loop while receiving packets leads to DoS (CVE-2019-3900)
-
hw: Intel GPU Denial Of Service while accessing MMIO in lower power state (CVE-2019-0154)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
-
[Intel 6.10 Bug] With mWait/C-states disabled, HT on, ibrs enabled, performance impact observed on user space benchmark (BZ#1560787)
-
kernel-2.6.32-573.60.2.el6 hangs/resets during boot in efi_enter_virtual_mode() on Xeon v2 E7-2870 (BZ#1645724)
-
Slab leak: skbuff_head_cache slab object still allocated after mcast processes are stopped and "fragments dropped after timeout" errors are shown (BZ#1752536)
-
Bugs fixed (https://bugzilla.redhat.com/):
1646768 - CVE-2018-12207 hw: Machine Check Error on Page Size Change (IPU) 1698757 - CVE-2019-3900 Kernel: vhost_net: infinite loop while receiving packets leads to DoS 1724393 - CVE-2019-0154 hw: Intel GPU Denial Of Service while accessing MMIO in lower power state 1753062 - CVE-2019-11135 hw: TSX Transaction Asynchronous Abort (TAA)
- Package List:
Red Hat Enterprise Linux Desktop (v. 6):
Source: kernel-2.6.32-754.24.2.el6.src.rpm
i386: kernel-2.6.32-754.24.2.el6.i686.rpm kernel-debug-2.6.32-754.24.2.el6.i686.rpm kernel-debug-debuginfo-2.6.32-754.24.2.el6.i686.rpm kernel-debug-devel-2.6.32-754.24.2.el6.i686.rpm kernel-debuginfo-2.6.32-754.24.2.el6.i686.rpm kernel-debuginfo-common-i686-2.6.32-754.24.2.el6.i686.rpm kernel-devel-2.6.32-754.24.2.el6.i686.rpm kernel-headers-2.6.32-754.24.2.el6.i686.rpm perf-2.6.32-754.24.2.el6.i686.rpm perf-debuginfo-2.6.32-754.24.2.el6.i686.rpm python-perf-debuginfo-2.6.32-754.24.2.el6.i686.rpm
noarch: kernel-abi-whitelists-2.6.32-754.24.2.el6.noarch.rpm kernel-doc-2.6.32-754.24.2.el6.noarch.rpm kernel-firmware-2.6.32-754.24.2.el6.noarch.rpm
x86_64: kernel-2.6.32-754.24.2.el6.x86_64.rpm kernel-debug-2.6.32-754.24.2.el6.x86_64.rpm kernel-debug-debuginfo-2.6.32-754.24.2.el6.i686.rpm kernel-debug-debuginfo-2.6.32-754.24.2.el6.x86_64.rpm kernel-debug-devel-2.6.32-754.24.2.el6.i686.rpm kernel-debug-devel-2.6.32-754.24.2.el6.x86_64.rpm kernel-debuginfo-2.6.32-754.24.2.el6.i686.rpm kernel-debuginfo-2.6.32-754.24.2.el6.x86_64.rpm kernel-debuginfo-common-i686-2.6.32-754.24.2.el6.i686.rpm kernel-debuginfo-common-x86_64-2.6.32-754.24.2.el6.x86_64.rpm kernel-devel-2.6.32-754.24.2.el6.x86_64.rpm kernel-headers-2.6.32-754.24.2.el6.x86_64.rpm perf-2.6.32-754.24.2.el6.x86_64.rpm perf-debuginfo-2.6.32-754.24.2.el6.i686.rpm perf-debuginfo-2.6.32-754.24.2.el6.x86_64.rpm python-perf-debuginfo-2.6.32-754.24.2.el6.i686.rpm python-perf-debuginfo-2.6.32-754.24.2.el6.x86_64.rpm
Red Hat Enterprise Linux Desktop Optional (v. 6):
i386: kernel-debug-debuginfo-2.6.32-754.24.2.el6.i686.rpm kernel-debuginfo-2.6.32-754.24.2.el6.i686.rpm kernel-debuginfo-common-i686-2.6.32-754.24.2.el6.i686.rpm perf-debuginfo-2.6.32-754.24.2.el6.i686.rpm python-perf-2.6.32-754.24.2.el6.i686.rpm python-perf-debuginfo-2.6.32-754.24.2.el6.i686.rpm
x86_64: kernel-debug-debuginfo-2.6.32-754.24.2.el6.x86_64.rpm kernel-debuginfo-2.6.32-754.24.2.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-754.24.2.el6.x86_64.rpm perf-debuginfo-2.6.32-754.24.2.el6.x86_64.rpm python-perf-2.6.32-754.24.2.el6.x86_64.rpm python-perf-debuginfo-2.6.32-754.24.2.el6.x86_64.rpm
Red Hat Enterprise Linux HPC Node (v. 6):
Source: kernel-2.6.32-754.24.2.el6.src.rpm
noarch: kernel-abi-whitelists-2.6.32-754.24.2.el6.noarch.rpm kernel-doc-2.6.32-754.24.2.el6.noarch.rpm kernel-firmware-2.6.32-754.24.2.el6.noarch.rpm
x86_64: kernel-2.6.32-754.24.2.el6.x86_64.rpm kernel-debug-2.6.32-754.24.2.el6.x86_64.rpm kernel-debug-debuginfo-2.6.32-754.24.2.el6.i686.rpm kernel-debug-debuginfo-2.6.32-754.24.2.el6.x86_64.rpm kernel-debug-devel-2.6.32-754.24.2.el6.i686.rpm kernel-debug-devel-2.6.32-754.24.2.el6.x86_64.rpm kernel-debuginfo-2.6.32-754.24.2.el6.i686.rpm kernel-debuginfo-2.6.32-754.24.2.el6.x86_64.rpm kernel-debuginfo-common-i686-2.6.32-754.24.2.el6.i686.rpm kernel-debuginfo-common-x86_64-2.6.32-754.24.2.el6.x86_64.rpm kernel-devel-2.6.32-754.24.2.el6.x86_64.rpm kernel-headers-2.6.32-754.24.2.el6.x86_64.rpm perf-2.6.32-754.24.2.el6.x86_64.rpm perf-debuginfo-2.6.32-754.24.2.el6.i686.rpm perf-debuginfo-2.6.32-754.24.2.el6.x86_64.rpm python-perf-debuginfo-2.6.32-754.24.2.el6.i686.rpm python-perf-debuginfo-2.6.32-754.24.2.el6.x86_64.rpm
Red Hat Enterprise Linux HPC Node Optional (v. 6):
x86_64: kernel-debug-debuginfo-2.6.32-754.24.2.el6.x86_64.rpm kernel-debuginfo-2.6.32-754.24.2.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-754.24.2.el6.x86_64.rpm perf-debuginfo-2.6.32-754.24.2.el6.x86_64.rpm python-perf-2.6.32-754.24.2.el6.x86_64.rpm python-perf-debuginfo-2.6.32-754.24.2.el6.x86_64.rpm
Red Hat Enterprise Linux Server (v. 6):
Source: kernel-2.6.32-754.24.2.el6.src.rpm
i386: kernel-2.6.32-754.24.2.el6.i686.rpm kernel-debug-2.6.32-754.24.2.el6.i686.rpm kernel-debug-debuginfo-2.6.32-754.24.2.el6.i686.rpm kernel-debug-devel-2.6.32-754.24.2.el6.i686.rpm kernel-debuginfo-2.6.32-754.24.2.el6.i686.rpm kernel-debuginfo-common-i686-2.6.32-754.24.2.el6.i686.rpm kernel-devel-2.6.32-754.24.2.el6.i686.rpm kernel-headers-2.6.32-754.24.2.el6.i686.rpm perf-2.6.32-754.24.2.el6.i686.rpm perf-debuginfo-2.6.32-754.24.2.el6.i686.rpm python-perf-debuginfo-2.6.32-754.24.2.el6.i686.rpm
noarch: kernel-abi-whitelists-2.6.32-754.24.2.el6.noarch.rpm kernel-doc-2.6.32-754.24.2.el6.noarch.rpm kernel-firmware-2.6.32-754.24.2.el6.noarch.rpm
ppc64: kernel-2.6.32-754.24.2.el6.ppc64.rpm kernel-bootwrapper-2.6.32-754.24.2.el6.ppc64.rpm kernel-debug-2.6.32-754.24.2.el6.ppc64.rpm kernel-debug-debuginfo-2.6.32-754.24.2.el6.ppc64.rpm kernel-debug-devel-2.6.32-754.24.2.el6.ppc64.rpm kernel-debuginfo-2.6.32-754.24.2.el6.ppc64.rpm kernel-debuginfo-common-ppc64-2.6.32-754.24.2.el6.ppc64.rpm kernel-devel-2.6.32-754.24.2.el6.ppc64.rpm kernel-headers-2.6.32-754.24.2.el6.ppc64.rpm perf-2.6.32-754.24.2.el6.ppc64.rpm perf-debuginfo-2.6.32-754.24.2.el6.ppc64.rpm python-perf-debuginfo-2.6.32-754.24.2.el6.ppc64.rpm
s390x: kernel-2.6.32-754.24.2.el6.s390x.rpm kernel-debug-2.6.32-754.24.2.el6.s390x.rpm kernel-debug-debuginfo-2.6.32-754.24.2.el6.s390x.rpm kernel-debug-devel-2.6.32-754.24.2.el6.s390x.rpm kernel-debuginfo-2.6.32-754.24.2.el6.s390x.rpm kernel-debuginfo-common-s390x-2.6.32-754.24.2.el6.s390x.rpm kernel-devel-2.6.32-754.24.2.el6.s390x.rpm kernel-headers-2.6.32-754.24.2.el6.s390x.rpm kernel-kdump-2.6.32-754.24.2.el6.s390x.rpm kernel-kdump-debuginfo-2.6.32-754.24.2.el6.s390x.rpm kernel-kdump-devel-2.6.32-754.24.2.el6.s390x.rpm perf-2.6.32-754.24.2.el6.s390x.rpm perf-debuginfo-2.6.32-754.24.2.el6.s390x.rpm python-perf-debuginfo-2.6.32-754.24.2.el6.s390x.rpm
x86_64: kernel-2.6.32-754.24.2.el6.x86_64.rpm kernel-debug-2.6.32-754.24.2.el6.x86_64.rpm kernel-debug-debuginfo-2.6.32-754.24.2.el6.i686.rpm kernel-debug-debuginfo-2.6.32-754.24.2.el6.x86_64.rpm kernel-debug-devel-2.6.32-754.24.2.el6.i686.rpm kernel-debug-devel-2.6.32-754.24.2.el6.x86_64.rpm kernel-debuginfo-2.6.32-754.24.2.el6.i686.rpm kernel-debuginfo-2.6.32-754.24.2.el6.x86_64.rpm kernel-debuginfo-common-i686-2.6.32-754.24.2.el6.i686.rpm kernel-debuginfo-common-x86_64-2.6.32-754.24.2.el6.x86_64.rpm kernel-devel-2.6.32-754.24.2.el6.x86_64.rpm kernel-headers-2.6.32-754.24.2.el6.x86_64.rpm perf-2.6.32-754.24.2.el6.x86_64.rpm perf-debuginfo-2.6.32-754.24.2.el6.i686.rpm perf-debuginfo-2.6.32-754.24.2.el6.x86_64.rpm python-perf-debuginfo-2.6.32-754.24.2.el6.i686.rpm python-perf-debuginfo-2.6.32-754.24.2.el6.x86_64.rpm
Red Hat Enterprise Linux Server Optional (v. 6):
i386: kernel-debug-debuginfo-2.6.32-754.24.2.el6.i686.rpm kernel-debuginfo-2.6.32-754.24.2.el6.i686.rpm kernel-debuginfo-common-i686-2.6.32-754.24.2.el6.i686.rpm perf-debuginfo-2.6.32-754.24.2.el6.i686.rpm python-perf-2.6.32-754.24.2.el6.i686.rpm python-perf-debuginfo-2.6.32-754.24.2.el6.i686.rpm
ppc64: kernel-debug-debuginfo-2.6.32-754.24.2.el6.ppc64.rpm kernel-debuginfo-2.6.32-754.24.2.el6.ppc64.rpm kernel-debuginfo-common-ppc64-2.6.32-754.24.2.el6.ppc64.rpm perf-debuginfo-2.6.32-754.24.2.el6.ppc64.rpm python-perf-2.6.32-754.24.2.el6.ppc64.rpm python-perf-debuginfo-2.6.32-754.24.2.el6.ppc64.rpm
s390x: kernel-debug-debuginfo-2.6.32-754.24.2.el6.s390x.rpm kernel-debuginfo-2.6.32-754.24.2.el6.s390x.rpm kernel-debuginfo-common-s390x-2.6.32-754.24.2.el6.s390x.rpm kernel-kdump-debuginfo-2.6.32-754.24.2.el6.s390x.rpm perf-debuginfo-2.6.32-754.24.2.el6.s390x.rpm python-perf-2.6.32-754.24.2.el6.s390x.rpm python-perf-debuginfo-2.6.32-754.24.2.el6.s390x.rpm
x86_64: kernel-debug-debuginfo-2.6.32-754.24.2.el6.x86_64.rpm kernel-debuginfo-2.6.32-754.24.2.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-754.24.2.el6.x86_64.rpm perf-debuginfo-2.6.32-754.24.2.el6.x86_64.rpm python-perf-2.6.32-754.24.2.el6.x86_64.rpm python-perf-debuginfo-2.6.32-754.24.2.el6.x86_64.rpm
Red Hat Enterprise Linux Workstation (v. 6):
Source: kernel-2.6.32-754.24.2.el6.src.rpm
i386: kernel-2.6.32-754.24.2.el6.i686.rpm kernel-debug-2.6.32-754.24.2.el6.i686.rpm kernel-debug-debuginfo-2.6.32-754.24.2.el6.i686.rpm kernel-debug-devel-2.6.32-754.24.2.el6.i686.rpm kernel-debuginfo-2.6.32-754.24.2.el6.i686.rpm kernel-debuginfo-common-i686-2.6.32-754.24.2.el6.i686.rpm kernel-devel-2.6.32-754.24.2.el6.i686.rpm kernel-headers-2.6.32-754.24.2.el6.i686.rpm perf-2.6.32-754.24.2.el6.i686.rpm perf-debuginfo-2.6.32-754.24.2.el6.i686.rpm python-perf-debuginfo-2.6.32-754.24.2.el6.i686.rpm
noarch: kernel-abi-whitelists-2.6.32-754.24.2.el6.noarch.rpm kernel-doc-2.6.32-754.24.2.el6.noarch.rpm kernel-firmware-2.6.32-754.24.2.el6.noarch.rpm
x86_64: kernel-2.6.32-754.24.2.el6.x86_64.rpm kernel-debug-2.6.32-754.24.2.el6.x86_64.rpm kernel-debug-debuginfo-2.6.32-754.24.2.el6.i686.rpm kernel-debug-debuginfo-2.6.32-754.24.2.el6.x86_64.rpm kernel-debug-devel-2.6.32-754.24.2.el6.i686.rpm kernel-debug-devel-2.6.32-754.24.2.el6.x86_64.rpm kernel-debuginfo-2.6.32-754.24.2.el6.i686.rpm kernel-debuginfo-2.6.32-754.24.2.el6.x86_64.rpm kernel-debuginfo-common-i686-2.6.32-754.24.2.el6.i686.rpm kernel-debuginfo-common-x86_64-2.6.32-754.24.2.el6.x86_64.rpm kernel-devel-2.6.32-754.24.2.el6.x86_64.rpm kernel-headers-2.6.32-754.24.2.el6.x86_64.rpm perf-2.6.32-754.24.2.el6.x86_64.rpm perf-debuginfo-2.6.32-754.24.2.el6.i686.rpm perf-debuginfo-2.6.32-754.24.2.el6.x86_64.rpm python-perf-debuginfo-2.6.32-754.24.2.el6.i686.rpm python-perf-debuginfo-2.6.32-754.24.2.el6.x86_64.rpm
Red Hat Enterprise Linux Workstation Optional (v. 6):
i386: kernel-debug-debuginfo-2.6.32-754.24.2.el6.i686.rpm kernel-debuginfo-2.6.32-754.24.2.el6.i686.rpm kernel-debuginfo-common-i686-2.6.32-754.24.2.el6.i686.rpm perf-debuginfo-2.6.32-754.24.2.el6.i686.rpm python-perf-2.6.32-754.24.2.el6.i686.rpm python-perf-debuginfo-2.6.32-754.24.2.el6.i686.rpm
x86_64: kernel-debug-debuginfo-2.6.32-754.24.2.el6.x86_64.rpm kernel-debuginfo-2.6.32-754.24.2.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-754.24.2.el6.x86_64.rpm perf-debuginfo-2.6.32-754.24.2.el6.x86_64.rpm python-perf-2.6.32-754.24.2.el6.x86_64.rpm python-perf-debuginfo-2.6.32-754.24.2.el6.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/
- Contact:
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/
Copyright 2019 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iQIVAwUBXcsc39zjgjWX9erEAQiIXQ//fbQ5UKtMa2pfofnF6CbwO4DbAYnOWbqx 1n4xgcWLZljSYz0/jp7h+fcDcF0TaQYswGhNj/oCvpGUl5NOZMhbAwVy/+hzzHiP gqRzyZSgIFpM1fUu+AtjGInWVS37eDGGqxQqsBGNh30l4/x4DduCdmN7XDXrKxgz 1TVUlsS34AHHmhk3brFeaf/bPY2jIGH9oZfC3wiX3L8sczjmSOlCC3E1sI3pm/uo Vin3Sl4vz9+krNNwxZw/6WE4wXMslaRBYku6cW31RgdmrZXXJGqYt5hglMbckSwn +x8SrFcRJkbgQiCo27ikf1rnjz/NB2f0E9kIoOVHoKZ/RW/HgFVlgC5LSZqrsVtE ARRhaT4dHDRZWxMwFaf6NNo6CpigxXC2fh7+9KXylUAq7HAT03wCBf1KWMgCzbG9 RlWSLQc5z8pwWPvnN1vsL5ZyaAXUDGjjU0ebSgcxvRRmGVt+YKtiGJU58lR6RuZt up6aUM1QoXNCKiLB+497ZNwANj0G3oBRA2qEAstffJksMrEBD3X15rIE4m5vxGpS ZMqKmT72HuG6MjOOwPZq6qwN0fOwpoAPnpIvHtl0NXJHtu1AmJgXcfERkNlN9X8d u+Mgr+sYxDjAlysz0qOwvD0Ib9SRFgwGQgo+B6Wvi6iG17yh9B/cunAYUQ0wDm3U XkMJCJGhDCY= =fpzb -----END PGP SIGNATURE-----
-- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . Description:
Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments.
Security Fix(es):
- A flaw was found in the way Intel CPUs handle inconsistency between, virtual to physical memory address translations in CPU's local cache and system software's Paging structure entries. A privileged guest user may use this flaw to induce a hardware Machine Check Error on the host processor, resulting in a severe DoS scenario by halting the processor.
System software like OS OR Virtual Machine Monitor (VMM) use virtual memory system for storing program instructions and data in memory. Virtual Memory system uses Paging structures like Page Tables and Page Directories to manage system memory. The processor's Memory Management Unit (MMU) uses Paging structure entries to translate program's virtual memory addresses to physical memory addresses. The processor stores these address translations into its local cache buffer called - Translation Lookaside Buffer (TLB). TLB has two parts, one for instructions and other for data addresses.
System software can modify its Paging structure entries to change address mappings OR certain attributes like page size etc. Upon such Paging structure alterations in memory, system software must invalidate the corresponding address translations in the processor's TLB cache. But before this TLB invalidation takes place, a privileged guest user may trigger an instruction fetch operation, which could use an already cached, but now invalid, virtual to physical address translation from Instruction TLB (ITLB). Thus accessing an invalid physical memory address and resulting in halting the processor due to the Machine Check Error (MCE) on Page Size Change. (CVE-2018-12207)
-
A flaw was found in the way sudo implemented running commands with an arbitrary user ID. If a sudoers entry is written to allow users to run a command as any user except root, this flaw can be used by an attacker to bypass that restriction. (CVE-2019-14287)
-
An improper authorization flaw was discovered in systemd-resolved in the way it configures the exposed DBus interface org.freedesktop.resolve1. An unprivileged local user could call all DBus methods, even when marked as privileged operations. An attacker could abuse this flaw by changing the DNS, Search Domain, LLMNR, DNSSEC, and other network link settings without any authorization, giving them control of the network names resolution process and causing the system to communicate with wrong or malicious servers. (CVE-2019-15718)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Solution:
For OpenShift Container Platform 4.1 see the following documentation, which will be updated shortly for release 4.1.24, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:
https://docs.openshift.com/container-platform/4.1/release_notes/ocp-4-1-rel ease-notes.html
- Bugs fixed (https://bugzilla.redhat.com/):
1646768 - CVE-2018-12207 hw: Machine Check Error on Page Size Change (IFU) 1746057 - CVE-2019-15718 systemd: systemd-resolved allows unprivileged users to configure DNS 1760531 - CVE-2019-14287 sudo: Privilege escalation via 'Runas' specification with 'ALL' keyword
- Description:
This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Solution:
Before applying this update, make sure all previously released errata relevant to your system have been applied. Bugs fixed (https://bugzilla.redhat.com/):
1782199 - CVE-2019-19339 kpatch: hw: incomplete fix for CVE-2018-12207
-
8) - aarch64, noarch, ppc64le, s390x, x86_64
-
6.6) - x86_64
-
Due to the high complexity of the fixes and the required microcode update, we are unable to livepatch this set of CVEs. Please plan to reboot into an updated kernel as soon as possible.
The details of these CVEs follows:
CVE-2018-12207
On an Ubuntu KVM host configured to use huge pages, a malicious KVM guest can cause a host machine check exception (MCE) capable of bringing down the host OS.
CVE-2019-11135
On Intel processors with support for Transactional Synchronization Extensions (TSX), it is possible to exploit a transactional asynchronous abort (TAA) to perform a side-channel attack and leak kernel memory.
Further details on the vulnerabilities and our response can be found here: https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/TAA_MCEPSC_i915
Again, due to the high complexity of the fixes and the required microcode update, we are unable to livepatch this set of CVEs. Please plan to reboot into an updated kernel as soon as possible.
| Series | Version | Flavors | |------------------+-----------------------+--------------------------| | Ubuntu 18.04 LTS | 4.15.0-1054.55 | aws | | Ubuntu 16.04 LTS | 4.4.0-1098.102 | aws | | Ubuntu 18.04 LTS | 5.0.0-1025.27~18.04.1 | azure | | Ubuntu 16.04 LTS | 4.15.0-1063.66 | azure | | Ubuntu 18.04 LTS | 4.15.0-69.78 | generic lowlatency | | Ubuntu 16.04 LTS | 4.15.0-69.78~16.04.1 | generic lowlatency | | Ubuntu 14.04 LTS | 4.4.0-168.197~14.04.1 | generic lowlatency | | Ubuntu 18.04 LTS | 4.15.0-1063.72 | oem | | Ubuntu 16.04 LTS | 4.4.0-168.197 | generic lowlatency |
Support Information:
Kernels older than the levels listed above will no longer receive livepatch updates.
References: CVE-2018-12207, CVE-2019-0154, CVE-2019-0155, CVE-2019-11135
-- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201911-1619",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "xeon e3-1268l v5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon w-3245m",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i3-6100",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e7-4809 v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "big-ip local traffic manager",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "14.1.2"
},
{
"model": "xeon e3120",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon l7555",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon silver 4209t",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon ec5539",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon x3350",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon x3330",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "big-ip advanced firewall manager",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "11.5.2"
},
{
"model": "core i5-5257u",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i5-7260u",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i5-8300h",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon d-1523n",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon d-2191",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon x3460",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i7-8559u",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core m3-8100y",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon w3520",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e-2186g",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i5-1035g4",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e7520",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "big-ip link controller",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "14.1.2"
},
{
"model": "core i9-7960x",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon w-2275",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon 3070",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i5-1035g7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "pentium gold g5400t",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "celeron g4950",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "celeron g3930",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon l5408",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "big-ip policy enforcement manager",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "11.5.2"
},
{
"model": "xeon silver 4215",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e7440",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i7-7800x",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5-1650 v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon d-1520",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "celeron g3930e",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i7-10510u",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5-2670 v2",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i9-9960x x-series",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e7-4820 v4",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "enterprise linux server eus",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "7.6"
},
{
"model": "pentium gold g5500t",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i3-9350k",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon gold 6262v",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i7-5557u",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon gold 5220",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e3-1220 v6",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e3-1241 v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e-2278g",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5430",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e7-8880 v2",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "big-ip domain name system",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "12.1.5"
},
{
"model": "xeon d-1539",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5-2699 v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i9-10920x x-series",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e7-8893 v2",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "big-ip local traffic manager",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "12.1.0"
},
{
"model": "xeon e5-2698 v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon gold 6252",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5640",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e7-8870 v4",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon w-3265m",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "big-ip domain name system",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "13.1.0"
},
{
"model": "xeon e5-4660 v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5-2470 v2",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i5\\+8400",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon 3060",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "big-ip application acceleration manager",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "12.1.5"
},
{
"model": "xeon 3065",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e-2176g",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "big-ip global traffic manager",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "12.1.5"
},
{
"model": "xeon e-2144g",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i5-7440hq",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon x5272",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i7-8750h",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon l5508",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "big-ip local traffic manager",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "15.0.1"
},
{
"model": "xeon 7120m",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e-2174g",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e7-4880 v2",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e7320",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon w-2175",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5649",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e3-1231 v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "pentium gold g5500",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e3-1505m v5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon d-2143it",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon x5365",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "big-ip local traffic manager",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "13.1.3"
},
{
"model": "xeon e5-2430l v2",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e6510",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon l3110",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i7-6770hq",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e7-8890 v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5-4627 v2",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon gold 6240y",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e7530",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon x5650",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e7340",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5-4669 v4",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "big-ip link controller",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "15.0.1"
},
{
"model": "xeon l5618",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "big-iq centralized management",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "5.4.0"
},
{
"model": "xeon e5-4660 v4",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i5-9300h",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e7420",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon l5240",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon lv 5128",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "big-ip application security manager",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "14.1.2"
},
{
"model": "celeron g1830",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon d-1571",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e3110",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i3-7320",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core m-5y10a",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e7-4850 v4",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5-2667 v4",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5-2630l v4",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon l5640",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon gold 5218t",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5-2695 v4",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i5-8350u",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "big-ip link controller",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "13.1.3"
},
{
"model": "xeon e5-4620 v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e3-1558l v5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon d-1518",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon d-1521",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon 7140m",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e7540",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon l5410",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e7-8880l v2",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5-2618l v4",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "big-ip access policy manager",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "15.0.0"
},
{
"model": "core i7-9700",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "big-ip domain name system",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "14.1.0"
},
{
"model": "big-ip link controller",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "11.5.2"
},
{
"model": "core i7-10510y",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon platinum 8270",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i7-8705g",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5-2407 v2",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5-2697 v2",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "pentium gold 4415u",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon lc3528",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5-2650l v4",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "big-ip access policy manager",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "12.1.5"
},
{
"model": "xeon x5550",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e3-1240 v6",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e3-1220 v5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "big-ip domain name system",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "11.6.5"
},
{
"model": "core i7-5700hq",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e3-1225 v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon l7345",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e7-4830 v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i3-8100t",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon d-1637",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5-2608l v4",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "big-ip fraud protection service",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "15.0.0"
},
{
"model": "xeon e5-2660 v4",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon l5506",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i5-7400",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e-2244g",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e7450",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "enterprise linux server tus",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "7.7"
},
{
"model": "xeon 3050",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "celeron g3900te",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "big-ip application acceleration manager",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "11.6.5"
},
{
"model": "xeon e7-4850 v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "celeron g4920",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5-2697 v4",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5450",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e-2146g",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5-4640 v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i7-7500u",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon x5677",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e-2276g",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "solaris",
"scope": "eq",
"trust": 1.0,
"vendor": "oracle",
"version": "11"
},
{
"model": "big-ip policy enforcement manager",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "12.1.5"
},
{
"model": "xeon l3426",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon gold 6254",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i7-9750h",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i5-9500",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon gold 6240",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon 5160",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon w-3225",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon l3014",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5-2620 v4",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon 7110m",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "celeron g3902e",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i5-8250u",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon l5318",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon w3690",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "big-ip application security manager",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "15.0.1"
},
{
"model": "xeon silver 4216",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "big-ip fraud protection service",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "14.1.2"
},
{
"model": "core i3-6100u",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i9-9920x x-series",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon w-2265",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon l5518",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon d-2161i",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon gold 6230n",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5-2450l v2",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon w-2195",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e3-1225 v6",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "big-ip application security manager",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "13.1.3"
},
{
"model": "core i3-9300",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e-2134",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon l3360",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "leap",
"scope": "eq",
"trust": 1.0,
"vendor": "opensuse",
"version": "15.1"
},
{
"model": "core i7-6820hk",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon ec5549",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon x5482",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon d-1553n",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5-2667 v2",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon l5238",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon w-2235",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5-2687w v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core m-5y71",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i3-8350k",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon gold 6248",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "big-ip access policy manager",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "13.1.0"
},
{
"model": "big-ip local traffic manager",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "11.5.2"
},
{
"model": "xeon e3-1535m v5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon x5460",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon platinum 8260l",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon d-2123it",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon x7460",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon d-1622",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core m-5y10",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "big-ip application security manager",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "14.1.0"
},
{
"model": "xeon e5-4655 v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon d-1533n",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i3-9300t",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i5-10210u",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon platinum 8276m",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon gold 6222v",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i7-8565u",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "big-ip access policy manager",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "11.6.5"
},
{
"model": "big-ip fraud protection service",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "13.1.0"
},
{
"model": "core m-5y70",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5-2620 v2",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i3-5020u",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i7-7820hk",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon 5050",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i5-7287u",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5-2637 v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e3-1226 v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5-4650 v4",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i3-7100u",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5310",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i7-5950hq",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon x5660",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5-4607 v2",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i7-5550u",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5-2690 v4",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e3-1281 v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e3-1265l v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "celeron g4900",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon gold 6238t",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e7-4860 v2",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon lv 5148",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5645",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "big-ip fraud protection service",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "15.0.1"
},
{
"model": "xeon e7-8870 v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5220",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "big-ip analytics",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "15.0.0"
},
{
"model": "xeon l5609",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i3-1005g1",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "celeron g3900e",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i7-9850h",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e7-8880 v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "big-ip global traffic manager",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "15.0.0"
},
{
"model": "celeron g1610",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e3-1230 v5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e3-1280 v6",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5-2420 v2",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon platinum 8256",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5-2603 v2",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "big-ip analytics",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "12.1.5"
},
{
"model": "xeon 7020",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon 5130",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon x5672",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "big-ip fraud protection service",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "13.1.3"
},
{
"model": "xeon w-3265",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "celeron g1630",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5-2650 v4",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e3-1575m v5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon gold 6252n",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon silver 4208",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "big-ip access policy manager",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "14.1.0"
},
{
"model": "core i5-5287u",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon x3440",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i7-7700",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon x5690",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "pentium gold g5600",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5-2630 v4",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5-2630l v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e7-2880 v2",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon gold 5215m",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e-2124",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "big-ip domain name system",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "12.1.0"
},
{
"model": "core i5-8259u",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e7-8880 v4",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon x7542",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "big-ip local traffic manager",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "12.1.5"
},
{
"model": "core i3-7300",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon lc5528",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e3-1270 v5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i7-8086k",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5-1660 v4",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "celeron g1820te",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5-2695 v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon l5215",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5-2603 v4",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "big-ip fraud protection service",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "14.1.0"
},
{
"model": "xeon e5-4627 v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon gold 5220s",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "openshift container platform",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "4.2"
},
{
"model": "core i7-8550u",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5504",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i7-6970hq",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e7-4820 v2",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon d-2177nt",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon x7550",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon w-3275m",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "celeron g3930t",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5-1630 v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e3-1585l v5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "big-ip link controller",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "12.1.5"
},
{
"model": "xeon gold 6238",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon l5320",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon lv 5138",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5-2643 v2",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core m-5y31",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon 7130m",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i7-7920hq",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "big-iq centralized management",
"scope": "eq",
"trust": 1.0,
"vendor": "f5",
"version": "7.0.0"
},
{
"model": "xeon e5-2660 v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e-2286g",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i7-1065g7",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "celeron g4932e",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon x5260",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5-2697a v4",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "pentium gold g5620",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon w5590",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e3-1245 v6",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i3-7100",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5530",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i5-8269u",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i5-6300hq",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon w3670",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5-2609 v4",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "enterprise linux server eus",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "8.1"
},
{
"model": "xeon e5472",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "big-ip domain name system",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "14.1.2"
},
{
"model": "big-ip analytics",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "13.1.0"
},
{
"model": "xeon ec5509",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e3-1265l v4",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "celeron g1840",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "big-ip global traffic manager",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "13.1.0"
},
{
"model": "xeon e5507",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i3-8130u",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon d-2146nt",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "big-iq centralized management",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "5.2.0"
},
{
"model": "xeon e7430",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "celeron g4930e",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e3-1565l v5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon 7140n",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "big-ip advanced firewall manager",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "12.1.5"
},
{
"model": "xeon gold 5218",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon d-1541",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5-2680 v2",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5240",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5205",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i5-7360u",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i7-7820x",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon platinum 8280m",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon x3480",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "big-ip analytics",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "11.6.5"
},
{
"model": "xeon 5120",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "big-ip application acceleration manager",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "15.0.0"
},
{
"model": "xeon platinum 8280l",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon l5520",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5-4667 v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e-2104g",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "enterprise linux server tus",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "7.6"
},
{
"model": "xeon e7-8890 v2",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core m-5y51",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i5-6267u",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5-2687w v4",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i5-5250u",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i5-8500b",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon 7110n",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon x5270",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "celeron g3920",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e7-8890 v4",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "big-ip application security manager",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "12.1.0"
},
{
"model": "xeon l5630",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "big-ip advanced firewall manager",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "15.0.0"
},
{
"model": "core i5-7400t",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon x3220",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i5-7600",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "celeron g1610t",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i7-7660u",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e3-1220l v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon d-1649n",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i7-5750hq",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon d-2163it",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i7-9700k",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon 5060",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i7-8706g",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e7-4830 v4",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon w-3275",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "big-ip policy enforcement manager",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "15.0.0"
},
{
"model": "core i5-8200y",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5-2650 v2",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "big-ip analytics",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "14.1.0"
},
{
"model": "xeon e5-1620 v4",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon x7350",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon d-2173it",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon x5675",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5320",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon 3040",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "big-ip domain name system",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "15.0.1"
},
{
"model": "core i3-10110y",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "big-ip global traffic manager",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "14.1.0"
},
{
"model": "xeon ec3539",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon x5560",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i3-7167u",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e7-4820 v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon d-2142it",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon w-3245",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon 5150",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon gold 6226",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i3-5010u",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i3-9100t",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5-4627 v4",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5-4610 v2",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "big-ip global traffic manager",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "11.6.5"
},
{
"model": "big-ip access policy manager",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "14.1.2"
},
{
"model": "xeon e7-8870 v2",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5-2609 v2",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "big-ip domain name system",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "13.1.3"
},
{
"model": "xeon w5580",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon platinum 9222",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon d-1623n",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e3-1260l v5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon l5335",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon w3680",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "celeron g1820t",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "big-ip access policy manager",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "12.1.0"
},
{
"model": "xeon e7-2870 v2",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i5-7500t",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon 5030",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon d-2183it",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "big-ip advanced firewall manager",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "11.6.5"
},
{
"model": "xeon x3230",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "big-ip domain name system",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "11.5.2"
},
{
"model": "xeon l5638",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5-2648l v4",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e7-2850 v2",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon x3470",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "big-ip application acceleration manager",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "13.1.0"
},
{
"model": "xeon e5-2697 v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon x5680",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon platinum 8276l",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5-4628l v4",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5520",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e7-4809 v2",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e7-8893 v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon d-1602",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon x5470",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e3-1270 v6",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon d-2187nt",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "big-ip fraud protection service",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "12.1.0"
},
{
"model": "xeon e3-1285l v4",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i7-7567u",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e7-8867 v4",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e-2224",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon platinum 8260",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5-2450 v2",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon d-2166nt",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "big-ip advanced firewall manager",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "13.1.0"
},
{
"model": "xeon e-2288g",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i5-8400t",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon gold 5215",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon w-2125",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5607",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "pentium gold 4417u",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e3-1240l v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "celeron g4930",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5-2650l v2",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon d-2145nt",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i7-8500y",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e7-8850 v2",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "pentium gold g5420t",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "big-ip policy enforcement manager",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "13.1.0"
},
{
"model": "core i9-7920x",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i5-10310y",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon d-1557",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i5-7267u",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "fedora",
"scope": "eq",
"trust": 1.0,
"vendor": "fedoraproject",
"version": "30"
},
{
"model": "core i7-8809g",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i5-8400b",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i7\\+8700",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "celeron g3930te",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e7-4809 v4",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon x5450",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e7-8867 v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon gold 5217",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i5-9600",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i7-10710u",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "celeron g1620t",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon gold 6242",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5-2683 v4",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5420",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon d-1527",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "big-ip access policy manager",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "15.0.1"
},
{
"model": "enterprise linux server aus",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "7.7"
},
{
"model": "big-ip link controller",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "15.0.0"
},
{
"model": "xeon e5-1680 v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "pentium gold 4425y",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon x3320",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i3-7300t",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5-2680 v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon platinum 9221",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "big-ip application acceleration manager",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "14.1.0"
},
{
"model": "core i5-6287u",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon w3565",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5-2640 v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "big-ip access policy manager",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "13.1.3"
},
{
"model": "xeon e5-2690 v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i3-8100",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5603",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon x5687",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e7-4870 v2",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5-1650 v2",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "big-ip policy enforcement manager",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "11.6.5"
},
{
"model": "xeon platinum 8276",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon x5667",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i7-5500u",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e3-1240l v5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5-4640 v2",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e3-1245 v5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon platinum 9242",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e-2226g",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "big-ip advanced firewall manager",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "14.1.0"
},
{
"model": "big-ip application security manager",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "11.5.2"
},
{
"model": "xeon e5-2680 v4",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5-2660 v2",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon 7130n",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5-2699a v4",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e7330",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon l3406",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e3-1220 v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon w3580",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon w3550",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon w-2155",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i5-8700b",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon gold 6240m",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5-2620 v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5-4669 v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon lc3518",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "enterprise manager",
"scope": "eq",
"trust": 1.0,
"vendor": "f5",
"version": "3.1.1"
},
{
"model": "fedora",
"scope": "eq",
"trust": 1.0,
"vendor": "fedoraproject",
"version": "31"
},
{
"model": "core i7-6567u",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon x3360",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5-2603 v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon 7030",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i7-8709g",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon gold 5215l",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "big-ip policy enforcement manager",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "14.1.0"
},
{
"model": "xeon e7-4830 v2",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon gold 6234",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e7210",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "big-ip analytics",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "14.1.2"
},
{
"model": "xeon e5-2623 v4",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5-4603 v2",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon gold 6230t",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon l5430",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i3-6167u",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon d-1633n",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "big-ip analytics",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "12.1.0"
},
{
"model": "xeon d-1513n",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon w-2295",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i5-8400",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5410",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i7-7700k",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i5-7600k",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i3-6100h",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "linux",
"scope": "eq",
"trust": 1.0,
"vendor": "debian",
"version": "9.0"
},
{
"model": "xeon l5530",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5-2667 v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e-2136",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon 5070",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "big-ip global traffic manager",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "12.1.0"
},
{
"model": "xeon 5110",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5540",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5-2695 v2",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i7-9700t",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon x3380",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e7-8880l v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon silver 4214",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i5-10210y",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon platinum 8260y",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon d-1577",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i7-7560u",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon w-3223",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon d-1537",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "ubuntu linux",
"scope": "eq",
"trust": 1.0,
"vendor": "canonical",
"version": "14.04"
},
{
"model": "core i9-9900x x-series",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e7-8891 v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5-4655 v4",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "big-ip link controller",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "13.1.0"
},
{
"model": "big-ip local traffic manager",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "15.0.0"
},
{
"model": "pentium gold g5400",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "big-ip access policy manager",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "11.5.2"
},
{
"model": "core i7-6560u",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon w-2225",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e7-8855 v4",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e-2124g",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i5\\+8500",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon w3570",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i3-9100",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5-2640 v2",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i7-6500u",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e7-4850 v2",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e3-1275 v6",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i5-9600t",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "celeron g1820",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon d-1559",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e7-8895 v2",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i3-8300",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "pentium gold g5420",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5-2650l v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "big-ip fraud protection service",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "11.5.2"
},
{
"model": "xeon e5630",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon w3540",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i3-5157u",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "big-iq centralized management",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "6.0.0"
},
{
"model": "xeon bronze 3204",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon platinum 9282",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5-1680 v4",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i9-10940x x-series",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "big-ip application acceleration manager",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "14.1.2"
},
{
"model": "core i3-7100h",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e3-1230l v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5620",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5-2403 v2",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon platinum 8253",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon l7445",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon 7041",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "big-ip global traffic manager",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "14.1.2"
},
{
"model": "core i3-8300t",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5-2698 v4",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5-4650 v2",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e3-1505m v6",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon x3370",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e7-8891 v2",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon d-1567",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon x3450",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "enterprise linux server",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "7.0"
},
{
"model": "big-ip analytics",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "15.0.1"
},
{
"model": "pentium gold 5405u",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5-1630 v4",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i9-7980xe",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon silver 4210",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i5-6350hq",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e3-1276 v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5-2630 v2",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "big-ip advanced firewall manager",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "14.1.2"
},
{
"model": "big-ip local traffic manager",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "11.6.5"
},
{
"model": "xeon gold 6244",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e3-1246 v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5-1620 v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5-2440 v2",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "celeron g4900t",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "big-ip application security manager",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "15.0.0"
},
{
"model": "xeon e-2246g",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon lv 5133",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5-2637 v4",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5-2640 v4",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i9-7900x",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e3-1275 v5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i7-5775c",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5503",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5440",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "big-ip analytics",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "13.1.3"
},
{
"model": "xeon e7-8860 v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i7-6870hq",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5506",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e-2234",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5405",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i5-6260u",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "big-ip link controller",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "14.1.0"
},
{
"model": "big-ip application security manager",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "12.1.5"
},
{
"model": "xeon e3-1535m v6",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon x5570",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "openshift container platform",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "4.1"
},
{
"model": "pentium gold g5600t",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e7-4890 v2",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5-1650 v4",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i5-9500t",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon x5670",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "big-ip link controller",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "11.6.5"
},
{
"model": "big-ip local traffic manager",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "13.1.0"
},
{
"model": "enterprise linux server eus",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "7.7"
},
{
"model": "celeron g1620",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "big-ip application acceleration manager",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "12.1.0"
},
{
"model": "xeon e5-1660 v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i5-5200u",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i3-7350k",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5-4610a v4",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5-2670 v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon platinum 8268",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon d-1653n",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e7310",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "pentium gold 4410y",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon x5647",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon lv 5113",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e-2126g",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5-2643 v4",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5-1620 v2",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon gold 6238l",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5-2683 v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i3-8145u",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5-2643 v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e3-1585 v5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "big-ip advanced firewall manager",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "12.1.0"
},
{
"model": "xeon e5-2630l v2",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon gold 5218n",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "big-ip application acceleration manager",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "15.0.1"
},
{
"model": "core i5-7300hq",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i5-1035g1",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e7-8893 v4",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i7-6700hq",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "big-ip global traffic manager",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "15.0.1"
},
{
"model": "xeon gold 5222",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5-2687w v2",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon gold 6240l",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "pentium gold 6405u",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon d-2141i",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon w-2135",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon gold 5218b",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "big-ip application acceleration manager",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "13.1.3"
},
{
"model": "core i3-7100t",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon gold 6246",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core m3-6y54",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5-4620 v4",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon platinum 8260m",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5-2628l v4",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon w-2133",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "big-ip advanced firewall manager",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "15.0.1"
},
{
"model": "celeron g1840t",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "big-ip global traffic manager",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "13.1.3"
},
{
"model": "big-ip policy enforcement manager",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "12.1.0"
},
{
"model": "xeon e3-1285 v4",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "enterprise linux server aus",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "7.6"
},
{
"model": "core i9-9980xe",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e3-1225 v5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i5-9400h",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i5-7600t",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e3-1230 v6",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon w-3175x",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "big-ip analytics",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "11.5.2"
},
{
"model": "xeon d-1528",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i3-8109u",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "big-ip policy enforcement manager",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "14.1.2"
},
{
"model": "xeon x7560",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e3-1545m v5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "big-ip global traffic manager",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "11.5.2"
},
{
"model": "big-ip application security manager",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "13.1.0"
},
{
"model": "core i3-10110u",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "big-ip advanced firewall manager",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "13.1.3"
},
{
"model": "xeon e5-2637 v2",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e-2224g",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5-1660 v2",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "big-ip fraud protection service",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "12.1.5"
},
{
"model": "xeon silver 4214y",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5-2699 v4",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon x6550",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "big-ip local traffic manager",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "14.1.0"
},
{
"model": "celeron g3900t",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i7-7820hq",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon w3530",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon 7040",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core m3-6y30",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i7-7700hq",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5606",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon gold 6230",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "big-iq centralized management",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "6.1.0"
},
{
"model": "celeron g1850",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core m3-7y30",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "celeron g3950",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "big-ip application security manager",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "11.6.5"
},
{
"model": "core i9-9940x x-series",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon w-2223",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5-4657l v2",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon 7120n",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon gold 5220t",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon d-1540",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon x3430",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i5-6200u",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e7-8891 v4",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon w-2245",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "pentium gold 4415y",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i5-5350h",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core m-5y10c",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i7-7700t",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon 5140",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon d-1531",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon d-1627",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon w-2145",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon x5472",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon w-2255",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i5-9400",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i5-7200u",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "celeron g4930t",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5-4667 v4",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5-2623 v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5-2430 v2",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5-2690 v2",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon d-1543n",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon d-1529",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon d-1548",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i9-10980xe",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i9-10900x x-series",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i5-8305g",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon lc5518",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon x5355",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon x3210",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e3-1515m v5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e3-1240 v5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i5-7500",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e7-8860 v4",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i3-5015u",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5-4640 v4",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5-4610 v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5335",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon gold 6238m",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon l7545",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "big-ip policy enforcement manager",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "15.0.1"
},
{
"model": "xeon e5-4650 v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e3-1280 v5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i5-9600k",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e3-1275 v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon w-2123",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5502",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5462",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5-2658 v4",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i9-7940x",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i3-9320",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5-2630 v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i5-9400t",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon 7150n",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5345",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "celeron g3900",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon 5080",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e7-8857 v2",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon 5063",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i3-5005u",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e3-1271 v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i7-8650u",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "big-ip policy enforcement manager",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "13.1.3"
},
{
"model": "xeon e5-4620 v2",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e3-1235l v5",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "big-ip link controller",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "12.1.0"
},
{
"model": "xeon l5420",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e5-2650 v3",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon platinum 8280",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon l7455",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i5-8265u",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e7220",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "big-ip domain name system",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "15.0.0"
},
{
"model": "xeon x5492",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e7-2890 v2",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e-2274g",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e6540",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "big-ip fraud protection service",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "11.6.5"
},
{
"model": "big-ip application acceleration manager",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "11.5.2"
},
{
"model": "core i5-7y54",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "core i7-5850hq",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon l5310",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon 5040",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
},
{
"model": "xeon e-2236",
"scope": "eq",
"trust": 1.0,
"vendor": "intel",
"version": null
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2018-12207"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Red Hat",
"sources": [
{
"db": "PACKETSTORM",
"id": "156058"
},
{
"db": "PACKETSTORM",
"id": "155288"
},
{
"db": "PACKETSTORM",
"id": "155405"
},
{
"db": "PACKETSTORM",
"id": "155424"
},
{
"db": "PACKETSTORM",
"id": "155697"
},
{
"db": "PACKETSTORM",
"id": "155283"
},
{
"db": "PACKETSTORM",
"id": "155291"
},
{
"db": "PACKETSTORM",
"id": "155418"
}
],
"trust": 0.8
},
"cve": "CVE-2018-12207",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "COMPLETE",
"baseScore": 4.9,
"confidentialityImpact": "NONE",
"exploitabilityScore": 3.9,
"id": "CVE-2018-12207",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 1.0,
"vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "COMPLETE",
"baseScore": 4.9,
"confidentialityImpact": "NONE",
"exploitabilityScore": 3.9,
"id": "VHN-122143",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:L/AC:L/AU:N/C:N/I:N/A:C",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"exploitabilityScore": 2.0,
"id": "CVE-2018-12207",
"impactScore": 4.0,
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2018-12207",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "VULHUB",
"id": "VHN-122143",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-122143"
},
{
"db": "NVD",
"id": "CVE-2018-12207"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Improper invalidation for page table updates by a virtual guest operating system for multiple Intel(R) Processors may allow an authenticated user to potentially enable denial of service of the host system via local access. Both Microsoft Windows and Microsoft Windows Server are products of Microsoft Corporation. Microsoft Windows is an operating system for personal devices. Microsoft Windows Server is a server operating system. A denial of service vulnerability exists in Microsoft Windows and Windows Server due to the program\u0027s improper handling of objects in memory. An attacker could exploit this vulnerability by logging on to an affected system and running a specially crafted application to cause the targeted system to become unresponsive. The following products and versions are affected: Microsoft Windows 10, Windows 10 Version 1607, Windows 10 Version 1709, Windows 10 Version 1803, Windows 10 Version 1809, Windows 10 Version 1903, Windows 7 SP1, Windows 8.1, Windows RT 8.1, Windows Server 2008 R2 SP1, Windows Server 2012, Windows Server 2012 R2, Windows Server 2016, Windows Server 2019, Windows Server version 1803, Windows Server version 1903. \n\nBug Fix(es):\n\n* Backport TCP follow-up for small buffers (BZ#1739184)\n\n* TCP performance regression after CVE-2019-11478 bug fix (BZ#1743170)\n\n* RHEL8.0 - bnx2x link down, caused by transmit timeouts during load test\n(Marvell/Cavium/QLogic) (L3:) (BZ#1743548)\n\n* block: blk-mq improvement (BZ#1780567)\n\n* RHEL8.0 - Regression to RHEL7.6 by changing force_latency found during\nRHEL8.0 validation for SAP HANA on POWER (BZ#1781111)\n\n* blk-mq: overwirte performance drops on real MQ device (BZ#1782183)\n\n* RHEL8: creating vport takes lot of memory i.e 2GB per vport which leads\nto drain out system memory quickly. (BZ#1782705)\n\n4. ==========================================================================\nUbuntu Security Notice USN-4184-2\nNovember 13, 2019\n\nlinux, linux-hwe, linux-oem-osp1 vulnerability and regression\n==========================================================================\n\nA security issue affects these releases of Ubuntu and its derivatives:\n\n- Ubuntu 19.04\n- Ubuntu 18.04 LTS\n\nSummary:\n\nSeveral issues were fixed in the Linux kernel. \n\nSoftware Description:\n- linux: Linux kernel\n- linux-hwe: Linux hardware enablement (HWE) kernel\n- linux-oem-osp1: Linux kernel for OEM processors\n\nDetails:\n\nUSN-4184-1 fixed vulnerabilities in the Linux kernel. It was discovered\nthat the kernel fix for CVE-2019-0155 (i915 missing Blitter Command\nStreamer check) was incomplete on 64-bit Intel x86 systems. Also, the\nupdate introduced a regression that broke KVM guests where extended\npage tables (EPT) are disabled or not supported. This update addresses\nboth issues. \n\nWe apologize for the inconvenience. \n\nOriginal advisory details:\n\n Stephan van Schaik, Alyssa Milburn, Sebastian \\xd6sterlund, Pietro Frigo,\n Kaveh Razavi, Herbert Bos, Cristiano Giuffrida, Giorgi Maisuradze, Moritz\n Lipp, Michael Schwarz, Daniel Gruss, and Jo Van Bulck discovered that Intel\n processors using Transactional Synchronization Extensions (TSX) could\n expose memory contents previously stored in microarchitectural buffers to a\n malicious process that is executing on the same CPU core. A local attacker\n could use this to expose sensitive information. (CVE-2019-11135)\n\n It was discovered that the Intel i915 graphics chipsets allowed userspace\n to modify page table entries via writes to MMIO from the Blitter Command\n Streamer and expose kernel memory information. A local attacker could use\n this to expose sensitive information or possibly elevate privileges. A local attacker in a guest VM could use this to\n cause a denial of service (host system crash). (CVE-2018-12207)\n\n It was discovered that the Intel i915 graphics chipsets could cause a\n system hang when userspace performed a read from GT memory mapped input\n output (MMIO) when the product is in certain low power states. A local\n attacker could use this to cause a denial of service. (CVE-2019-0154)\n\n Hui Peng discovered that the Atheros AR6004 USB Wi-Fi device driver for the\n Linux kernel did not properly validate endpoint descriptors returned by the\n device. A physically proximate attacker could use this to cause a denial of\n service (system crash). (CVE-2019-15098)\n\n Jann Horn discovered a reference count underflow in the shiftfs\n implementation in the Linux kernel. A local attacker could use this to\n cause a denial of service (system crash) or possibly execute arbitrary\n code. (CVE-2019-15791)\n\n Jann Horn discovered a type confusion vulnerability in the shiftfs\n implementation in the Linux kernel. A local attacker could use this to\n cause a denial of service (system crash) or possibly execute arbitrary\n code. (CVE-2019-15792)\n\n Jann Horn discovered that the shiftfs implementation in the Linux kernel\n did not use the correct file system uid/gid when the user namespace of a\n lower file system is not in the init user namespace. A local attacker could\n use this to possibly bypass DAC permissions or have some other unspecified\n impact. (CVE-2019-15793)\n\n Ori Nimron discovered that the AX25 network protocol implementation in the\n Linux kernel did not properly perform permissions checks. A local attacker\n could use this to create a raw socket. (CVE-2019-17052)\n\n Ori Nimron discovered that the IEEE 802.15.4 Low-Rate Wireless network\n protocol implementation in the Linux kernel did not properly perform\n permissions checks. A local attacker could use this to create a raw socket. \n (CVE-2019-17053)\n\n Ori Nimron discovered that the Appletalk network protocol implementation in\n the Linux kernel did not properly perform permissions checks. A local\n attacker could use this to create a raw socket. (CVE-2019-17054)\n\n Ori Nimron discovered that the modular ISDN network protocol implementation\n in the Linux kernel did not properly perform permissions checks. A local\n attacker could use this to create a raw socket. (CVE-2019-17055)\n\n Ori Nimron discovered that the Near field Communication (NFC) network\n protocol implementation in the Linux kernel did not properly perform\n permissions checks. A local attacker could use this to create a raw socket. \n (CVE-2019-17056)\n\n Nico Waisman discovered that a buffer overflow existed in the Realtek Wi-Fi\n driver for the Linux kernel when handling Notice of Absence frames. A\n physically proximate attacker could use this to cause a denial of service\n (system crash) or possibly execute arbitrary code. (CVE-2019-17666)\n\nUpdate instructions:\n\nThe problem can be corrected by updating your system to the following\npackage versions:\n\nUbuntu 19.04:\n linux-image-5.0.0-36-generic 5.0.0-36.39\n linux-image-5.0.0-36-generic-lpae 5.0.0-36.39\n linux-image-5.0.0-36-lowlatency 5.0.0-36.39\n linux-image-generic 5.0.0.36.38\n linux-image-generic-lpae 5.0.0.36.38\n linux-image-lowlatency 5.0.0.36.38\n linux-image-virtual 5.0.0.36.38\n\nUbuntu 18.04 LTS:\n linux-image-5.0.0-1028-oem-osp1 5.0.0-1028.32\n linux-image-5.0.0-36-generic 5.0.0-36.39~18.04.1\n linux-image-5.0.0-36-generic-lpae 5.0.0-36.39~18.04.1\n linux-image-5.0.0-36-lowlatency 5.0.0-36.39~18.04.1\n linux-image-generic-hwe-18.04 5.0.0.36.94\n linux-image-generic-lpae-hwe-18.04 5.0.0.36.94\n linux-image-lowlatency-hwe-18.04 5.0.0.36.94\n linux-image-oem-osp1 5.0.0.1028.32\n linux-image-virtual-hwe-18.04 5.0.0.36.94\n\nPlease note that mitigating the TSX (CVE-2019-11135) and i915\n(CVE-2019-0154) issues requires corresponding microcode and graphics\nfirmware updates respectively. \n\nAfter a standard system update you need to reboot your computer to make\nall the necessary changes. \n\nATTENTION: Due to an unavoidable ABI change the kernel updates have\nbeen given a new version number, which requires you to recompile and\nreinstall all third party kernel modules you might have installed. \nUnless you manually uninstalled the standard kernel metapackages\n(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,\nlinux-powerpc), a standard system upgrade will automatically perform\nthis as well. \n\nReferences:\n https://usn.ubuntu.com/4184-2\n https://usn.ubuntu.com/4184-1\n CVE-2019-0155,\n https://bugs.launchpad.net/bugs/1851709,\n https://bugs.launchpad.net/bugs/1852141\n\nPackage Information:\n https://launchpad.net/ubuntu/+source/linux/5.0.0-36.39\n https://launchpad.net/ubuntu/+source/linux-hwe/5.0.0-36.39~18.04.1\n https://launchpad.net/ubuntu/+source/linux-oem-osp1/5.0.0-1028.32\n. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA256\n\n=====================================================================\n Red Hat Security Advisory\n\nSynopsis: Important: kernel security and bug fix update\nAdvisory ID: RHSA-2019:3836-01\nProduct: Red Hat Enterprise Linux\nAdvisory URL: https://access.redhat.com/errata/RHSA-2019:3836\nIssue date: 2019-11-12\nCVE Names: CVE-2018-12207 CVE-2019-0154 CVE-2019-3900 \n CVE-2019-11135 \n=====================================================================\n\n1. Summary:\n\nAn update for kernel is now available for Red Hat Enterprise Linux 6. \n\nRed Hat Product Security has rated this update as having a security impact\nof Important. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE link(s) in the References section. \n\n2. Relevant releases/architectures:\n\nRed Hat Enterprise Linux Desktop (v. 6) - i386, noarch, x86_64\nRed Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64\nRed Hat Enterprise Linux HPC Node (v. 6) - noarch, x86_64\nRed Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64\nRed Hat Enterprise Linux Server (v. 6) - i386, noarch, ppc64, s390x, x86_64\nRed Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64\nRed Hat Enterprise Linux Workstation (v. 6) - i386, noarch, x86_64\nRed Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64\n\n3. \n\nSecurity Fix(es):\n\n* hw: Machine Check Error on Page Size Change (IFU) (CVE-2018-12207)\n\n* hw: TSX Transaction Asynchronous Abort (TAA) (CVE-2019-11135)\n\n* Kernel: vhost_net: infinite loop while receiving packets leads to DoS\n(CVE-2019-3900)\n\n* hw: Intel GPU Denial Of Service while accessing MMIO in lower power state\n(CVE-2019-0154)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE\npage(s) listed in the References section. \n\nBug Fix(es):\n\n* [Intel 6.10 Bug] With mWait/C-states disabled, HT on, ibrs enabled,\nperformance impact observed on user space benchmark (BZ#1560787)\n\n* kernel-2.6.32-573.60.2.el6 hangs/resets during boot in\nefi_enter_virtual_mode() on Xeon v2 E7-2870 (BZ#1645724)\n\n* Slab leak: skbuff_head_cache slab object still allocated after mcast\nprocesses are stopped and \"fragments dropped after timeout\" errors are\nshown (BZ#1752536)\n\n4. \n\n5. Bugs fixed (https://bugzilla.redhat.com/):\n\n1646768 - CVE-2018-12207 hw: Machine Check Error on Page Size Change (IPU)\n1698757 - CVE-2019-3900 Kernel: vhost_net: infinite loop while receiving packets leads to DoS\n1724393 - CVE-2019-0154 hw: Intel GPU Denial Of Service while accessing MMIO in lower power state\n1753062 - CVE-2019-11135 hw: TSX Transaction Asynchronous Abort (TAA)\n\n6. Package List:\n\nRed Hat Enterprise Linux Desktop (v. 6):\n\nSource:\nkernel-2.6.32-754.24.2.el6.src.rpm\n\ni386:\nkernel-2.6.32-754.24.2.el6.i686.rpm\nkernel-debug-2.6.32-754.24.2.el6.i686.rpm\nkernel-debug-debuginfo-2.6.32-754.24.2.el6.i686.rpm\nkernel-debug-devel-2.6.32-754.24.2.el6.i686.rpm\nkernel-debuginfo-2.6.32-754.24.2.el6.i686.rpm\nkernel-debuginfo-common-i686-2.6.32-754.24.2.el6.i686.rpm\nkernel-devel-2.6.32-754.24.2.el6.i686.rpm\nkernel-headers-2.6.32-754.24.2.el6.i686.rpm\nperf-2.6.32-754.24.2.el6.i686.rpm\nperf-debuginfo-2.6.32-754.24.2.el6.i686.rpm\npython-perf-debuginfo-2.6.32-754.24.2.el6.i686.rpm\n\nnoarch:\nkernel-abi-whitelists-2.6.32-754.24.2.el6.noarch.rpm\nkernel-doc-2.6.32-754.24.2.el6.noarch.rpm\nkernel-firmware-2.6.32-754.24.2.el6.noarch.rpm\n\nx86_64:\nkernel-2.6.32-754.24.2.el6.x86_64.rpm\nkernel-debug-2.6.32-754.24.2.el6.x86_64.rpm\nkernel-debug-debuginfo-2.6.32-754.24.2.el6.i686.rpm\nkernel-debug-debuginfo-2.6.32-754.24.2.el6.x86_64.rpm\nkernel-debug-devel-2.6.32-754.24.2.el6.i686.rpm\nkernel-debug-devel-2.6.32-754.24.2.el6.x86_64.rpm\nkernel-debuginfo-2.6.32-754.24.2.el6.i686.rpm\nkernel-debuginfo-2.6.32-754.24.2.el6.x86_64.rpm\nkernel-debuginfo-common-i686-2.6.32-754.24.2.el6.i686.rpm\nkernel-debuginfo-common-x86_64-2.6.32-754.24.2.el6.x86_64.rpm\nkernel-devel-2.6.32-754.24.2.el6.x86_64.rpm\nkernel-headers-2.6.32-754.24.2.el6.x86_64.rpm\nperf-2.6.32-754.24.2.el6.x86_64.rpm\nperf-debuginfo-2.6.32-754.24.2.el6.i686.rpm\nperf-debuginfo-2.6.32-754.24.2.el6.x86_64.rpm\npython-perf-debuginfo-2.6.32-754.24.2.el6.i686.rpm\npython-perf-debuginfo-2.6.32-754.24.2.el6.x86_64.rpm\n\nRed Hat Enterprise Linux Desktop Optional (v. 6):\n\ni386:\nkernel-debug-debuginfo-2.6.32-754.24.2.el6.i686.rpm\nkernel-debuginfo-2.6.32-754.24.2.el6.i686.rpm\nkernel-debuginfo-common-i686-2.6.32-754.24.2.el6.i686.rpm\nperf-debuginfo-2.6.32-754.24.2.el6.i686.rpm\npython-perf-2.6.32-754.24.2.el6.i686.rpm\npython-perf-debuginfo-2.6.32-754.24.2.el6.i686.rpm\n\nx86_64:\nkernel-debug-debuginfo-2.6.32-754.24.2.el6.x86_64.rpm\nkernel-debuginfo-2.6.32-754.24.2.el6.x86_64.rpm\nkernel-debuginfo-common-x86_64-2.6.32-754.24.2.el6.x86_64.rpm\nperf-debuginfo-2.6.32-754.24.2.el6.x86_64.rpm\npython-perf-2.6.32-754.24.2.el6.x86_64.rpm\npython-perf-debuginfo-2.6.32-754.24.2.el6.x86_64.rpm\n\nRed Hat Enterprise Linux HPC Node (v. 6):\n\nSource:\nkernel-2.6.32-754.24.2.el6.src.rpm\n\nnoarch:\nkernel-abi-whitelists-2.6.32-754.24.2.el6.noarch.rpm\nkernel-doc-2.6.32-754.24.2.el6.noarch.rpm\nkernel-firmware-2.6.32-754.24.2.el6.noarch.rpm\n\nx86_64:\nkernel-2.6.32-754.24.2.el6.x86_64.rpm\nkernel-debug-2.6.32-754.24.2.el6.x86_64.rpm\nkernel-debug-debuginfo-2.6.32-754.24.2.el6.i686.rpm\nkernel-debug-debuginfo-2.6.32-754.24.2.el6.x86_64.rpm\nkernel-debug-devel-2.6.32-754.24.2.el6.i686.rpm\nkernel-debug-devel-2.6.32-754.24.2.el6.x86_64.rpm\nkernel-debuginfo-2.6.32-754.24.2.el6.i686.rpm\nkernel-debuginfo-2.6.32-754.24.2.el6.x86_64.rpm\nkernel-debuginfo-common-i686-2.6.32-754.24.2.el6.i686.rpm\nkernel-debuginfo-common-x86_64-2.6.32-754.24.2.el6.x86_64.rpm\nkernel-devel-2.6.32-754.24.2.el6.x86_64.rpm\nkernel-headers-2.6.32-754.24.2.el6.x86_64.rpm\nperf-2.6.32-754.24.2.el6.x86_64.rpm\nperf-debuginfo-2.6.32-754.24.2.el6.i686.rpm\nperf-debuginfo-2.6.32-754.24.2.el6.x86_64.rpm\npython-perf-debuginfo-2.6.32-754.24.2.el6.i686.rpm\npython-perf-debuginfo-2.6.32-754.24.2.el6.x86_64.rpm\n\nRed Hat Enterprise Linux HPC Node Optional (v. 6):\n\nx86_64:\nkernel-debug-debuginfo-2.6.32-754.24.2.el6.x86_64.rpm\nkernel-debuginfo-2.6.32-754.24.2.el6.x86_64.rpm\nkernel-debuginfo-common-x86_64-2.6.32-754.24.2.el6.x86_64.rpm\nperf-debuginfo-2.6.32-754.24.2.el6.x86_64.rpm\npython-perf-2.6.32-754.24.2.el6.x86_64.rpm\npython-perf-debuginfo-2.6.32-754.24.2.el6.x86_64.rpm\n\nRed Hat Enterprise Linux Server (v. 6):\n\nSource:\nkernel-2.6.32-754.24.2.el6.src.rpm\n\ni386:\nkernel-2.6.32-754.24.2.el6.i686.rpm\nkernel-debug-2.6.32-754.24.2.el6.i686.rpm\nkernel-debug-debuginfo-2.6.32-754.24.2.el6.i686.rpm\nkernel-debug-devel-2.6.32-754.24.2.el6.i686.rpm\nkernel-debuginfo-2.6.32-754.24.2.el6.i686.rpm\nkernel-debuginfo-common-i686-2.6.32-754.24.2.el6.i686.rpm\nkernel-devel-2.6.32-754.24.2.el6.i686.rpm\nkernel-headers-2.6.32-754.24.2.el6.i686.rpm\nperf-2.6.32-754.24.2.el6.i686.rpm\nperf-debuginfo-2.6.32-754.24.2.el6.i686.rpm\npython-perf-debuginfo-2.6.32-754.24.2.el6.i686.rpm\n\nnoarch:\nkernel-abi-whitelists-2.6.32-754.24.2.el6.noarch.rpm\nkernel-doc-2.6.32-754.24.2.el6.noarch.rpm\nkernel-firmware-2.6.32-754.24.2.el6.noarch.rpm\n\nppc64:\nkernel-2.6.32-754.24.2.el6.ppc64.rpm\nkernel-bootwrapper-2.6.32-754.24.2.el6.ppc64.rpm\nkernel-debug-2.6.32-754.24.2.el6.ppc64.rpm\nkernel-debug-debuginfo-2.6.32-754.24.2.el6.ppc64.rpm\nkernel-debug-devel-2.6.32-754.24.2.el6.ppc64.rpm\nkernel-debuginfo-2.6.32-754.24.2.el6.ppc64.rpm\nkernel-debuginfo-common-ppc64-2.6.32-754.24.2.el6.ppc64.rpm\nkernel-devel-2.6.32-754.24.2.el6.ppc64.rpm\nkernel-headers-2.6.32-754.24.2.el6.ppc64.rpm\nperf-2.6.32-754.24.2.el6.ppc64.rpm\nperf-debuginfo-2.6.32-754.24.2.el6.ppc64.rpm\npython-perf-debuginfo-2.6.32-754.24.2.el6.ppc64.rpm\n\ns390x:\nkernel-2.6.32-754.24.2.el6.s390x.rpm\nkernel-debug-2.6.32-754.24.2.el6.s390x.rpm\nkernel-debug-debuginfo-2.6.32-754.24.2.el6.s390x.rpm\nkernel-debug-devel-2.6.32-754.24.2.el6.s390x.rpm\nkernel-debuginfo-2.6.32-754.24.2.el6.s390x.rpm\nkernel-debuginfo-common-s390x-2.6.32-754.24.2.el6.s390x.rpm\nkernel-devel-2.6.32-754.24.2.el6.s390x.rpm\nkernel-headers-2.6.32-754.24.2.el6.s390x.rpm\nkernel-kdump-2.6.32-754.24.2.el6.s390x.rpm\nkernel-kdump-debuginfo-2.6.32-754.24.2.el6.s390x.rpm\nkernel-kdump-devel-2.6.32-754.24.2.el6.s390x.rpm\nperf-2.6.32-754.24.2.el6.s390x.rpm\nperf-debuginfo-2.6.32-754.24.2.el6.s390x.rpm\npython-perf-debuginfo-2.6.32-754.24.2.el6.s390x.rpm\n\nx86_64:\nkernel-2.6.32-754.24.2.el6.x86_64.rpm\nkernel-debug-2.6.32-754.24.2.el6.x86_64.rpm\nkernel-debug-debuginfo-2.6.32-754.24.2.el6.i686.rpm\nkernel-debug-debuginfo-2.6.32-754.24.2.el6.x86_64.rpm\nkernel-debug-devel-2.6.32-754.24.2.el6.i686.rpm\nkernel-debug-devel-2.6.32-754.24.2.el6.x86_64.rpm\nkernel-debuginfo-2.6.32-754.24.2.el6.i686.rpm\nkernel-debuginfo-2.6.32-754.24.2.el6.x86_64.rpm\nkernel-debuginfo-common-i686-2.6.32-754.24.2.el6.i686.rpm\nkernel-debuginfo-common-x86_64-2.6.32-754.24.2.el6.x86_64.rpm\nkernel-devel-2.6.32-754.24.2.el6.x86_64.rpm\nkernel-headers-2.6.32-754.24.2.el6.x86_64.rpm\nperf-2.6.32-754.24.2.el6.x86_64.rpm\nperf-debuginfo-2.6.32-754.24.2.el6.i686.rpm\nperf-debuginfo-2.6.32-754.24.2.el6.x86_64.rpm\npython-perf-debuginfo-2.6.32-754.24.2.el6.i686.rpm\npython-perf-debuginfo-2.6.32-754.24.2.el6.x86_64.rpm\n\nRed Hat Enterprise Linux Server Optional (v. 6):\n\ni386:\nkernel-debug-debuginfo-2.6.32-754.24.2.el6.i686.rpm\nkernel-debuginfo-2.6.32-754.24.2.el6.i686.rpm\nkernel-debuginfo-common-i686-2.6.32-754.24.2.el6.i686.rpm\nperf-debuginfo-2.6.32-754.24.2.el6.i686.rpm\npython-perf-2.6.32-754.24.2.el6.i686.rpm\npython-perf-debuginfo-2.6.32-754.24.2.el6.i686.rpm\n\nppc64:\nkernel-debug-debuginfo-2.6.32-754.24.2.el6.ppc64.rpm\nkernel-debuginfo-2.6.32-754.24.2.el6.ppc64.rpm\nkernel-debuginfo-common-ppc64-2.6.32-754.24.2.el6.ppc64.rpm\nperf-debuginfo-2.6.32-754.24.2.el6.ppc64.rpm\npython-perf-2.6.32-754.24.2.el6.ppc64.rpm\npython-perf-debuginfo-2.6.32-754.24.2.el6.ppc64.rpm\n\ns390x:\nkernel-debug-debuginfo-2.6.32-754.24.2.el6.s390x.rpm\nkernel-debuginfo-2.6.32-754.24.2.el6.s390x.rpm\nkernel-debuginfo-common-s390x-2.6.32-754.24.2.el6.s390x.rpm\nkernel-kdump-debuginfo-2.6.32-754.24.2.el6.s390x.rpm\nperf-debuginfo-2.6.32-754.24.2.el6.s390x.rpm\npython-perf-2.6.32-754.24.2.el6.s390x.rpm\npython-perf-debuginfo-2.6.32-754.24.2.el6.s390x.rpm\n\nx86_64:\nkernel-debug-debuginfo-2.6.32-754.24.2.el6.x86_64.rpm\nkernel-debuginfo-2.6.32-754.24.2.el6.x86_64.rpm\nkernel-debuginfo-common-x86_64-2.6.32-754.24.2.el6.x86_64.rpm\nperf-debuginfo-2.6.32-754.24.2.el6.x86_64.rpm\npython-perf-2.6.32-754.24.2.el6.x86_64.rpm\npython-perf-debuginfo-2.6.32-754.24.2.el6.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation (v. 6):\n\nSource:\nkernel-2.6.32-754.24.2.el6.src.rpm\n\ni386:\nkernel-2.6.32-754.24.2.el6.i686.rpm\nkernel-debug-2.6.32-754.24.2.el6.i686.rpm\nkernel-debug-debuginfo-2.6.32-754.24.2.el6.i686.rpm\nkernel-debug-devel-2.6.32-754.24.2.el6.i686.rpm\nkernel-debuginfo-2.6.32-754.24.2.el6.i686.rpm\nkernel-debuginfo-common-i686-2.6.32-754.24.2.el6.i686.rpm\nkernel-devel-2.6.32-754.24.2.el6.i686.rpm\nkernel-headers-2.6.32-754.24.2.el6.i686.rpm\nperf-2.6.32-754.24.2.el6.i686.rpm\nperf-debuginfo-2.6.32-754.24.2.el6.i686.rpm\npython-perf-debuginfo-2.6.32-754.24.2.el6.i686.rpm\n\nnoarch:\nkernel-abi-whitelists-2.6.32-754.24.2.el6.noarch.rpm\nkernel-doc-2.6.32-754.24.2.el6.noarch.rpm\nkernel-firmware-2.6.32-754.24.2.el6.noarch.rpm\n\nx86_64:\nkernel-2.6.32-754.24.2.el6.x86_64.rpm\nkernel-debug-2.6.32-754.24.2.el6.x86_64.rpm\nkernel-debug-debuginfo-2.6.32-754.24.2.el6.i686.rpm\nkernel-debug-debuginfo-2.6.32-754.24.2.el6.x86_64.rpm\nkernel-debug-devel-2.6.32-754.24.2.el6.i686.rpm\nkernel-debug-devel-2.6.32-754.24.2.el6.x86_64.rpm\nkernel-debuginfo-2.6.32-754.24.2.el6.i686.rpm\nkernel-debuginfo-2.6.32-754.24.2.el6.x86_64.rpm\nkernel-debuginfo-common-i686-2.6.32-754.24.2.el6.i686.rpm\nkernel-debuginfo-common-x86_64-2.6.32-754.24.2.el6.x86_64.rpm\nkernel-devel-2.6.32-754.24.2.el6.x86_64.rpm\nkernel-headers-2.6.32-754.24.2.el6.x86_64.rpm\nperf-2.6.32-754.24.2.el6.x86_64.rpm\nperf-debuginfo-2.6.32-754.24.2.el6.i686.rpm\nperf-debuginfo-2.6.32-754.24.2.el6.x86_64.rpm\npython-perf-debuginfo-2.6.32-754.24.2.el6.i686.rpm\npython-perf-debuginfo-2.6.32-754.24.2.el6.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation Optional (v. 6):\n\ni386:\nkernel-debug-debuginfo-2.6.32-754.24.2.el6.i686.rpm\nkernel-debuginfo-2.6.32-754.24.2.el6.i686.rpm\nkernel-debuginfo-common-i686-2.6.32-754.24.2.el6.i686.rpm\nperf-debuginfo-2.6.32-754.24.2.el6.i686.rpm\npython-perf-2.6.32-754.24.2.el6.i686.rpm\npython-perf-debuginfo-2.6.32-754.24.2.el6.i686.rpm\n\nx86_64:\nkernel-debug-debuginfo-2.6.32-754.24.2.el6.x86_64.rpm\nkernel-debuginfo-2.6.32-754.24.2.el6.x86_64.rpm\nkernel-debuginfo-common-x86_64-2.6.32-754.24.2.el6.x86_64.rpm\nperf-debuginfo-2.6.32-754.24.2.el6.x86_64.rpm\npython-perf-2.6.32-754.24.2.el6.x86_64.rpm\npython-perf-debuginfo-2.6.32-754.24.2.el6.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security. Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/\n\n7. Contact:\n\nThe Red Hat security contact is \u003csecalert@redhat.com\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2019 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n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\nXkMJCJGhDCY=\n=fpzb\n-----END PGP SIGNATURE-----\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://www.redhat.com/mailman/listinfo/rhsa-announce\n. Description:\n\nRed Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private\ncloud deployments. \n\nSecurity Fix(es):\n\n* A flaw was found in the way Intel CPUs handle inconsistency between,\nvirtual to physical memory address translations in CPU\u0027s local cache and\nsystem software\u0027s Paging structure entries. A privileged guest user may use\nthis flaw to induce a hardware Machine Check Error on the host processor,\nresulting in a severe DoS scenario by halting the processor. \n\nSystem software like OS OR Virtual Machine Monitor (VMM) use virtual memory\nsystem for storing program instructions and data in memory. Virtual Memory\nsystem uses Paging structures like Page Tables and Page Directories to\nmanage system memory. The processor\u0027s Memory Management Unit (MMU) uses\nPaging structure entries to translate program\u0027s virtual memory addresses\nto physical memory addresses. The processor stores these address\ntranslations into its local cache buffer called - Translation Lookaside\nBuffer (TLB). TLB has two parts, one for instructions and other for data\naddresses. \n\nSystem software can modify its Paging structure entries to change address\nmappings OR certain attributes like page size etc. Upon such Paging\nstructure alterations in memory, system software must invalidate the\ncorresponding address translations in the processor\u0027s TLB cache. But before\nthis TLB invalidation takes place, a privileged guest user may trigger an\ninstruction fetch operation, which could use an already cached, but now\ninvalid, virtual to physical address translation from Instruction TLB\n(ITLB). Thus accessing an invalid physical memory address and resulting in\nhalting the processor due to the Machine Check Error (MCE) on Page Size\nChange. (CVE-2018-12207)\n\n* A flaw was found in the way sudo implemented running commands with an\narbitrary user ID. If a sudoers entry is written to allow users to run a\ncommand as any user except root, this flaw can be used by an attacker to\nbypass that restriction. (CVE-2019-14287)\n\n* An improper authorization flaw was discovered in systemd-resolved in the\nway it configures the exposed DBus interface org.freedesktop.resolve1. An\nunprivileged local user could call all DBus methods, even when marked as\nprivileged operations. An attacker could abuse this flaw by changing the\nDNS, Search Domain, LLMNR, DNSSEC, and other network link settings without\nany authorization, giving them control of the network names resolution\nprocess and causing the system to communicate with wrong or malicious\nservers. (CVE-2019-15718)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE\npage(s) listed in the References section. Solution:\n\nFor OpenShift Container Platform 4.1 see the following documentation, which\nwill be updated shortly for release 4.1.24, for important instructions on\nhow to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.openshift.com/container-platform/4.1/release_notes/ocp-4-1-rel\nease-notes.html\n\n4. Bugs fixed (https://bugzilla.redhat.com/):\n\n1646768 - CVE-2018-12207 hw: Machine Check Error on Page Size Change (IFU)\n1746057 - CVE-2019-15718 systemd: systemd-resolved allows unprivileged users to configure DNS\n1760531 - CVE-2019-14287 sudo: Privilege escalation via \u0027Runas\u0027 specification with \u0027ALL\u0027 keyword\n\n5. Description:\n\nThis is a kernel live patch module which is automatically loaded by the RPM\npost-install script to modify the code of a running kernel. Solution:\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied. Bugs fixed (https://bugzilla.redhat.com/):\n\n1782199 - CVE-2019-19339 kpatch: hw: incomplete fix for CVE-2018-12207\n\n6. 8) - aarch64, noarch, ppc64le, s390x, x86_64\n\n3. 6.6) - x86_64\n\n3. Due to the high complexity of the fixes and the required microcode \nupdate, we are unable to livepatch this set of CVEs. Please plan to reboot \ninto an updated kernel as soon as possible. \n\nThe details of these CVEs follows:\n\nCVE-2018-12207\n\n On an Ubuntu KVM host configured to use huge pages, a malicious KVM guest\n can cause a host machine check exception (MCE) capable of bringing down\n the host OS. \n\nCVE-2019-11135\n\n On Intel processors with support for Transactional Synchronization \n Extensions (TSX), it is possible to exploit a transactional asynchronous\n abort (TAA) to perform a side-channel attack and leak kernel memory. \n\nFurther details on the vulnerabilities and our response can be found here:\nhttps://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/TAA_MCEPSC_i915\n\nAgain, due to the high complexity of the fixes and the required microcode \nupdate, we are unable to livepatch this set of CVEs. Please plan to reboot \ninto an updated kernel as soon as possible. \n\n| Series | Version | Flavors |\n|------------------+-----------------------+--------------------------|\n| Ubuntu 18.04 LTS | 4.15.0-1054.55 | aws |\n| Ubuntu 16.04 LTS | 4.4.0-1098.102 | aws |\n| Ubuntu 18.04 LTS | 5.0.0-1025.27~18.04.1 | azure |\n| Ubuntu 16.04 LTS | 4.15.0-1063.66 | azure |\n| Ubuntu 18.04 LTS | 4.15.0-69.78 | generic lowlatency |\n| Ubuntu 16.04 LTS | 4.15.0-69.78~16.04.1 | generic lowlatency |\n| Ubuntu 14.04 LTS | 4.4.0-168.197~14.04.1 | generic lowlatency |\n| Ubuntu 18.04 LTS | 4.15.0-1063.72 | oem |\n| Ubuntu 16.04 LTS | 4.4.0-168.197 | generic lowlatency |\n\nSupport Information:\n\nKernels older than the levels listed above will no longer receive livepatch\nupdates. \n\nReferences:\nCVE-2018-12207, CVE-2019-0154, CVE-2019-0155, CVE-2019-11135\n\n\n-- \nubuntu-security-announce mailing list\nubuntu-security-announce@lists.ubuntu.com\nModify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce\n",
"sources": [
{
"db": "NVD",
"id": "CVE-2018-12207"
},
{
"db": "VULHUB",
"id": "VHN-122143"
},
{
"db": "PACKETSTORM",
"id": "156058"
},
{
"db": "PACKETSTORM",
"id": "155331"
},
{
"db": "PACKETSTORM",
"id": "155288"
},
{
"db": "PACKETSTORM",
"id": "155405"
},
{
"db": "PACKETSTORM",
"id": "155424"
},
{
"db": "PACKETSTORM",
"id": "155314"
},
{
"db": "PACKETSTORM",
"id": "155697"
},
{
"db": "PACKETSTORM",
"id": "155283"
},
{
"db": "PACKETSTORM",
"id": "155291"
},
{
"db": "PACKETSTORM",
"id": "155318"
},
{
"db": "PACKETSTORM",
"id": "155418"
}
],
"trust": 1.98
},
"exploit_availability": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"reference": "https://www.scap.org.cn/vuln/vhn-122143",
"trust": 0.1,
"type": "unknown"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-122143"
}
]
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2018-12207",
"trust": 2.2
},
{
"db": "PACKETSTORM",
"id": "155283",
"trust": 0.2
},
{
"db": "PACKETSTORM",
"id": "155314",
"trust": 0.2
},
{
"db": "PACKETSTORM",
"id": "155331",
"trust": 0.2
},
{
"db": "PACKETSTORM",
"id": "155697",
"trust": 0.2
},
{
"db": "PACKETSTORM",
"id": "155288",
"trust": 0.2
},
{
"db": "PACKETSTORM",
"id": "155418",
"trust": 0.2
},
{
"db": "PACKETSTORM",
"id": "155405",
"trust": 0.2
},
{
"db": "PACKETSTORM",
"id": "155291",
"trust": 0.2
},
{
"db": "PACKETSTORM",
"id": "156058",
"trust": 0.2
},
{
"db": "PACKETSTORM",
"id": "155318",
"trust": 0.2
},
{
"db": "PACKETSTORM",
"id": "155424",
"trust": 0.2
},
{
"db": "PACKETSTORM",
"id": "155280",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "155293",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "155290",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "155287",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "155303",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "155278",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "155285",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "155335",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "155279",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "155289",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "155307",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "155847",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "155843",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "155292",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "155332",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "155286",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "155333",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "155294",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "155304",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "155284",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "155282",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "155309",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "155305",
"trust": 0.1
},
{
"db": "CNNVD",
"id": "CNNVD-201911-694",
"trust": 0.1
},
{
"db": "VULHUB",
"id": "VHN-122143",
"trust": 0.1
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-122143"
},
{
"db": "PACKETSTORM",
"id": "156058"
},
{
"db": "PACKETSTORM",
"id": "155331"
},
{
"db": "PACKETSTORM",
"id": "155288"
},
{
"db": "PACKETSTORM",
"id": "155405"
},
{
"db": "PACKETSTORM",
"id": "155424"
},
{
"db": "PACKETSTORM",
"id": "155314"
},
{
"db": "PACKETSTORM",
"id": "155697"
},
{
"db": "PACKETSTORM",
"id": "155283"
},
{
"db": "PACKETSTORM",
"id": "155291"
},
{
"db": "PACKETSTORM",
"id": "155318"
},
{
"db": "PACKETSTORM",
"id": "155418"
},
{
"db": "NVD",
"id": "CVE-2018-12207"
}
]
},
"id": "VAR-201911-1619",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-122143"
}
],
"trust": 0.01
},
"last_update_date": "2024-11-29T19:30:44.796000Z",
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-20",
"trust": 1.1
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-122143"
},
{
"db": "NVD",
"id": "CVE-2018-12207"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 1.2,
"url": "https://access.redhat.com/errata/rhsa-2019:3916"
},
{
"trust": 1.2,
"url": "https://access.redhat.com/errata/rhsa-2019:3936"
},
{
"trust": 1.2,
"url": "https://access.redhat.com/errata/rhsa-2019:3941"
},
{
"trust": 1.2,
"url": "https://access.redhat.com/errata/rhsa-2020:0204"
},
{
"trust": 1.1,
"url": "https://seclists.org/bugtraq/2020/jan/21"
},
{
"trust": 1.1,
"url": "https://www.debian.org/security/2020/dsa-4602"
},
{
"trust": 1.1,
"url": "https://security.gentoo.org/glsa/202003-56"
},
{
"trust": 1.1,
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00210.html"
},
{
"trust": 1.1,
"url": "https://www.oracle.com/security-alerts/cpujul2020.html"
},
{
"trust": 1.1,
"url": "https://access.redhat.com/errata/rhsa-2020:0026"
},
{
"trust": 1.1,
"url": "https://access.redhat.com/errata/rhsa-2020:0028"
},
{
"trust": 1.1,
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00042.html"
},
{
"trust": 1.1,
"url": "https://usn.ubuntu.com/4186-2/"
},
{
"trust": 1.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2018-12207"
},
{
"trust": 1.0,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/i5wwpw4bszddw7vhu427xtvxv7rooffw/"
},
{
"trust": 1.0,
"url": "https://support.f5.com/csp/article/k17269881?utm_source=f5support\u0026amp%3butm_medium=rss"
},
{
"trust": 1.0,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/izyatwnughrbg6i3tc24yhp5y3j7i6kh/"
},
{
"trust": 0.8,
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"trust": 0.8,
"url": "https://access.redhat.com/security/team/contact/"
},
{
"trust": 0.8,
"url": "https://www.redhat.com/mailman/listinfo/rhsa-announce"
},
{
"trust": 0.8,
"url": "https://bugzilla.redhat.com/):"
},
{
"trust": 0.8,
"url": "https://access.redhat.com/security/vulnerabilities/ifu-page-mce"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2019-11135"
},
{
"trust": 0.7,
"url": "https://access.redhat.com/security/cve/cve-2018-12207"
},
{
"trust": 0.6,
"url": "https://nvd.nist.gov/vuln/detail/cve-2019-0154"
},
{
"trust": 0.6,
"url": "https://access.redhat.com/articles/11258"
},
{
"trust": 0.6,
"url": "https://access.redhat.com/security/team/key/"
},
{
"trust": 0.5,
"url": "https://access.redhat.com/security/cve/cve-2019-11135"
},
{
"trust": 0.4,
"url": "https://nvd.nist.gov/vuln/detail/cve-2019-0155"
},
{
"trust": 0.4,
"url": "https://access.redhat.com/solutions/tsx-asynchronousabort"
},
{
"trust": 0.3,
"url": "https://access.redhat.com/security/cve/cve-2019-0154"
},
{
"trust": 0.2,
"url": "https://nvd.nist.gov/vuln/detail/cve-2019-3900"
},
{
"trust": 0.2,
"url": "https://access.redhat.com/security/cve/cve-2019-3900"
},
{
"trust": 0.2,
"url": "https://nvd.nist.gov/vuln/detail/cve-2019-17055"
},
{
"trust": 0.2,
"url": "https://nvd.nist.gov/vuln/detail/cve-2019-17054"
},
{
"trust": 0.2,
"url": "https://nvd.nist.gov/vuln/detail/cve-2019-17056"
},
{
"trust": 0.2,
"url": "https://nvd.nist.gov/vuln/detail/cve-2019-15098"
},
{
"trust": 0.2,
"url": "https://nvd.nist.gov/vuln/detail/cve-2019-17053"
},
{
"trust": 0.2,
"url": "https://nvd.nist.gov/vuln/detail/cve-2019-17666"
},
{
"trust": 0.2,
"url": "https://nvd.nist.gov/vuln/detail/cve-2019-17052"
},
{
"trust": 0.2,
"url": "https://access.redhat.com/solutions/i915-graphics"
},
{
"trust": 0.2,
"url": "https://access.redhat.com/security/cve/cve-2019-14287"
},
{
"trust": 0.2,
"url": "https://nvd.nist.gov/vuln/detail/cve-2019-14287"
},
{
"trust": 0.2,
"url": "https://wiki.ubuntu.com/securityteam/knowledgebase/taa_mcepsc_i915"
},
{
"trust": 0.1,
"url": "https://support.f5.com/csp/article/k17269881?utm_source=f5support\u0026amp;amp;utm_medium=rss"
},
{
"trust": 0.1,
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/i5wwpw4bszddw7vhu427xtvxv7rooffw/"
},
{
"trust": 0.1,
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/izyatwnughrbg6i3tc24yhp5y3j7i6kh/"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2019-5489"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2018-16884"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2019-14821"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2019-0155"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2019-14821"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2019-14901"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2019-5489"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2019-14816"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2019-14901"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2019-10126"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2019-9506"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2019-9506"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2019-14816"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2018-16884"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2019-10126"
},
{
"trust": 0.1,
"url": "https://launchpad.net/ubuntu/+source/linux-oem-osp1/5.0.0-1028.32"
},
{
"trust": 0.1,
"url": "https://bugs.launchpad.net/bugs/1852141"
},
{
"trust": 0.1,
"url": "https://usn.ubuntu.com/4184-2"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2019-15792"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2019-15791"
},
{
"trust": 0.1,
"url": "https://launchpad.net/ubuntu/+source/linux-hwe/5.0.0-36.39~18.04.1"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2019-15793"
},
{
"trust": 0.1,
"url": "https://bugs.launchpad.net/bugs/1851709,"
},
{
"trust": 0.1,
"url": "https://usn.ubuntu.com/4184-1"
},
{
"trust": 0.1,
"url": "https://launchpad.net/ubuntu/+source/linux/5.0.0-36.39"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/errata/rhsa-2019:3836"
},
{
"trust": 0.1,
"url": "https://docs.openshift.com/container-platform/4.2/release_notes/ocp-4-2-rel"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2019-15718"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2019-15718"
},
{
"trust": 0.1,
"url": "https://docs.openshift.com/container-platform/4.1/release_notes/ocp-4-1-rel"
},
{
"trust": 0.1,
"url": "https://usn.ubuntu.com/4186-2"
},
{
"trust": 0.1,
"url": "https://usn.ubuntu.com/4186-1"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/errata/rhsa-2019:4245"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2019-19339"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2019-19339"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/errata/rhsa-2019:3832"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/errata/rhsa-2019:3842"
},
{
"trust": 0.1,
"url": "https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-122143"
},
{
"db": "PACKETSTORM",
"id": "156058"
},
{
"db": "PACKETSTORM",
"id": "155331"
},
{
"db": "PACKETSTORM",
"id": "155288"
},
{
"db": "PACKETSTORM",
"id": "155405"
},
{
"db": "PACKETSTORM",
"id": "155424"
},
{
"db": "PACKETSTORM",
"id": "155314"
},
{
"db": "PACKETSTORM",
"id": "155697"
},
{
"db": "PACKETSTORM",
"id": "155283"
},
{
"db": "PACKETSTORM",
"id": "155291"
},
{
"db": "PACKETSTORM",
"id": "155318"
},
{
"db": "PACKETSTORM",
"id": "155418"
},
{
"db": "NVD",
"id": "CVE-2018-12207"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "VULHUB",
"id": "VHN-122143"
},
{
"db": "PACKETSTORM",
"id": "156058"
},
{
"db": "PACKETSTORM",
"id": "155331"
},
{
"db": "PACKETSTORM",
"id": "155288"
},
{
"db": "PACKETSTORM",
"id": "155405"
},
{
"db": "PACKETSTORM",
"id": "155424"
},
{
"db": "PACKETSTORM",
"id": "155314"
},
{
"db": "PACKETSTORM",
"id": "155697"
},
{
"db": "PACKETSTORM",
"id": "155283"
},
{
"db": "PACKETSTORM",
"id": "155291"
},
{
"db": "PACKETSTORM",
"id": "155318"
},
{
"db": "PACKETSTORM",
"id": "155418"
},
{
"db": "NVD",
"id": "CVE-2018-12207"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2019-11-14T00:00:00",
"db": "VULHUB",
"id": "VHN-122143"
},
{
"date": "2020-01-23T00:26:55",
"db": "PACKETSTORM",
"id": "156058"
},
{
"date": "2019-11-14T15:55:13",
"db": "PACKETSTORM",
"id": "155331"
},
{
"date": "2019-11-12T21:50:27",
"db": "PACKETSTORM",
"id": "155288"
},
{
"date": "2019-11-19T19:57:08",
"db": "PACKETSTORM",
"id": "155405"
},
{
"date": "2019-11-21T15:06:23",
"db": "PACKETSTORM",
"id": "155424"
},
{
"date": "2019-11-13T17:17:28",
"db": "PACKETSTORM",
"id": "155314"
},
{
"date": "2019-12-17T15:39:16",
"db": "PACKETSTORM",
"id": "155697"
},
{
"date": "2019-11-12T21:49:05",
"db": "PACKETSTORM",
"id": "155283"
},
{
"date": "2019-11-12T21:51:04",
"db": "PACKETSTORM",
"id": "155291"
},
{
"date": "2019-11-13T17:20:10",
"db": "PACKETSTORM",
"id": "155318"
},
{
"date": "2019-11-20T22:22:22",
"db": "PACKETSTORM",
"id": "155418"
},
{
"date": "2019-11-14T20:15:11.133000",
"db": "NVD",
"id": "CVE-2018-12207"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2020-07-15T00:00:00",
"db": "VULHUB",
"id": "VHN-122143"
},
{
"date": "2024-11-21T03:44:45.313000",
"db": "NVD",
"id": "CVE-2018-12207"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "local",
"sources": [
{
"db": "PACKETSTORM",
"id": "155314"
}
],
"trust": 0.1
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Red Hat Security Advisory 2020-0204-01",
"sources": [
{
"db": "PACKETSTORM",
"id": "156058"
}
],
"trust": 0.1
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "overflow",
"sources": [
{
"db": "PACKETSTORM",
"id": "156058"
}
],
"trust": 0.1
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.